Welcome to the last development update of this year from our technical team. We believe you’ll agree that this year was very productive — we successfully launched our hack mitigation protocol and Aegis to monitor smart contracts. We also released our Token Relaunch Toolkit to ease the process of token redeployment. Our tools underwent upgrades as well as facelifts.
We have one more portion of info to share with you to close 2022. Let’s begin.
Aegis
We’ve released multiple new features. The launch of smart contract monitoring was not the ultimate goal. This is what we’ve built:
Improving the tool is crucial so now you can enjoy:
- SMS notifications about engagements with your smart contracts next to Telegram, Slack, and other types of notifications.
- Backtesting. A feature to help you go back in time and see if your smart contracts were ever attacked.
- Added support for Elysium (powered by Vulcan Forged) and Fantom chains.
- Multifactor authentication was added.
- Improved notifications to show more info about suspicious transactions.
- User invitation flow improved to allow selecting roles before the invited user is registered.
- Small quality-of-life improvements were made.
- We also fixed email deliverability issues.
Facelifts
You can now use our Token Minter and Hack Mitigation Platform in a much more convenient way. Both these products were upgraded design-wise:
What’s next
These Aegis improvements are not the last ones you’ll see. Our team is already working on the next developments, such as tracking user-selected events, TVL tracking, $LSS integration as a payment method, and more. As always, stay tuned for more!
About Lossless
Restoring trust in web3 security. Lossless incorporates a new layer of blockchain transaction security, protecting projects and their communities from malicious exploits and associated financial loss.
Lossless protocol implements an additional layer of blockchain transaction security for ERC-20 standard tokens, mitigating the financial impact of smart contract exploits and private key theft. Lossless protocol utilizes community-driven threat identification tools and a unique stake-based reporting system to identify suspicious transactions, providing real-time protection.
Twitter | Platform | Telegram | Discord | Website | Documentation | Github