Welcome to the Harpie docs!
  • About
    • Whitepaper
    • What attacks can Harpie prevent?
  • Tech & Security
    • Harpie's Anti-Theft Tech
    • About the Transaction Firewall
    • About the Harpie Vault
    • Security
    • Contracts
      • Deployments
      • Transferer
      • Noncustodial Vault
      • Audit
    • Disclosures & Risks
  • Help
    • Getting Started
      • Get Protected
        • Protecting a token or NFT
        • Setting a withdrawal address
    • My NFTs are stuck in the Harpie Vault, how do I recover them?
    • My Vault is saying I only have 1 NFT recovered, but there should be more
    • FAQ
      • Is Harpie audited?
      • What is Harpie?
      • What is a Trusted Network?
      • What happens when I "Protect" something?
      • What is a Withdrawal Address?
  • Harpie For Enterprise
    • Harpie For Enterprise
      • Background Check API
      • Methods
        • Validate Address
        • Validate Transaction
        • Get Contract Name
Powered by GitBook
On this page
  • Protecting an asset allows us to move it in the event of an attack
  • What exactly happens during an attack?
  • But wait... How can I trust Harpie?
  1. Help
  2. FAQ

What happens when I "Protect" something?

In order to have Harpie keep watch over your wallet, you have to "protect" each of your tokens.

Protecting an asset allows us to move it in the event of an attack

Your trusted network tells Harpie what traffic we should be watching for on your wallet. However, what your trusted network does not do is allow us to actually intervene in the event of an attack.

By protecting your assets, you give Harpie permission to move your tokens and NFTs to a safe location the second we detect malicious activity on your wallet. This is done through the approve function. If you've used a DeFi protocol or an NFT marketplace like OpenSea or Compound, you've most likely used the approve function before.

What exactly happens during an attack?

When a thief sends a transaction to steal your money, Harpie eliminates that transaction before it can affect your balance. We essentially "skip the line" and transfer your assets out of your wallet before a thief can.

Our systems use an advanced strategy called frontrunning. By paying a higher gas fee, Harpie can beat out attackers by taking advantage of a blockchain's consensus mechanism.

But wait... How can I trust Harpie?

You may be asking yourself:

How can I trust Harpie with the ability to move my tokens? Isn't it a security risk?

Approval is a huge security risk, and thus, we have done as much as we can to ensure that you feel comfortable with taking the risk.

When Harpie moves your tokens on your behalf, we are only able to move it to the Noncustodial Vault. When your tokens are inside the Vault, no one else (not even Harpie) can withdraw your stored tokens. This is guaranteed by code, and this code is completely transparent and has multiple public audits that you can find at Audit.

This means that, even though we have the power to move your tokens to the Vault on your behalf, we never have the power to access or withdraw them.

PreviousWhat is a Trusted Network?NextWhat is a Withdrawal Address?

Last updated 2 years ago