to serve what purpose ? again - all they could do is point the S1 to their own pool for their benefit - or try and fk it up - either way you are going to know - especially with the monitoring tool you created...
its not like your not going to know
There are a number of cunning things an exploit could do:
- syphon off small enough percentages of hashrate via a hack into the firmware, small enough that one wouldn't notice.
- syphon off all the hashrate during the hours a user is expected to be asleep. a lot of this can be learnt via the Antminer logs, time settings if an attacker has access, to the user it would look like the pool was down for 4 or 5 hours.
- update the firmware in the miner with an attackers own hacked version
- upload some javascript to the antminer web interface that exploited vulnerabilities in a browser so that when the user logs in their wallet data is stolen and more...