diff --git a/docs/pages/monitoring/tools.mdx b/docs/pages/monitoring/tools.mdx index eb2f62a0..f360a5cd 100644 --- a/docs/pages/monitoring/tools.mdx +++ b/docs/pages/monitoring/tools.mdx @@ -105,6 +105,18 @@ serverless functions that run on Tenderly's infrastructure). The CLI and SDKs ar - **Website:** [tenderly.co](https://tenderly.co) - **GitHub:** [Tenderly](https://github.com/Tenderly) (CLI, SDKs, framework plugins) +### TxScope + +Pre-signing transaction threat scanner for Solana multisigs. Monitors Squads Protocol vaults for pending proposals, +simulates each transaction against mainnet via Helius RPC, and generates plain-language threat reports before any +signer approves. Detection modules cover durable nonces, authority and admin transfers, withdrawal guard +manipulation, known attack pattern matching, instruction-level trace and decode, proposer history and anomaly +detection, and risk scoring (0–100). Free for on-demand scans; paid tiers for continuous monitoring with Telegram +and Slack alerts. + +- **Chains:** Solana +- **Website:** [txscope.com](https://txscope.com) + ## Reliability Considerations Your monitoring system is only effective if it is itself reliable. Before committing to a tooling setup, evaluate diff --git a/docs/pages/wallet-security/tools-and-resources.mdx b/docs/pages/wallet-security/tools-and-resources.mdx index e856745b..32624c25 100644 --- a/docs/pages/wallet-security/tools-and-resources.mdx +++ b/docs/pages/wallet-security/tools-and-resources.mdx @@ -84,6 +84,10 @@ Implement continuous monitoring to detect unauthorized or suspicious activity on - Connect to Telegram for notifications - Monitor for suspicious delegateCall transactions +### Solana Multisig Monitoring + +- **[TxScope](https://txscope.com)**: Pre-signing threat scanner for Solana Squads multisigs. Simulates pending proposals against mainnet state and generates plain-language threat reports with risk scoring, durable nonce detection, authority transfer alerts, and known attack pattern matching. + ### Network Security For dedicated signing machines, implement network-level protections: