🛡️
FailSafe Knowledge Centre
search
⌘Ctrlk
🛡️
FailSafe Knowledge Centre
  • Introduction
  • Web3 Threats
  • Defence-in-Depth & the Lifecycle of a Transaction
  • FailSafe Architecture
  • Module Overviews
  • How FailSafe Helps Your Organisation
  • FailSafe as a tool for Enterprise Risk Management
  • Frequently Asked Questions
    • General FAQs
    • FailSafe Guard FAQs
      • How does FailSafe Interceptor work?
      • What is FailSafe Recovery Vault?
      • What is FailSafe Interceptor’s coverage of pending transactions?
      • What type of assets can FailSafe Interceptor protect?
      • Which networks is Interceptor currently supporting?
      • In what scenarios is FailSafe Interceptor typically useful?
      • What happens if an attacker uses an abnormally high gas fee?
      • What if the attacker is using MEV protection RPCs to steal funds?
      • Is the FailSafe Recovery Vault wallet safe? Can it be exploited?
      • What are the risks associated with granting approvals to the Recovery Vault?
      • How can I verify that Recovery Vault can move assets unidirectionally?
      • Does FailSafe require my private keys in order to protect funds?
      • If my private key is exposed, can an attacker disable the Interceptor using the private key?
      • Is FailSafe Interceptor open source?
    • FailSafe Radar FAQs
  • Conclusion
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Frequently Asked Questions

FailSafe Guard FAQs

How does FailSafe Interceptor work?chevron-rightWhat is FailSafe Recovery Vault?chevron-rightWhat is FailSafe Interceptor’s coverage of pending transactions?chevron-rightWhat type of assets can FailSafe Interceptor protect?chevron-rightWhich networks is Interceptor currently supporting?chevron-rightIn what scenarios is FailSafe Interceptor typically useful?chevron-rightWhat happens if an attacker uses an abnormally high gas fee?chevron-rightWhat if the attacker is using MEV protection RPCs to steal funds?chevron-rightIs the FailSafe Recovery Vault wallet safe? Can it be exploited?chevron-rightWhat are the risks associated with granting approvals to the Recovery Vault?chevron-rightHow can I verify that Recovery Vault can move assets unidirectionally?chevron-rightDoes FailSafe require my private keys in order to protect funds?chevron-rightIf my private key is exposed, can an attacker disable the Interceptor using the private key?chevron-rightIs FailSafe Interceptor open source?chevron-right
PreviousGeneral FAQschevron-leftNextHow does FailSafe Interceptor work?chevron-right

Last updated 1 year ago