changelog

changelog

We’ve added a new section to the settings page called "Security Portal". On this page you can configure your organization’s public-facing security portal (ex. https://app.chainpatrol.io/morpho).

You can configure the visibility of your portal with three options:

  • Disabled - not visible to anyone (shows 404 page)

  • Private - visible only to authed org members

  • Public - visible to anyone with the link

If you’re interested in more options to configure or have feedback on the security portal use-case, please reach out to us at [email protected].

We’ve added a new section to the settings page called "Security Portal". On this page you can configure your organization’s public-facing security portal (ex. https://app.chainpatrol.io/morpho).

You can configure the visibility of your portal with three options:

  • Disabled - not visible to anyone (shows 404 page)

  • Private - visible only to authed org members

  • Public - visible to anyone with the link

If you’re interested in more options to configure or have feedback on the security portal use-case, please reach out to us at [email protected].

We’ve added a new section to the settings page called "Security Portal". On this page you can configure your organization’s public-facing security portal (ex. https://app.chainpatrol.io/morpho).

You can configure the visibility of your portal with three options:

  • Disabled - not visible to anyone (shows 404 page)

  • Private - visible only to authed org members

  • Public - visible to anyone with the link

If you’re interested in more options to configure or have feedback on the security portal use-case, please reach out to us at [email protected].

We now leverage the Telegram API to retrieve metadata about Telegram channels and profiles for our asset scans. This new approach to scans for Telegram assets allows us to view historical data of threats on Telegram and run rules against persisted data vs. performing several requests to Telegram for metadata.

We’re continuing to evolve our threat detection and scanning capabilities for the most commonly abused asset types including websites, Twitter, YouTube, and now Telegram too!

We now leverage the Telegram API to retrieve metadata about Telegram channels and profiles for our asset scans. This new approach to scans for Telegram assets allows us to view historical data of threats on Telegram and run rules against persisted data vs. performing several requests to Telegram for metadata.

We’re continuing to evolve our threat detection and scanning capabilities for the most commonly abused asset types including websites, Twitter, YouTube, and now Telegram too!

We now leverage the Telegram API to retrieve metadata about Telegram channels and profiles for our asset scans. This new approach to scans for Telegram assets allows us to view historical data of threats on Telegram and run rules against persisted data vs. performing several requests to Telegram for metadata.

We’re continuing to evolve our threat detection and scanning capabilities for the most commonly abused asset types including websites, Twitter, YouTube, and now Telegram too!

For organizations which are still evaluating ChainPatrol and only have the Threat Reporting/Monitoring service enabled, we will now automatically mark reports that are reviewed by our staff or automation to have a “pending” status. When Wallet Blocking is subsequently enabled, we will process all pending assets and update their statuses in our global blocklist. This change enables organizations to get a better picture of ChainPatrol’s threat detection engine, especially when evaluating performance against existing or alternative brand protection providers.

For organizations which are still evaluating ChainPatrol and only have the Threat Reporting/Monitoring service enabled, we will now automatically mark reports that are reviewed by our staff or automation to have a “pending” status. When Wallet Blocking is subsequently enabled, we will process all pending assets and update their statuses in our global blocklist. This change enables organizations to get a better picture of ChainPatrol’s threat detection engine, especially when evaluating performance against existing or alternative brand protection providers.

For organizations which are still evaluating ChainPatrol and only have the Threat Reporting/Monitoring service enabled, we will now automatically mark reports that are reviewed by our staff or automation to have a “pending” status. When Wallet Blocking is subsequently enabled, we will process all pending assets and update their statuses in our global blocklist. This change enables organizations to get a better picture of ChainPatrol’s threat detection engine, especially when evaluating performance against existing or alternative brand protection providers.

Our detection rules work best when we can provide the algorithms with sufficient and accurate information about your brand. So as part of our customer success efforts, we’re shipping some new features to track better information about your organization:

  • Organization brand images - Adds a new section in the Settings page to upload PNG and JPEG images for your brand assets. Upload logo variations, symbols, mascots, and icons to improve our brand recognition algorithms.

  • Organization description - Adds a new field on the organization settings page to write a short description of your organization. This context is provided to our AI-based brand protection rules to tailor detection towards concepts that are relevant to your brand (ex. a DeFi protocol that is deployed on multiple chains like Linea or zkSync might be targeted by scams mentioning these L2 chains)

  • Display organization on report - Every report now requires an organization and we now display which organization a report was created for. This change allows us to provide better brand detection algorithms that use the organization metadata you’ve provided us.

Over the coming weeks, we’ll be populating these new organization metadata fields for your organization based on publicly available information in order to make our systems more accurate and useful for your team.

Our detection rules work best when we can provide the algorithms with sufficient and accurate information about your brand. So as part of our customer success efforts, we’re shipping some new features to track better information about your organization:

  • Organization brand images - Adds a new section in the Settings page to upload PNG and JPEG images for your brand assets. Upload logo variations, symbols, mascots, and icons to improve our brand recognition algorithms.

  • Organization description - Adds a new field on the organization settings page to write a short description of your organization. This context is provided to our AI-based brand protection rules to tailor detection towards concepts that are relevant to your brand (ex. a DeFi protocol that is deployed on multiple chains like Linea or zkSync might be targeted by scams mentioning these L2 chains)

  • Display organization on report - Every report now requires an organization and we now display which organization a report was created for. This change allows us to provide better brand detection algorithms that use the organization metadata you’ve provided us.

Over the coming weeks, we’ll be populating these new organization metadata fields for your organization based on publicly available information in order to make our systems more accurate and useful for your team.

Our detection rules work best when we can provide the algorithms with sufficient and accurate information about your brand. So as part of our customer success efforts, we’re shipping some new features to track better information about your organization:

  • Organization brand images - Adds a new section in the Settings page to upload PNG and JPEG images for your brand assets. Upload logo variations, symbols, mascots, and icons to improve our brand recognition algorithms.

  • Organization description - Adds a new field on the organization settings page to write a short description of your organization. This context is provided to our AI-based brand protection rules to tailor detection towards concepts that are relevant to your brand (ex. a DeFi protocol that is deployed on multiple chains like Linea or zkSync might be targeted by scams mentioning these L2 chains)

  • Display organization on report - Every report now requires an organization and we now display which organization a report was created for. This change allows us to provide better brand detection algorithms that use the organization metadata you’ve provided us.

Over the coming weeks, we’ll be populating these new organization metadata fields for your organization based on publicly available information in order to make our systems more accurate and useful for your team.

Twitter impersonators are on the rise and we’re working on combatting this problem with AI and automation. We’ve added a new threat detection rule that checks if a Twitter profile is trying to impersonate your organization by comparing the Twitter profile’s name, username, bio, and recent tweet history to your organization’s brand assets and logo. We automatically blocklist these profiles and submit takedowns to Twitter on your behalf with provided legal documentation.

Twitter impersonators are on the rise and we’re working on combatting this problem with AI and automation. We’ve added a new threat detection rule that checks if a Twitter profile is trying to impersonate your organization by comparing the Twitter profile’s name, username, bio, and recent tweet history to your organization’s brand assets and logo. We automatically blocklist these profiles and submit takedowns to Twitter on your behalf with provided legal documentation.

Twitter impersonators are on the rise and we’re working on combatting this problem with AI and automation. We’ve added a new threat detection rule that checks if a Twitter profile is trying to impersonate your organization by comparing the Twitter profile’s name, username, bio, and recent tweet history to your organization’s brand assets and logo. We automatically blocklist these profiles and submit takedowns to Twitter on your behalf with provided legal documentation.

Feb 8, 2024

If you have a Slack workspace, you can use the ChainPatrol Slack Bot to let your workspace members submit scam reports to ChainPatrol. The bot will generate new reports that get sent to your admin dashboard for review.

Run /chainpatrol <url> in any channel or simply right-click on a message and select More message actions > Create Report (ChainPatrol) to start a new report and fill in the necessary details to describe the suspicious URL to report.

Check out our docs for more information on how to set up the Slack bot for your organization: https://chainpatrol.io/docs/bots/slack-bot

If you have a Slack workspace, you can use the ChainPatrol Slack Bot to let your workspace members submit scam reports to ChainPatrol. The bot will generate new reports that get sent to your admin dashboard for review.

Run /chainpatrol <url> in any channel or simply right-click on a message and select More message actions > Create Report (ChainPatrol) to start a new report and fill in the necessary details to describe the suspicious URL to report.

Check out our docs for more information on how to set up the Slack bot for your organization: https://chainpatrol.io/docs/bots/slack-bot

If you have a Slack workspace, you can use the ChainPatrol Slack Bot to let your workspace members submit scam reports to ChainPatrol. The bot will generate new reports that get sent to your admin dashboard for review.

Run /chainpatrol <url> in any channel or simply right-click on a message and select More message actions > Create Report (ChainPatrol) to start a new report and fill in the necessary details to describe the suspicious URL to report.

Check out our docs for more information on how to set up the Slack bot for your organization: https://chainpatrol.io/docs/bots/slack-bot

We've added a new “Integrations” section to the settings page. With a few clicks you can now install the ChainPatrol Slack and Discord bots. Soon we will be adding the ability to manage these first-party integrations on this page as well for better control of access to your account, as well as tools to diagnose errors with your integrations.

We've added a new “Integrations” section to the settings page. With a few clicks you can now install the ChainPatrol Slack and Discord bots. Soon we will be adding the ability to manage these first-party integrations on this page as well for better control of access to your account, as well as tools to diagnose errors with your integrations.

We've added a new “Integrations” section to the settings page. With a few clicks you can now install the ChainPatrol Slack and Discord bots. Soon we will be adding the ability to manage these first-party integrations on this page as well for better control of access to your account, as well as tools to diagnose errors with your integrations.

We’re happy to share that we’ve added two new rules for YouTube channels reported to our platform:

  • YouTube Channel Name Similarity - compares the channel name to your organization’s official YouTube channels and brand name

  • AI-powered YouTube Impersonation - performs a LLM-based query about the metadata related to the suspicious YouTube channel to look for signs of impersonation

YouTube is a growing hotbed of scams and impersonators that we’re actively monitoring for our customers. With new rules, we’re providing more context to our automated systems to make determinations of malicious intent faster and with greater auditability.

We’re happy to share that we’ve added two new rules for YouTube channels reported to our platform:

  • YouTube Channel Name Similarity - compares the channel name to your organization’s official YouTube channels and brand name

  • AI-powered YouTube Impersonation - performs a LLM-based query about the metadata related to the suspicious YouTube channel to look for signs of impersonation

YouTube is a growing hotbed of scams and impersonators that we’re actively monitoring for our customers. With new rules, we’re providing more context to our automated systems to make determinations of malicious intent faster and with greater auditability.

We’re happy to share that we’ve added two new rules for YouTube channels reported to our platform:

  • YouTube Channel Name Similarity - compares the channel name to your organization’s official YouTube channels and brand name

  • AI-powered YouTube Impersonation - performs a LLM-based query about the metadata related to the suspicious YouTube channel to look for signs of impersonation

YouTube is a growing hotbed of scams and impersonators that we’re actively monitoring for our customers. With new rules, we’re providing more context to our automated systems to make determinations of malicious intent faster and with greater auditability.

Load More