Welcome to the Harpie docs!
  • About
    • Whitepaper
    • What attacks can Harpie prevent?
  • Tech & Security
    • Harpie's Anti-Theft Tech
    • About the Transaction Firewall
    • About the Harpie Vault
    • Security
    • Contracts
      • Deployments
      • Transferer
      • Noncustodial Vault
      • Audit
    • Disclosures & Risks
  • Help
    • Getting Started
      • Get Protected
        • Protecting a token or NFT
        • Setting a withdrawal address
    • My NFTs are stuck in the Harpie Vault, how do I recover them?
    • My Vault is saying I only have 1 NFT recovered, but there should be more
    • FAQ
      • Is Harpie audited?
      • What is Harpie?
      • What is a Trusted Network?
      • What happens when I "Protect" something?
      • What is a Withdrawal Address?
  • Harpie For Enterprise
    • Harpie For Enterprise
      • Background Check API
      • Methods
        • Validate Address
        • Validate Transaction
        • Get Contract Name
Powered by GitBook
On this page
  1. Help
  2. FAQ

What is Harpie?

PreviousIs Harpie audited?NextWhat is a Trusted Network?

Last updated 2 years ago

Crypto shouldn't feel scary to use, but people lose crypto every day. No one in the space—from yield farmers, to NFT whales, to everyday hobbyists—is protected from scams, thefts and hacks.

Theft is becoming rampant in the crypto space. Crypto users deal with attacks like , , and on an almost-daily basis.

Harpie is the first service that protects you from crypto theft. If you're ever caught sending tokens to an unauthorized party, we stop that transfer in transit. We protect you from a huge variety of attack vectors: social engineering, website hacks, accidental transfers, and private key theft, to name a few.

On top of that, Harpie is completely non-custodial. This means that at no point does Harpie nor its members have access to your funds. There is no risk of Harpie ever taking control of your wallet or assets. Harpie's smart contracts have been thoroughly audited.

website hijackings
social engineering scams
social media misinformation