XORD LLC ⟶ DISPATCHES

XORD LLC communicates official updates via these Dispatches. We do not engage in speculative discussion on social media. All relevant data will be provided here. The truth is on-chain and in the code.

Node Ø Transmission: Y25.M08.D10.R7

Forensic Brief: External Compromise of a Supporter's Wallet (XORD protocol unaffected)

On August 10, 2025, a long-standing supporter's externally held wallet was fully compromised. At breach time, it controlled 1,151,859.202757202820799759 XORD. The attacker executed a dump via a router aggregate path, swapping XORD for WETH and forwarding out via a bridge. No XORD contracts or XORD-run systems were impacted.

Compromised Holder
Externally managed hot wallet
Total XORD moved
1,151,859.202757202820799759
Realized Proceeds
0.176144556008916542 WETH (~$737.64)
Event Window
2025-08-10 01:08:47 UTC (confirmed < 30s)

Primary Transaction

Tx Hash 0xce5d09f1c2383ad8cd935ce630980076fea041a1c7c5a1c33de77d98351f76b6
View on Etherscan
From (Attacker) 0x26b822080481D29C443bAfd85d0a5a14C7Daa933
Router 0xEE030ec6F4307411607E55aCD08e628Ae6655B86 (Butter Network: Router V3)
Path (summary) Attacker → Router V3 → intermediate → Uniswap V2: XORD pool → OpenOcean 2 → WETH → Router V3 → Butter Bridge V3.1
Resulting Asset 0.176144556008916542 WETH (~$737.64)
Fee & Gas Fee: 0.000560906300542729 ETH (~$2.35) • Type: EIP-1559 • Gas Used: 504,167

Transfer Sequence (Condensed)

Attack Surface — Likely Vectors

Hardened Self-Custody Posture

XORD Security Protocol — Individual Defense Matrix

Layer Ø: Hardware Sovereignty

Deploy airgapped signing device (Ledger/Trezor). Firmware verification mandatory. PIN complexity: 8+ digits. Passphrase: 25+ characters including special chars. Never photograph/screenshot seed. Steel plate backup in bank vault or equivalent secure location.

Layer 1: Operational Compartmentalization

Dedicate separate hardware for crypto operations. Linux preferred (Tails/Qubes for maximum paranoia). No mixing with daily driver. Browser profiles isolated. Extensions: uBlock Origin + hardware wallet only. DNS over HTTPS. Disable WebRTC.

Layer 2: Transaction Verification Protocol

Every transaction requires triple verification: (1) Contract address via Etherscan, (2) Function call decode, (3) Value confirmation on hardware device screen. Bookmark verified dApps. Never trust Discord/Telegram links. Simulate transactions via Tenderly when possible.

Layer 3: Time-Lock Defense

Implement time delays for large transfers. Use multisig (2-of-3 minimum) for treasury positions. Gnosis Safe or equivalent. Social recovery mechanisms. Whitelist addresses during calm periods, not under pressure.

Layer 4: Monitoring & Response

Deploy address watchers (Etherscan alerts/Forta). Monitor approval states weekly via Revoke.cash. Pre-stage emergency withdrawal scripts. Practice incident response quarterly. Document recovery procedures offline.

The XORD Principle

Trust nothing. Verify everything. The blockchain is truth; everything else is potentially hostile. Your security is your sovereignty. No protocol, no team, no community can protect you from poor operational security. Act accordingly.

Statement

The XORD protocol and infrastructure were not affected. This was an external endpoint breach followed by a router-mediated liquidation. Decentralization grants sovereignty — and demands disciplined, verifiable operational security.

Primary transaction anchor (public ledger):
Etherscan — 0xce5d0…f76b6