Benchmarking

Benchmarking what types of scams can be prevented is critically important to us. We default to transparency so that your expectations are aligned with the services we offer.

Scam benchmarks:

Scam TypeExampleCoverage
Wallet DrainersA fraudulent website that drains all NFTs, tokens, or other assets within your wallet.
NFT Marketplace Listing ScamsExploits open approvals from assets you've previously sold/listed on Blur, OpenSea, or LooksRare. Attacker is able to sell the asset to themselves for 0 ETH
Malicious signaturesSet Approval For All, eth_sign, and other arbitrary value transfer functions. Set Approval For All is allowed on verified marketplaces
ETH DrainersA scam website that claims to be a NFT mint but actually steals all the Ethereum from an account
Low trust domainsWebsites with very low reputation, which are often related to spam, malware, social engineering, and scams.
Homoglyphsøpeñsea.com (malicious) vs opensea.io (verified)
Brand impersonation / URL typo-squattingopensae.net (malicious) vs opensea.io (verified)
Address screeningAggregating data from other blockchain data providers about the reputation of the address
High risk contract method callsSecurityUpdate() and other method calls that are intended to mislead users into sending ETH for nothing in return.
OpenSea Wyvern Contract exploitThis is an attack specific to the old OpenSea contract where users could be mislead into granting an attacker ownership of their proxy contract and therefore their assets.
OFAC blocklistScreening information against OFAC's blocklistComing soon
Seed phrase compromiseWe are researching ways to extend our phishing detection to detect websites that have the intent of stealing the users' private key or seed phrase.Coming soon
Honeypot detection & other smart contract risksHoneypot detection: Smart contracts that only allow for assets to be sent in and not sent out. We will be adding support for this and other smart contract-related risks soon.Coming soon
Rug pullsWe cannot predict the intentions of a NFT project that minted legitimately but then proceeds to abandon the project. However we can detect risks in the smart contract itself if the project appears to be suspicious.
Address poisoningWe are exploring ways to detect this but do not support this right now.
MalwareMalicious file downloads from play-to-earn malware campaigns or any form of malware.Contact us