6. Anti-Phishing and Drainer Protection

A built-in verification engine analyzes every contract interaction before a transaction is signed.

  • Detects suspicious approvals, excessive permissions, and malicious bytecode.

  • Compares target contract addresses against a continuously updated internal blacklist of known drainers.

  • Verifies token authenticity by checking against verified contract registries.

  • Displays a clear risk rating (Low / Medium / High) before signature confirmation.

  • Optionally enforces a transaction delay for high-risk actions, allowing user cancellation.

The protection engine reduces the chance of asset loss due to deceptive or malicious contract calls.

Last updated