How ShieldAI Protects Your Wallet

ShieldAI intercepts malicious blockchain transactions before your wallet signs them — combining bytecode analysis, transaction simulation, and real-time threat intelligence into a single risk score.

ShieldAI operates at the transaction layer, not the URL layer. It intercepts eth_sendTransaction in the browser's page context before your wallet ever receives the signature request.

What ShieldAI Does

ShieldAI is a Chrome browser extension that acts as a transaction firewall for Web3 wallets. Every time you initiate a transaction on a DApp — a swap, a token purchase, an NFT mint — ShieldAI intercepts it before your wallet receives the signature request.

The transaction is scored for risk using four data sources in parallel: contract bytecode fingerprinting, deployer wallet history, Tenderly pre-execution simulation, and GoPlus Security threat intelligence. The result is a ShieldScore (0–100) with a plain-English explanation of any threats found.

ShieldScore — How Risk Is Rated

Every transaction receives a ShieldScore before you sign it:

ScoreVerdictAction
0 – 30SAFETransaction proceeds with asset delta preview
31 – 49CAUTIONWarning shown — you choose to proceed or cancel
50 – 70HIGH RISKStrong warning with threat details
71 – 100BLOCK RECOMMENDEDHighest-risk verdict — blocking is strongly recommended

Wallet Drainer Protection

A wallet drainer is a malicious smart contract that exploits ERC-20 approval functions or EIP-712 permit signatures to transfer all tokens from a wallet in a single transaction. Standard browser phishing warnings cannot detect these because they operate at the URL layer — the attack happens at the transaction layer.

ShieldAI stops wallet drainers by:

Honeypot Detection

A honeypot token allows users to buy but contains hidden code that blocks all sell transactions. The token appears to have liquidity and price action, but holders can never exit.

ShieldAI detects honeypots by fingerprinting the contract's compiled bytecode against a database of known honeypot patterns — even for unverified contracts that have not been published or audited on a block explorer. The bytecode check runs before you sign any transaction involving the contract.

Pre-Sign Transaction Simulation

When you initiate a transaction, ShieldAI sends it to Tenderly for simulation on a forked chain state. Tenderly executes the transaction in a sandbox environment and returns the exact tokens and amounts that would leave or enter your wallet.

ShieldAI displays this asset delta before the wallet signature dialog appears. For example: "You will send 2.5 BNB and receive 10,000 TOKEN." If the simulation shows unexpected asset loss, the transaction is flagged HIGH RISK or BLOCK.

ShieldAI vs. Browser Phishing Warnings

Browser built-in warnings

  • Operate at the URL / domain layer
  • Cannot inspect transaction data
  • Do not analyze smart contract code
  • Cannot simulate asset loss before signing
  • Miss all on-chain attacks on legitimate sites

ShieldAI Transaction Firewall

  • Intercepts at eth_sendTransaction
  • Analyzes contract bytecode for honeypot/rug patterns
  • Simulates exact asset delta via Tenderly before signing
  • Scores deployer wallet history across all past deployments
  • Blocks malicious permit2 and approval signature requests

What Data ShieldAI Collects

ShieldAI collects the minimum data required to perform a security scan: the transaction's recipient address, sender address, value, calldata, chainId, and any EIP-712 typed data. This data is sent to the ShieldAI API over HTTPS for risk analysis.

Full privacy policy: shieldbotsecurity.online/privacy.html

Wallet & Chain Compatibility

ShieldAI hooks into the browser's window.ethereum provider at page load, compatible with:

Chains supported: BNB Chain, opBNB, Ethereum, Base, Arbitrum, Polygon, Optimism.

The hook is injected into the page's MAIN world before any DApp code runs — contracts cannot detect or remove it from within a transaction.