🛡️
FailSafe Knowledge Centre
Ctrlk
  • Introduction
  • Web3 Threats
  • Defence-in-Depth & the Lifecycle of a Transaction
  • FailSafe Architecture
  • Module Overviews
  • How FailSafe Helps Your Organisation
  • FailSafe as a tool for Enterprise Risk Management
  • Frequently Asked Questions
    • General FAQs
    • FailSafe Guard FAQs
      • How does FailSafe Interceptor work?
      • What is FailSafe Recovery Vault?
      • What is FailSafe Interceptor’s coverage of pending transactions?
      • What type of assets can FailSafe Interceptor protect?
      • Which networks is Interceptor currently supporting?
      • In what scenarios is FailSafe Interceptor typically useful?
      • What happens if an attacker uses an abnormally high gas fee?
      • What if the attacker is using MEV protection RPCs to steal funds?
      • Is the FailSafe Recovery Vault wallet safe? Can it be exploited?
      • What are the risks associated with granting approvals to the Recovery Vault?
      • How can I verify that Recovery Vault can move assets unidirectionally?
      • Does FailSafe require my private keys in order to protect funds?
      • If my private key is exposed, can an attacker disable the Interceptor using the private key?
      • Is FailSafe Interceptor open source?
    • FailSafe Radar FAQs
  • Conclusion
Powered by GitBook
On this page
  1. Frequently Asked Questions

FailSafe Guard FAQs

How does FailSafe Interceptor work?What is FailSafe Recovery Vault?What is FailSafe Interceptor’s coverage of pending transactions?What type of assets can FailSafe Interceptor protect?Which networks is Interceptor currently supporting?In what scenarios is FailSafe Interceptor typically useful?What happens if an attacker uses an abnormally high gas fee?What if the attacker is using MEV protection RPCs to steal funds?Is the FailSafe Recovery Vault wallet safe? Can it be exploited?What are the risks associated with granting approvals to the Recovery Vault?How can I verify that Recovery Vault can move assets unidirectionally?Does FailSafe require my private keys in order to protect funds?If my private key is exposed, can an attacker disable the Interceptor using the private key?Is FailSafe Interceptor open source?
PreviousGeneral FAQsNextHow does FailSafe Interceptor work?

Last updated 1 year ago