Introduction
Harpie 2FA protects you from phishing by adding an additional layer of email verification before your transactions get sent to the blockchain.
When Harpie 2FA is enabled, we run each of your transactions through a rigorous security scan; if anything looks fishy, we'll notify you and pause the transaction.
Here's how it works:
Transaction Scans: Each transaction is thoroughly scanned for security threats.
Alerts: If a transaction seems suspicious, Harpie alerts you and halts the process.
Wallet Integration: The 2FA system works with your current wallet without any need for extra downloads.
Notification Process: You'll receive an email to confirm any transaction that Harpie flags as potentially harmful, adding a protective pause that could prevent phishing scams.
Definition of Risk: High-risk transactions typically involve token transfers, approvals, or contracts that could result in financial loss. These may include interactions with known phishing entities, suspicious contracts, or wallets associated with cybercrime.
What is a "dangerous transaction"?
Harpie categorizes dangerous transactions as those that can lose you money. These generally are approvals
and transfers
of tokens and ETH, and interactions with the following parties:
Bots
Phishing accounts
Honeypot contracts
Wallets linked to cybercrime