Phalcon

A Platform to Monitor and Block Hacks

is a new paradigm for securing protocols. It helps protocol detect hacks, operational, interaction and financial risks, get instant alerts, and take automatic action to prevent threats before they do any damage.

Its battle-tested capability has been proven by successfully thwarting 20+ real-world hacks and rescuing over $20,000,000 worth of asset.

Highlights of BlockSec Phalcon

  • Get early access to precise attack intelligence

  • Automated attack blocking with Customized Actions

  • No-code, flexible monitoring rules configuration

  • Meet both security and operational monitoring requirements

How to Use

You can book a demo to talk with our technical support engineers before subscribing to Phalcon.

The detailed user manual of Phalcon can be accessed after subscribing to Phalcon.

Use Cases

DeFi Protocol Operator

The protocol operator can use Phalcon to monitor attacks on its protocol (smart contracts) and configure Phalcon to automatically pause the protocol when an attack is detected in the mempool or on the blockchain to prevent further losses.

Also, the protocol operator can use Phalcon to monitor sensitive operations related to its protocol, including updating critical configuration, changing admin roles, adding new owners to critical multisig wallets, withdrawing funds from the protocol by admins, and others. Awareness of such sensitive operations (can take corrective actions) is critical to maintaining the protocol's security since inside attackers (or private key leakage) can lead to significant loss to the protocol.

LPs (Liquidity Providers)

LPs are the people who deposit (or stake) many assets into some protocols. When a protocol is hacked, the LP's assets will be drained (not the protocols). Using Phalcon, LPs can get notifications when their investment protocols are hacked and automatically withdraw funds before others (or other strategies) to reduce loss.

L2 Chains

L2 chain operators can collaborate with BlockSec to support Phalcon in its L2 chains. This can help secure the top protocols on the L2 chains, which uphold a thriving ecosystem. Besides, L2 chains can integrate Phalcon deeply inside the chain (e.g., the sequencer) to create an even more secure ecosystem from the root.

Centralized Exchanges

Centralized exchanges (CEX) can automatically use Phalcon to delist tokens affected by hacks. Otherwise, the valueless tokens can be sold in exchanges, which causes loss.

Last updated