Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Early AD - True Positive list fetching #655

Open
wants to merge 21 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from 20 commits
Commits
Show all changes
21 commits
Select commit Hold shift + click to select a range
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions early-attack-detector-py/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ ENV NODE_ENV=production
LABEL "network.forta.settings.agent-logs.enable"="true"
WORKDIR /app
COPY ./src ./src
COPY ./tp_list.csv ./
COPY ./deployed_models ./deployed_models
COPY package*.json ./
COPY requirements.txt ./
Expand Down
1 change: 1 addition & 0 deletions early-attack-detector-py/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -79,6 +79,7 @@ The metadata for each alert will contain the following fields:
- funding_labels: [optional] When there are potential fundings, the hash(es) to the funding label(s)
- model_score: Model score. In case where the alert was raised due to the high precision model, the score will be from the high precision model.
- model_threshold: Recall threshold that was being used in the model at the moment of raising the alert
- known_past_attacker: [optional] When the transaction initiator is found to be a known past attacker, (i.e. associated with a public disclosed attack in the past) this value will be set to `"True"`.
- oko_contract_explorer: Link to contract explorer

Example of high precision model:
Expand Down
108 changes: 61 additions & 47 deletions early-attack-detector-py/package-lock.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion early-attack-detector-py/package.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"name": "early-attack-detector-py-beta",
"displayName": "Early Attack Detector Beta",
"version": "0.2.2",
"version": "0.2.4",
"description": "Attack detector focused on detection during preparation",
"longDescription": "This bot is designed to detect attacks during the contract deployment phase, before the attack is executed.",
"repository": "https://github.com/forta-network/starter-kits/tree/main/early-attack-detector-py",
Expand Down
14 changes: 12 additions & 2 deletions early-attack-detector-py/release.md
Original file line number Diff line number Diff line change
@@ -1,16 +1,26 @@
# V0

## V0.2.3

- [beta] Added True Positive list and Hops beta bot.

## V0.2.2
- [beta] Added squid, 1-hops, and SWFT Swap funding sources

- [beta] Added squid, 1-hops, and SWFT Swap funding sources
- [prod] Added 1-hops, and SWFT Swap funding sources

## V0.2.1

- [prod] Removed squid from funding sources temporarily

## V0.2.0

- Updated model, new threshold. Updated docker version to be more lightweight.

## V0.1.0

- Updated model

## V0.0.1
- Initial version of the bot

- Initial version of the bot
2 changes: 1 addition & 1 deletion early-attack-detector-py/requirements.txt
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ setuptools>=61.3.1
hexbytes>=0.2.2
evmdasm>=0.1.10
rlp>=2.0.1
scikit-learn>=1.4.1
scikit-learn==1.4.1.post1
bot-alert-rate>=0.0.4
web3==5.23.0
imbalanced-learn>=0.12.0
Expand Down
Loading