The Problem

Web3 | DeFi evolution has left crypto
businesses vulnerable

The success and rapid growth of DeFi has expanded our attack surface or risk. This increasing risk has outpaced the current maturity of Web3 security leaving crypto businesses vulnerable.  

While Web3 security focuses on code review, our adversaries leverage public and real-time data characteristics of Web3 to exploit discovered vulnerabilities.

The Solution

Effective, early, and rapid event detection and response are essential to a Web3 security program

Security in Web3 must move beyond the source code review and post event investigations which are necessary for a robust security and risk management program but not sufficient.

Leveraging the same public and real time data characteristics our adversaries are exploiting, Security programs must implement effective, early, and rapid event detection and response processes.

LWorks Sentinel platform protects Web3 companies

Sentinel provides a combination of preventative APIs and rules driven monitoring and notifications so Wallet providers, DeFi solutions and other Web3 companies can provide themselves and their users with the real time activity monitoring, threat detection and threat prevention services they need

LWorks Sentinel platform ingests ledger data in real-time, applying a rich set of security event and incident detection rules at scale. These rules include not just active sensors but forward chaining rules to conduct automated real-time investigations based on anomaly detection. Customers can call the API prior to signing a transaction for simulation based risk assessments, or monitor the resulting ledger transactions for activity alerts and anomaly detection

‍Addressing key threats experienced by:

  • DeFi Protocols and related Crypto Native Companies
  • Exchanges, Gaming and Gambling entities
  • Corporate customers protecting key assets and accounts

‍LWorks’s comprehensive preventative APIs and real time threat detection, not only detects a potential attack, but initiates in real time a set of automated forward chained assessments to rapidly determine the appropriate response. For example, a large loan request might not be a high risk event on its own, but when viewed in the context of the requesting account, source and history of the collateral, and other risk factors; the loan request may be clearly malicious.

Try out our Preventative API
to screen an account

Enter an address to run a risk assessment on that target address. We'll automatically capture a variety of current and historical on-chain data, and leverage our risk algorithms to provide you with a measure of relative transaction risks associated with this address.

Contact Us for a Demo