On-Chain Compliance Sentinel
Live event listener on contracts + rule engine + EAS attestation on every block
POST /v1/sentinel/statusThe Problem
DeFi protocols, prediction markets, and custodians face regulatory exposure from on-chain behaviors they didn't design for: privilege concentration in a single EOA, proxy upgrades without timelocks, open EAS attestation schemas exploitable for Sybil attacks. Post-facto forensic tools (Chainalysis) identify these only after regulatory scrutiny begins.
The Solution
SL-5 runs a persistent event listener on your contracts. Every block, the rule engine evaluates emitted events against a growing corpus of compliance rules (EEA EthTrust v3 + solodit 8,000+ findings + DefiLlama 513-hack ground truth). Clean blocks produce EAS on-chain attestations — a cryptographically-signed compliance receipt that regulators, insurers, and institutional partners can verify.
How It Works
viem event scanner listens to client contract addresses on Base, Ethereum, Polygon
Each emitted event evaluated against rule corpus (OwnershipTransferred, Upgraded, RoleGranted, etc.)
Violations generate VIOLATION/WARNING findings with EEA EthTrust SWC classification
Clean-block EAS attestation signed by AWS KMS-backed attester key (private key never leaves HSM)
Dashboard + webhook alerts; audit export for SOC2 and regulatory review
Who Uses It
Why Not Chainalysis / Elliptic / Generic Tools?
No competitor combines live event scanning + rule engine + on-chain EAS attestation in a single product. The EAS attestation is the moat: it creates a cryptographically-verifiable compliance history that post-facto analytics cannot replicate.
Ready to deploy SL-5?
Book a 30-minute technical demo. We'll walk through the API, discuss your compliance requirements, and scope an integration.
Book Technical Demo