Skip to main content
All CollectionsAdvanced SecurityCommon Questions
What does Harpie Advanced Security protect me from?
What does Harpie Advanced Security protect me from?
Jorge Aquino avatar
Written by Jorge Aquino
Updated over a year ago

Harpie is dedicated to fortifying your digital assets against a multitude of sophisticated cyber threats. This detailed overview will explore the specific threats Harpie guards against.

1. Frontend Attacks

Frontend attacks represent a significant threat in the cyber landscape, with the Curve.fi incident serving as a stark reminder. Here, attackers manipulated a reputable website to misdirect users into compromising transactions.

  • Nature of the Attack: Cybercriminals exploit vulnerabilities within trusted websites.

  • User Impact: Users are deceived into executing transactions that divert funds to the attacker.

2. Phishing/Impersonations

Phishing and impersonation attacks leverage the trust between established entities and their users. The OpenSea phishing debacle, which led to losses over $1.7 million, highlights the efficacy of such schemes.

  • Attack Strategy: Attackers impersonate reputable sources to disseminate malicious links.

  • Consequence for Users: Victims are tricked into engaging with harmful smart contracts.

3. Fake Site Scams

Fake site scams utilize professionally designed websites to lull victims into a false sense of security, leading to engagement with harmful contracts or the surrender of private keys.

  • Scam Methodology: Convincing websites prompt users to engage with malicious elements.

  • Risk to Users: Users are enticed into compromising their asset security.

4. Private Key Theft

Though the landscape is shifting towards contract-based attacks, the theft of private keys remains a potent danger, offering attackers complete control over a wallet. Harpie can defend against private key theft but cannot help in the event that key theft has already occurred.

  • Attack Implications: Full unauthorized access to the wallet's contents.

5. Accidental Transfers

A simple mistake can lead to irreversible asset loss.

  • Common Errors: Typos in Ethereum addresses during transfers or confusing one protocol for another.

Understanding Harpie's Limitations

Despite Harpie's extensive security measures, certain scenarios exist where these defenses might be circumvented. Our commitment to transparency is reflected in our "Disclosures & Risks" section, which outlines:

  • Security Boundaries: Instances where Harpie's protections may not suffice.

  • Informed Decision-Making: Encouraging users to stay abreast of potential vulnerabilities.

No security product is comprehensive, so for the sake of transparency, we've included info on our limitations in Disclosures & Risks.

Did this answer your question?