
🚨 I found a live honeypot on Ethereum that 4 security scanners missed.
RAY token (0x9AF762965d8f4f3Ad65C2521b0A090f95bc75121)
SolidityScan: 95.43/100 "GREAT"
GoPlus: "No security risks found"
It has a hidden kill switch. Thread 👇
1/ The emitTransfer() function looks harmless —
even has copied OpenZeppelin documentation.
But it contains inline assembly that XOR-constructs
a hidden address at runtime and calls it on EVERY transfer.
2/ The XOR decode:
0xb6390803 ^ 0xd73218d0 = 610b10d3
0xb02df78d ^ 0xd73218d0 = 671fef5d
0x7a5a30ea ^ 0xd73218d0 = ad68283a
0xdff38596 ^ 0xd73218d0 = 08c19d46
0xba97a7fb ^ 0xd73218d0 = 6da5bf2b
Hidden controller: 0x610b10d3671fef5dad68283a08c19d466da5bf2b
3/ Every transfer calls 0x478d3305(from) on this
hidden contract. If it reverts → transfer reverts →
you can't sell. Classic honeypot.
The controller is UNVERIFIED, deployed 42 days before
RAY, and has 129+ transactions from multiple addresses.
Reusable honeypot infrastructure.
4/ I built a research algorithm that detects this
from bytecode alone. Zero training, no rules, no
pattern matching. It flagged RAY as anomalous while
4 commercial scanners gave it a clean bill of health.
Full writeup + evidence: https://github.com/aditya01933/zero-day-disclosures/blob/main/disclosures/2026-03-16-ray-token-honeypot.md
Found a live honeypot on Ethereum with XOR-obfuscated backdoor — 4 security scanners missed it
byu/techoalien_com inethtrader
Posted by techoalien_com