Contract Hash Verification
Behavior
Listens for UPGRADED events from proxy contracts.
Fetches implementation bytecode and computes hash.
Compares against configured expected hashes.
Supports initial checks and real-time monitoring.
Use cases
Proxy Security: Ensure only authorized contract upgrades are deployed, preventing malicious code injection in upgradeable contracts.
Multi-sig Governance: Verify that DAO-approved contract upgrades match the intended implementation before execution.
Audit Trail: Maintain cryptographic proof of contract versions for compliance and security audits.
Detector Configuration
Name - Enter a descriptive name for your monitor, for example: "Contract Hash Verification".
Hash Type - Choose the hashing algorithm you want to use for verification:
KeccakSHA256
Contract Bytecode Checksum - Enter the known, trusted hash value that the current bytecode should match.
Initial Check - Choose whether you want an immediate verification when the detector is created.

Alert example

Last updated
Was this helpful?