Aegis
  • Introduction
    • Who is Aegis for?
    • How to start using Aegis?
    • How does Aegis work?
      • Supported networks
      • Findings
      • Categorizing your monitored address
      • Backtesting
        • Performing a backtest
      • Smart contract analysis
      • Allowances
  • Add a monitored address
    • Bulk import addresses
  • Add a notification channel
    • Add an email notification channel
    • Add a Slack notification channel
      • Anatomy of your Slack notification
    • Add a Telegram notification channel
      • Anatomy of your Telegram notification
    • Add an SMS notification channel
    • Add a Discord notification channel
      • Anatomy of your Discord notification
    • Webhooks
  • Triggers
    • Trigger Types compatibility matrix
    • Potential Risks
      • Risk Types
      • Risk Levels
      • Retention of Aegis Findings
    • Events
      • Event Listening: Use cases
    • Function Calls
      • Function Call Monitoring: Use Cases
    • The difference between Events and Function Calls
    • Value triggers
      • Transfer Threshold Monitoring: Use Cases
      • Total-Value-Locked (TVL) Monitoring: Use Cases
      • Token Mint Monitoring: Use Cases
    • Wallet Activity
  • Add an alert
    • Alert management
    • Notification limits solutions
  • Panic Button
    • Add a Panic Button
    • How does the Panic Button work?
  • Interact with your smart contract
  • Teams
  • API
  • Aegis dApp
    • Token risk analysis
  • Firewall
  • Pricing
    • LSS Boost
    • Aegis Limitless
    • Aegis Pulse
  • Glossary
  • Release notes
Powered by GitBook
On this page
  1. Triggers

Potential Risks

PreviousTrigger Types compatibility matrixNextRisk Types

Last updated 1 year ago

These triggers are associated with on-chain events that Aegis' advanced AI system detects and recognises as a potential security vulnerability. Alerts may be issued based on a certain Risk Type or an automatically-generated Risk Score.

You will start seeing all the detected potential risks in the Findings table on your Dashboard and in your monitored address overview screen. These findings can be used to trigger alerts based on risk type and risk level (severity).

Each finding includes the following data:

  • Transaction hash

  • Monitored address

  • Mined at

  • Chain (on Dashboard)

  • Severity

  • Warnings (see )

  • Suspicious addresses (on expand)

Suspicious addresses are the addresses that triggered the transaction that was detected as potentially risky.

Risk Types