Contract Hash Verification
Verify that upgraded proxy contract implementations match expected bytecode hashes, preventing malicious upgrades and ensuring code integrity.
Behavior
Listens for UPGRADED events from proxy contracts.
Fetches implementation bytecode and computes hash.
Compares against configured expected hashes.
Supports initial checks and real-time monitoring.
Use cases
Proxy Security: Ensure only authorized contract upgrades are deployed, preventing malicious code injection in upgradeable contracts.
Multi-sig Governance: Verify that DAO-approved contract upgrades match the intended implementation before execution.
Audit Trail: Maintain cryptographic proof of contract versions for compliance and security audits.
Detector Configuration
Name - Enter a descriptive name for your monitor, for example: "Contract Hash Verification".
Hash Type - Choose the hashing algorithm you want to use for verification:
KeccakSHA256
Contract Bytecode Checksum - Enter the known, trusted hash value that the current bytecode should match.
Initial Check - Choose whether you want an immediate verification when the detector is created.

Alert example

Last updated
Was this helpful?