Security

1inch’s internal blockchain security team

1inch Network-photo

by 1inch Network

• 2 min read

In our previous post, we discussed how public blocklists are integrated into 1inch Security. Today, we'll explain how the 1inch security team operates to safeguard 1inch users, products and services.

The internal blockchain security team is essential to 1inch’s blocklist database, which spreads over 1inch products, such as the 1inch dApp, the 1inch Wallet and the 1inch Developer Portal infrastructure. By effectively blocklisting addresses linked to suspicious or confirmed illegal activities, the team makes 1inch products, as well as users’ interaction with them, more secure.

1inch’s blockchain security team features professionals with extensive relevant experience. Meanwhile, external Web3 threat prevention teams solving runtime problems by investigating off- and on-chain 24/7, as well as the wider crypto community, play a crucial role in maintaining the integrity of 1inch’s blocklist database.

1inch’s blockchain security team diligently monitors blockchain transactions to spot suspicious activities. Employing advanced analytics and forensic tools, they analyze transaction patterns to uncover potential illicit activities such as money laundering, fraud, or the financing of illegal operations. They also work on front-end monitoring to prevent DNS spoofing and other types of attacks against the 1inch user community.

The team’s members actively deploy screening tools to identify risks based on the activities of specific addresses - for instance, when an address exhibits unusual behavior or actions characteristic of money laundering.

1inch’s blockchain investigation team features experienced professionals, such as Caleb Rippey.

“My experience originates from exploring 1inch related support cases using Etherscan and other tools,” Caleb says.

The tools Caleb uses include blockchain explorers such as Blockscan, as well as tools like Arkham for address labeling. 

“Tools like MetaSuites, MetaSleuth and BlockSec are good for tracing connected wallets based on transfers and contract interactions,” he explains. “Dedaub, EVM Codes and evm.monster are great tools, as well.”

The 1inch security team uses tools from Chainalysis, TRM Labs and Blockaid, as well as blockchain analytics from other external investigation teams to detect and fight exploits or other illicit use in Web3. That results in constantly upgrading the 1inch internal blocklist, escalating the incident procedure, conducting intel and education, organizing training/ war-room exercises and ongoing threat assessments.

Meanwhile, if you want a reliable solution for blocking problematic addresses, consider the 1inch Shield API.

Stay tuned for more on 1inch’s security features!

1inch Network-photo

1inch Network

Share the article

Copy done!
Copy done!