Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions docs/pages/monitoring/tools.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -105,6 +105,18 @@ serverless functions that run on Tenderly's infrastructure). The CLI and SDKs ar
- **Website:** [tenderly.co](https://tenderly.co)
- **GitHub:** [Tenderly](https://github.com/Tenderly) (CLI, SDKs, framework plugins)

### TxScope

Pre-signing transaction threat scanner for Solana multisigs. Monitors Squads Protocol vaults for pending proposals,
simulates each transaction against mainnet via Helius RPC, and generates plain-language threat reports before any
signer approves. Detection modules cover durable nonces, authority and admin transfers, withdrawal guard
manipulation, known attack pattern matching, instruction-level trace and decode, proposer history and anomaly
detection, and risk scoring (0–100). Free for on-demand scans; paid tiers for continuous monitoring with Telegram
and Slack alerts.

- **Chains:** Solana
- **Website:** [txscope.com](https://txscope.com)

## Reliability Considerations

Your monitoring system is only effective if it is itself reliable. Before committing to a tooling setup, evaluate
Expand Down
4 changes: 4 additions & 0 deletions docs/pages/wallet-security/tools-and-resources.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,10 @@ Implement continuous monitoring to detect unauthorized or suspicious activity on
- Connect to Telegram for notifications
- Monitor for suspicious delegateCall transactions

### Solana Multisig Monitoring

- **[TxScope](https://txscope.com)**: Pre-signing threat scanner for Solana Squads multisigs. Simulates pending proposals against mainnet state and generates plain-language threat reports with risk scoring, durable nonce detection, authority transfer alerts, and known attack pattern matching.

### Network Security

For dedicated signing machines, implement network-level protections:
Expand Down
Loading