🛡️
FailSafe Knowledge Centre
CtrlK
  • Introduction
    • Defence-in-Depth
    • Forward Security
  • Web3 Threats
  • Defence-in-Depth & the Lifecycle of a Transaction
    • Defence 1: De-risk Web3 Asset Positions
    • Defence 2: FailSafe Blockchain Reconnaissance
    • Defence 3: FailSafe Interceptor Service
  • FailSafe Architecture
    • Forward Security in FailSafe
      • Quantum Threats to EVM-based Blockchains
      • On ECDSA Key Re-use
      • On New Quantum-resilient Alternatives
      • Account Abstraction as a Path to Sunseting ECDSA on Ethereum?
    • Introducing the Quantum Migration Tool (qMig)
      • How Does qMig work?
      • Discussion
      • FailSafe + qMig
  • Module Overviews
    • FailSafe Guard
      • FailSafe Proof (Attestation Service)
    • FailSafe Interceptor
    • FailSafe Radar (Fraud and Risk Scoring API)
      • Address Screening
      • Asset Movement Graph Cluster
  • How FailSafe Helps Your Organisation
    • Reduce Attack Surface Area
    • Mitigate Security Risks
    • Real-Time Threat Response
    • Forward Security against Looming Quantum Computing Threats
  • FailSafe as a tool for Enterprise Risk Management
  • Frequently Asked Questions
    • General FAQs
    • FailSafe Guard FAQs
      • How does FailSafe Interceptor work?
      • What is FailSafe Recovery Vault?
      • What is FailSafe Interceptor’s coverage of pending transactions?
      • What type of assets can FailSafe Interceptor protect?
      • Which networks is Interceptor currently supporting?
      • In what scenarios is FailSafe Interceptor typically useful?
      • What happens if an attacker uses an abnormally high gas fee?
      • What if the attacker is using MEV protection RPCs to steal funds?
      • Is the FailSafe Recovery Vault wallet safe? Can it be exploited?
      • What are the risks associated with granting approvals to the Recovery Vault?
      • How can I verify that Recovery Vault can move assets unidirectionally?
      • Does FailSafe require my private keys in order to protect funds?
      • If my private key is exposed, can an attacker disable the Interceptor using the private key?
      • Is FailSafe Interceptor open source?
    • FailSafe Radar FAQs
  • Conclusion
Powered by GitBook
On this page
  1. Frequently Asked Questions

FailSafe Guard FAQs

How does FailSafe Interceptor work?What is FailSafe Recovery Vault?What is FailSafe Interceptor’s coverage of pending transactions?What type of assets can FailSafe Interceptor protect?Which networks is Interceptor currently supporting?In what scenarios is FailSafe Interceptor typically useful?What happens if an attacker uses an abnormally high gas fee?What if the attacker is using MEV protection RPCs to steal funds?Is the FailSafe Recovery Vault wallet safe? Can it be exploited?What are the risks associated with granting approvals to the Recovery Vault?How can I verify that Recovery Vault can move assets unidirectionally?Does FailSafe require my private keys in order to protect funds?If my private key is exposed, can an attacker disable the Interceptor using the private key?Is FailSafe Interceptor open source?
PreviousGeneral FAQsNextHow does FailSafe Interceptor work?

Last updated 1 year ago