Welcome to the Harpie docs!
  • About
    • Whitepaper
    • What attacks can Harpie prevent?
  • Tech & Security
    • Harpie's Anti-Theft Tech
    • About the Transaction Firewall
    • About the Harpie Vault
    • Security
    • Contracts
      • Deployments
      • Transferer
      • Noncustodial Vault
      • Audit
    • Disclosures & Risks
  • Help
    • Getting Started
      • Get Protected
        • Protecting a token or NFT
        • Setting a withdrawal address
    • My NFTs are stuck in the Harpie Vault, how do I recover them?
    • My Vault is saying I only have 1 NFT recovered, but there should be more
    • FAQ
      • Is Harpie audited?
      • What is Harpie?
      • What is a Trusted Network?
      • What happens when I "Protect" something?
      • What is a Withdrawal Address?
  • Harpie For Enterprise
    • Harpie For Enterprise
      • Background Check API
      • Methods
        • Validate Address
        • Validate Transaction
        • Get Contract Name
Powered by GitBook
On this page
  1. Tech & Security

Harpie's Anti-Theft Tech

For those curious about how Harpie works under-the-hood, here's a quick rundown of how we protect our users from crypto theft.

  • Background Check Engine: We run regular scans of every Ethereum address, and we're able to find if it's involved in hacks, scams, money laundering, or any other illicit activity

  • Transaction Firewall: We pre-screen transactions before they get sent out to the blockchain, which lets us prevent users from signing scam transactions.

  • Vault: As a last line of defense, we're able to transfer vulnerable assets out of user wallets as soon as an attack is detected, using a trustless transfer system.

All of these features are opt-in and configurable via the Harpie dashboard.

PreviousWhat attacks can Harpie prevent?NextAbout the Transaction Firewall

Last updated 1 year ago