-
Notifications
You must be signed in to change notification settings - Fork 5
Blowfish risk analysis
Yosif Hamed edited this page Jan 5, 2024
·
3 revisions
Things they provide that we dont have: Domain analysis
TL:DR:
-
risk score between 0 and 1
-
who the dapp is impersonating
[
{
"domain": "magicedennss.it",
"status": "PROCESSED",
"riskScore": 1,
"labels": [
"copy_cat=Magic+Eden%3Amagiceden.io",
"source=blowfish_blocklist"
],
"warnings": [
{
"kind": "TRUSTED_BLOCKLIST_DOMAIN",
"message": "Domain found on blocklists maintained by: Blowfish. This website is very likely to be a scam.",
"severity": "CRITICAL"
},
{
"kind": "COPY_CAT_DOMAIN",
"message": "If you were intending to visit Magic Eden (magiceden.io), please be aware that this is not their official website.",
"severity": "WARNING"
}
]
},
{
"domain": "1nich.com",
"status": "PROCESSED",
"riskScore": 0.5,
"labels": [
"source=metamask_blocklist",
"source=phishfort_blocklist",
"warning[all]=BLOCKLISTED_DOMAIN_CROSS_ORIGIN"
],
"warnings": [
{
"kind": "SEMI_TRUSTED_BLOCKLIST_DOMAIN",
"message": "Domain found on blocklists maintained by: Metamask, Phishfort. This website is very likely to be a scam.",
"severity": "WARNING"
}
]
},
{
"domain": "opensea.io",
"status": "PROCESSED",
"riskScore": 0,
"labels": [
"blockchain=ethereum",
"source=blowfish_whitelist",
"source=brand_whitelist",
"source=defi_llama_whitelist",
"source=metamask_whitelist"
],
"warnings": []
}
]
Blocklist:
- maintained list of malicious dapps, GETable by clients
Simulation of historical transaction
TL;DR
in: ixId and signer account
out:
- mapping EAO/ACCOUNT=>{human readable,moved asset, balance before and after,}[]
"aggregated": {
"expectedStateChanges": {
"0x7e2a2fa2a064f693f0a55c5639476d913ff12d05": [
{
"humanReadableDiff": "Receive 0.03926 ETH",
"rawInfo": {
"kind": "NATIVE_ASSET_TRANSFER",
"data": {
"amount": {
"before": "51503296330227780602",
"after": "51542553269728235275"
},
"counterparty": {
"kind": "ACCOUNT",
"address": "0x95222290dd7278aa3ddd389cc1e1d165cc4bafe5"
},
"asset": {
"address": "0xeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee",
"symbol": "ETH",
"name": "Ether",
"decimals": 18,
"verified": true,
"imageUrl": "https://d1ts37qlq4uz4s.cloudfront.net/evm__evm%3A%3Aethereum__evm%3A%3Aethereum%3A%3Amainnet__0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2.png",
"price": null
}
}
}
}
],
"0x95222290dd7278aa3ddd389cc1e1d165cc4bafe5": [
{
"humanReadableDiff": "Send 0.03926 ETH",
"rawInfo": {
"kind": "NATIVE_ASSET_TRANSFER",
"data": {
"amount": {
"before": "16326569183675303132",
"after": "16287312244174848459"
},
"counterparty": {
"kind": "ACCOUNT",
"address": "0x7e2a2fa2a064f693f0a55c5639476d913ff12d05"
},
"asset": {
"address": "0xeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee",
"symbol": "ETH",
"name": "Ether",
"decimals": 18,
"verified": true,
"imageUrl": "https://d1ts37qlq4uz4s.cloudfront.net/evm__evm%3A%3Aethereum__evm%3A%3Aethereum%3A%3Amainnet__0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2.png",
"price": null
}
}
}
}
]
},
"error": null,
"userAccount": "0x95222290dd7278aa3ddd389cc1e1d165cc4bafe5"
},
"perTransaction": [
{
"error": null,
"gas": {
"gasLimit": "21000"
},
"protocol": null,
"logs": [],
"decodedLogs": [],
"decodedCalldata": null
}
],
"requestId": "26fac74ae898bc8401fb55fdae918747"
}