Start catching threats the moment they form in a mempool, not hours later. With Forta, you can stand up live on-chain monitoring in minutes and wire alerts into the tools your team already uses. Begin in the Explorer by selecting the networks you care about and subscribing to relevant alert feeds (attacks, anomalies, governance changes, liquidity movements). Point notifications to Slack, PagerDuty, email, or your SIEM via webhook. Set severity thresholds and tags so the right people are paged only when impact is likely. Use the Alerts API to enrich events with internal metadata, then drive playbooks—like pausing minting, raising rate limits, or freezing specific contract roles—based on alert context.
Developers can build custom detectors (“bots”) to watch for patterns unique to their protocol. Using the Forta SDK (JavaScript or Python), scan new blocks, transactions, and traces for signals: abnormal approvals, unexpected delegatecalls, governance proposal edits, bridge inflow spikes, or oracle deviation beyond tolerance. Test locally against historical data, simulate edge cases, then publish to the registry. Stake FORT to activate and signal confidence, define alert types and severity, and include runbook links for responders. Combine multiple bots into a pipeline—one labels suspicious entities, another confirms behavior across a window of time—to reduce noise. If you need auto-response, have alerts trigger safe scripted actions via your guardian contract or multisig after human confirmation. more
Comments