Security & Prevention

Understand threats to better protect yourself

Web3 offers immense opportunities, but also specific risks. Discover the most common threats and best practices to secure your assets.

Our Approach

4 Layers of Protection

1

Layer 1: Monitoring

Continuous monitoring of all your addresses and transactions in real time across 7+ blockchains.

2

Layer 2: Analysis

Each transaction passes through 200+ risk indicators powered by our Sentinel AI engine.

3

Layer 3: Alert

Instant notifications via email, Telegram, or webhook upon threat detection.

4

Layer 4: Protection

Proactive blocking of interactions with smart contracts identified as malicious.

Known Threats

Most Common Attacks

Each threat is analyzed with its prevention method by CryptoGuard Sentinel.

Ice Phishing

Critical

An attack that manipulates token approvals to silently drain your wallets by exploiting deceptive transaction signatures.

Sentinel analyzes every approval request and alerts you if the target contract is suspicious or unverified.

Rug Pull

Critical

Project creators withdraw all liquidity from a pool after attracting investors, rendering the tokens worthless.

Our AI detects rug pull patterns (unlocked liquidity, token concentration, unrenounced contracts).

Smart Contract Exploit

High

Exploitation of vulnerabilities in smart contract code to divert funds (reentrancy, overflow, flash loan attacks).

Sentinel automatically audits the contracts you interact with and identifies known vulnerabilities.

MEV / Sandwich Attack

Medium

Bots manipulate the order of transactions in a block to extract value from your trades (front-running, back-running).

Detection of MEV patterns and recommendation of protections (slippage, private mempool, MEV protection).

Flash Loan Attack

Critical

Massive uncollateralized borrowing in a single transaction to manipulate DeFi protocol prices and drain liquidity.

Sentinel monitors abnormal liquidity movements and alerts in real time during sudden price fluctuations on pools.

Honeypot Token

High

Tokens designed to prevent resale: you can buy but the contract blocks any sell attempt, trapping your funds permanently.

Automatic bytecode analysis of tokens before interaction, with detection of transfer blocking functions and hidden blacklists.

Best Practices

Essential Habits

Habits to adopt — and those to avoid — to navigate the Web3 safely.

Never share your seed phrase

No legitimate service will ever ask for your recovery phrase. Store it offline in a secure location.

Don't sign transactions you don't understand

If a site asks you to sign a complex transaction, take time to understand what you're approving.

Revoke inactive approvals

Use a tool like Revoke.cash to remove smart contract authorizations you no longer use to limit your attack surface.

Enable real-time alerts

Set up notifications on your wallets to be immediately informed of any suspicious activity or unauthorized transaction.

Don't connect your main wallet to new projects

Use a secondary wallet with limited funds to test new dApps before committing your main portfolio.

Diversify your wallets

Spread your assets across multiple wallets to reduce the risk of total loss if a single address is compromised.

$3.7B
Lost to Hacks in 2024
$1.2B
Protected by Sentinel
50K+
Phishing Sites Detected
99.7%
Detection Rate

Report a Scam

Have you been a victim or witness of a scam? Help the community by reporting the fraudulent address or project. Our team will analyze your report within 24 hours.