Understand threats to better protect yourself
Web3 offers immense opportunities, but also specific risks. Discover the most common threats and best practices to secure your assets.
4 Layers of Protection
Layer 1: Monitoring
Continuous monitoring of all your addresses and transactions in real time across 7+ blockchains.
Layer 2: Analysis
Each transaction passes through 200+ risk indicators powered by our Sentinel AI engine.
Layer 3: Alert
Instant notifications via email, Telegram, or webhook upon threat detection.
Layer 4: Protection
Proactive blocking of interactions with smart contracts identified as malicious.
Most Common Attacks
Each threat is analyzed with its prevention method by CryptoGuard Sentinel.
Ice Phishing
An attack that manipulates token approvals to silently drain your wallets by exploiting deceptive transaction signatures.
Sentinel analyzes every approval request and alerts you if the target contract is suspicious or unverified.
Rug Pull
Project creators withdraw all liquidity from a pool after attracting investors, rendering the tokens worthless.
Our AI detects rug pull patterns (unlocked liquidity, token concentration, unrenounced contracts).
Smart Contract Exploit
Exploitation of vulnerabilities in smart contract code to divert funds (reentrancy, overflow, flash loan attacks).
Sentinel automatically audits the contracts you interact with and identifies known vulnerabilities.
MEV / Sandwich Attack
Bots manipulate the order of transactions in a block to extract value from your trades (front-running, back-running).
Detection of MEV patterns and recommendation of protections (slippage, private mempool, MEV protection).
Flash Loan Attack
Massive uncollateralized borrowing in a single transaction to manipulate DeFi protocol prices and drain liquidity.
Sentinel monitors abnormal liquidity movements and alerts in real time during sudden price fluctuations on pools.
Honeypot Token
Tokens designed to prevent resale: you can buy but the contract blocks any sell attempt, trapping your funds permanently.
Automatic bytecode analysis of tokens before interaction, with detection of transfer blocking functions and hidden blacklists.
Essential Habits
Habits to adopt — and those to avoid — to navigate the Web3 safely.
Never share your seed phrase
No legitimate service will ever ask for your recovery phrase. Store it offline in a secure location.
Don't sign transactions you don't understand
If a site asks you to sign a complex transaction, take time to understand what you're approving.
Revoke inactive approvals
Use a tool like Revoke.cash to remove smart contract authorizations you no longer use to limit your attack surface.
Enable real-time alerts
Set up notifications on your wallets to be immediately informed of any suspicious activity or unauthorized transaction.
Don't connect your main wallet to new projects
Use a secondary wallet with limited funds to test new dApps before committing your main portfolio.
Diversify your wallets
Spread your assets across multiple wallets to reduce the risk of total loss if a single address is compromised.
Report a Scam
Have you been a victim or witness of a scam? Help the community by reporting the fraudulent address or project. Our team will analyze your report within 24 hours.