Phalcon
A Platform to Monitor and Block Hacks
Last updated
A Platform to Monitor and Block Hacks
Last updated
is a new paradigm for securing protocols. It helps protocol detect hacks, operational, interaction and financial risks, get instant alerts, and take automatic action to prevent threats before they do any damage.
by successfully thwarting 20+ real-world hacks and rescuing over $20,000,000 worth of asset.
Highlights of BlockSec Phalcon
Get early access to precise attack intelligence
Automated attack blocking with Customized Actions
No-code, flexible monitoring rules configuration
Meet both security and operational monitoring requirements
You can to talk with our technical support engineers before subscribing to Phalcon.
The detailed user manual of Phalcon can be accessed after subscribing to Phalcon.
The protocol operator can use Phalcon to monitor attacks on its protocol (smart contracts) and configure Phalcon to automatically pause the protocol when an attack is detected in the mempool or on the blockchain to prevent further losses.
Also, the protocol operator can use Phalcon to monitor sensitive operations related to its protocol, including updating critical configuration, changing admin roles, adding new owners to critical multisig wallets, withdrawing funds from the protocol by admins, and others. Awareness of such sensitive operations (can take corrective actions) is critical to maintaining the protocol's security since inside attackers (or private key leakage) can lead to significant loss to the protocol.
LPs are the people who deposit (or stake) many assets into some protocols. When a protocol is hacked, the LP's assets will be drained (not the protocols). Using Phalcon, LPs can get notifications when their investment protocols are hacked and automatically withdraw funds before others (or other strategies) to reduce loss.
L2 chain operators can collaborate with BlockSec to support Phalcon in its L2 chains. This can help secure the top protocols on the L2 chains, which uphold a thriving ecosystem. Besides, L2 chains can integrate Phalcon deeply inside the chain (e.g., the sequencer) to create an even more secure ecosystem from the root.
Centralized exchanges (CEX) can automatically use Phalcon to delist tokens affected by hacks. Otherwise, the valueless tokens can be sold in exchanges, which causes loss.