Page cover

Sentrysol Whitepaper

On‑Device AI Behavioral Security for Web3 Mobile Version 1.0

Table of Contents

1. Executive Summary

As decentralized finance and digital ownership migrate en masse to mobile platforms, the industry has reached a critical inflection point. Users are now exposed to a new paradigm of stealthy, behavior-based attacks that traditional security measures are fundamentally unequipped to prevent. Threats like wallet address spoofing, dusting-based fingerprinting, malicious token airdrops, and clipboard-hijacking malware bypass protocol-level defenses by targeting the most vulnerable layer: the user's decision-making process. The financial and psychological cost is immense, eroding trust and hindering mainstream adoption.

SentrySol is the first AI-native, on-device security engine designed to neutralize these modern Web3 threats before assets are compromised. We provide a proactive shield where legacy solutions offer only reactive analysis.

By orchestrating a suite of lightweight, specialized AI agents directly on the user's device, SentrySol reasons over live on-chain data and device-level signals in real time. Our system analyzes transaction intent by decoding raw payloads, screens token contracts for malicious code patterns, detects sophisticated social engineering tactics, and monitors for hostile app behavior—all locally, privately, and silently. A custom Model Context Protocol (MCP) and efficient, stateful LangGraph workflows ensure this complex analysis occurs with a negligible impact on device performance and battery life.

For the end-user, SentrySol provides a seamless shield of protection, delivering explainable, context-rich risk insights through a clean dashboard or via unobtrusive, actionable alerts at the moment of greatest risk. For wallet developers and the broader ecosystem, it offers a simple-to-integrate SDK to embed next-generation behavioral security, transforming any mobile wallet from a passive transaction tool into an intelligent, self-defending guardian that actively protects its user.

2. Introduction: The Mobile-First Web3 Imperative

The future of the decentralized internet is in the palm of our hands. Over 90% of on-chain interactions, from DeFi swaps and governance votes to NFT mints and digital identity management, now originate on smartphones. This migration represents a monumental leap in accessibility and convenience, but it has also created a critical security blind spot, leaving the door open for a new generation of attackers. The attack surface has decisively shifted from complex, backend smart contract exploits—which are often caught by professional audits—to the subtle, psychological manipulation of human behavior and user interface patterns on mobile devices.

Attackers no longer need to break the code; they just need to trick the user. They exploit trust, urgency, information asymmetry, and the inherently limited screen real estate of mobile devices to execute attacks that are nearly invisible to both the user and conventional security tools. A single, ill-advised tap can now result in irreversible asset loss.

The Widening Gap in Defense: This new reality exposes the inadequacy of existing security models.

  • Traditional Antivirus: Is built to recognize file-based malware signatures. It has zero context for blockchain transactions, cannot interpret smart contract risk, and is blind to the logic of a phishing token.

  • Network Firewalls & DNS Blocklists: Can block known malicious domains and IP addresses. However, they are fundamentally reactive and ineffective against zero-day phishing attacks that use freshly registered domains or novel scam tokens distributed directly on-chain.

  • Smart Contract Audits: Are essential for securing the backend protocol logic. However, their protection ends where the user's interaction begins. An audit cannot prevent a user from being tricked into signing a malicious transaction with a perfectly secure smart contract.

SentrySol addresses this unmet need by pioneering a new approach: embedding real-time, intent-aware AI directly into the mobile device. We move security to the edge, to the precise moment of decision, creating a proactive, personalized shield that understands the full context of every action. SentrySol transforms the mobile wallet from a simple, vulnerable transaction tool into its own intelligent, adaptive security guardian.

3. The Evolving Threat Landscape

SentrySol is engineered to combat the nuanced threats specific to the mobile Web3 experience. Understanding these vectors is key to appreciating the necessity of on-device behavioral analysis.

Threat Vector

How It Works

Real-World Impact

Wallet Spoofing

An attacker generates a "vanity" address that is visually almost identical to a trusted address (e.g., 0xAb...C1 vs. 0xAb...C_l_). They trick the user into copying the wrong address or send a tiny transaction from it, poisoning the wallet's history.

A single moment of inattention, often involving a copy-paste action, can lead to the irreversible loss of an entire portfolio transfer. This exploits human pattern recognition flaws.

Dusting & Fingerprinting

Malicious actors send minuscule, worthless amounts of tokens ("dust") to thousands of wallets. By tracking how this dust moves across the blockchain, they can de-anonymize users, map wallet networks, link identities, and identify high-value targets for subsequent, more sophisticated phishing attacks.

90% of dusting incidents are used for intelligence gathering, often preceding targeted attacks or MEV exploitation. It's the reconnaissance phase of a larger cyberattack.

Phishing Tokens & NFTs

Airdropped tokens appear in a user's wallet, often mimicking popular projects or promising high value. When the user attempts to sell or interact with them, they are prompted to sign a malicious transaction (setApprovalForAll) that grants the attacker's contract broad permissions, allowing it to drain valuable assets like stablecoins and blue-chip NFTs.

Over 80,000 phishing reports were filed on major chains like Solana, Ethereum, and BSC in 2023-24 alone, highlighting this as a widespread and effective attack vector.

Malicious Overlays & Clipboard Hijacks

Rogue mobile applications or third-party keyboard extensions run silently in the background. They can create an invisible overlay to capture a seed phrase during wallet creation or, more commonly, dynamically replace a copied wallet address in the clipboard with an attacker's address just before pasting.

Over 60% of mobile wallets lack the behavioral defense mechanisms needed to detect this type of OS-level interference, making it a particularly insidious threat.

Blind Signing

Users are presented with a transaction payload that is unreadable to a human (a long hex string). They are asked to approve it to mint an NFT or participate in a new DeFi protocol, unaware that the payload contains hidden instructions to transfer assets, delegate authority, or grant unlimited token approvals.

This is a primary vector for the most devastating wallet drains, as the user is authorizing the theft themselves without understanding the transaction's true, malicious intent.

Data sourced from Chainabuse, Elliptic, and Halborn security reports (2023-2024).

4. The SentrySol Solution: An On-Device AI Security Engine

SentrySol embeds a multi-agent AI pipeline on the device, where each agent is a specialized, lightweight model responsible for a specific security domain. These agents work in concert as a "Collective," sharing context through a stateful graph to build a holistic, real-time understanding of risk.

The SentrySol Agent Collective:

  • 1. Wallet Agent: The entry point and state manager. It securely fetches and caches on-chain balances, transaction history, and token ownership from trusted RPC nodes. It establishes the baseline "state" of the user's wallet, creating a behavioral profile (e.g., "DeFi power user," "NFT collector," "new user") that provides crucial context for all other agents.

  • 2. Token Screener: A sophisticated contract and metadata analyzer. It examines all incoming and existing tokens, checking for red flags like unverified source code on Etherscan, known "honeypot" code patterns (buyable but not sellable), association with wallets known to mass-distribute scam airdrops, and deceptive token names designed to impersonate legitimate projects.

  • 3. Transaction Agent: The core of the real-time defense. Before a signature is requested, this agent inspects the raw transaction payload to infer intent. It deciphers hex data to determine if the transaction is a simple transfer, a specific token approval (approve vs. the riskier setApprovalForAll), a complex smart contract interaction, or something potentially malicious. It simulates the transaction's outcome to predict state changes.

  • 4. Dust & Spoof Detector: A specialist in address heuristics. It uses fuzzy matching algorithms (like Levenshtein distance) to flag addresses in pending transactions that are visually similar to previously used, trusted addresses. It also identifies and isolates low-value "dusting" transactions designed for fingerprinting, flagging them as surveillance attempts rather than legitimate transfers.

  • 5. Phishing & Malware Agent: A device-level sentinel operating at the OS layer. With user permission, it monitors for high-risk app telemetry, such as unexpected clipboard access immediately after copying an address, the detection of screen-overlay windows (a common tactic for credential theft), or abnormal app permission escalations that could indicate a compromised application environment.

  • 6. Behavior Interpreter: The central reasoning engine. It aggregates weighted signals from all other agents using a Bayesian inference model. It computes a final, nuanced risk score and generates a clear, human-readable recommendation (e.g., "Warning: This transaction grants unlimited access to your USDC. This is highly unusual and risky."). It can also classify the wallet's interaction patterns to identify bot activity versus normal retail behavior.

  • 7. UI Trace Renderer: The explainability and trust layer. It visualizes the entire decision-making process in a simple, interactive timeline or graph. It shows the user exactly which signals (e.g., "Token is unverified," "Address is a near-match") led to a specific warning, demystifying the AI's conclusion and fostering user trust and education.

All agents communicate via LangGraph, a resilient framework for building stateful, multi-agent applications. This graph-based structure allows for complex, cyclical reasoning paths, ensuring that context is passed efficiently and reliably between each step of the analysis pipeline, which is critical for accurate threat assessment.

5. System Architecture

SentrySol employs a sophisticated hybrid architecture that maximizes on-device privacy and speed while leveraging the power of larger models for complex, non-real-time analysis when necessary. This design ensures immediate protection without compromising on analytical depth.

//flowchart
    subgraph On-Device Runtime (User's Phone)
        A[User Action: e.g., Initiate Transaction] --> B{SentrySol SDK};
       
        subgraph Agent Collective (LangGraph State Machine)
            C[1. Transaction Agent] --> D[2. Spoof Detector];
            D --> E[3. Token Screener];
            E --> F[4. Behavior Interpreter];
        end

        G[OS-Level Monitor] -- Clipboard/Overlay Events --> H[5. Phishing Agent];
        B --> C;
        H --> F;
       
        F -- Risk Score & Explanation --> I[UI Alert / Dashboard];
        I --> J[User: Approve / Reject];
    end

    subgraph Secure Cloud Services
        K[Model Context Protocol Server] -- Secure, Anonymized API Call --> L[LLM for Deep Analysis (e.g., GPT-4)];
        M[On-Chain Data Provider] --> N[Wallet Agent Cache];
    end

    F -- Optional Deep Scan for Novel Threats --> K;
    B -- Initial State Sync & Updates --> N;

    style On-Device Runtime fill:#e6f3ff,stroke:#333,stroke-width:2px
    style Secure Cloud Services fill:#fdece6,stroke:#333,stroke-width:2px

Architectural Components:

  1. On-Device Runtime: The core of SentrySol lives within a lightweight SDK integrated directly into the mobile wallet application. It houses the agent collective, the OS-level monitor, and all the TinyML models. All real-time, sensitive operations happen here in a secure sandbox, ensuring that private keys, transaction data, and behavioral patterns never leave the device for primary analysis. The runtime integrates with native secure hardware like the Solana Mobile SeedVault or Android/iOS keychains for cryptographic operations.

  2. Hybrid Reasoning Layer: This two-tiered approach is the key to SentrySol's efficiency and power.

  • On-Device Models: For instant, pre-signature analysis, SentrySol uses highly optimized, quantized TinyML models. These models are small (often under 1MB), incredibly fast, and designed to run efficiently on resource-constrained mobile hardware. They handle over 99% of tasks, including address matching, transaction classification, and known pattern detection.

  • Cloud-Assisted Deep Scans: For novel or highly complex threats that the on-device models cannot confidently classify, the user can opt-in to a "deep scan." The SentrySol SDK sends an anonymized, structured request containing only non-sensitive, contextual data (e.g., the contract address, the function hash) to our secure Model Context Protocol (MCP) Server. This server then queries a powerful, large language model (like a fine-tuned GPT-4) for deeper reasoning. This hybrid approach provides the best of both worlds: instant on-device protection for known threats and the analytical power of large-scale AI for emerging ones, without ever compromising user privacy by default.

  1. Context & Data Providers: The system relies on securely cached on-chain data fetched from trusted RPC providers. The Wallet Agent maintains this local cache, ensuring that the system has up-to-date context on balances and transaction histories without constant network requests, further enhancing speed and privacy.

6. Core Features & Technology

Feature

Description

Real-Time, Pre-Signature Analysis

SentrySol analyzes the full context of a transaction before the user signs it, shifting the security paradigm from reactive forensics (figuring out what happened after a theft) to proactive prevention. It is the final, critical checkpoint before an irreversible on-chain action.

Privacy-First by Design

All primary behavioral analysis happens in a secure sandbox on the user's device. No raw transaction data, wallet history, or app usage telemetry is ever sent to a cloud server without explicit, opt-in user consent for a specific deep scan. We protect our users' assets and their privacy with equal priority.

Explainable AI (XAI)

Users are never left guessing. Every alert is accompanied by a clear, simple explanation of the identified risk, visualized through the UI Trace Renderer. This component shows which agents contributed to the warning and what specific data points were flagged, building trust and educating the user over time.

Modular Agent Framework

The agent-based architecture, built on LangGraph, allows for unparalleled flexibility and continuous improvement. New agents, trained to counter newly discovered threats, can be developed and deployed to the SDK without requiring a full application update, ensuring the system evolves as fast as the attackers.

Ultra-Low Overhead

Through aggressive use of TinyML, model quantization (reducing model precision from 32-bit to 8-bit), and pruning (removing unnecessary model parameters), SentrySol is designed to have a minimal impact on CPU, memory, and battery life. It provides robust security without degrading the user experience.

Seamless Integration

For wallet developers, SentrySol is a simple-to-install SDK with a clean API, enabling them to add a powerful security layer in days, not months. For end-users, it's an invisible guardian that only makes its presence known when a tangible threat is detected, providing peace of mind without complexity.

7. Use Cases & Applications

SentrySol's technology is a foundational security layer applicable across the entire Web3 ecosystem, serving a wide range of users and platforms.

  • Retail Wallet Defense

  • Target Audience: Everyday crypto users, from beginners to experienced traders.

  • Application: Provide instant, easy-to-understand alerts for spoofed addresses, malicious airdrops, and phishing links. For example, when a user pastes an address, SentrySol cross-references it with recent contacts and warns, "This address is 98% similar to 'My Exchange Wallet' but is not the same. Proceed with caution." This makes self-custody dramatically safer for the mass market.

  • Wallet SDK Integration

  • Target Audience: Mobile wallet providers (like Phantom, Solflare, MetaMask Mobile, Trust Wallet).

  • Application: Allow any wallet provider to integrate behavior-aware security with a few lines of code. This becomes a powerful differentiator in a competitive market, allowing them to advertise "SentrySol-Protected" as a feature that significantly enhances user safety and trust.

  • Exchange Withdrawal Shield

  • Target Audience: Centralized and Decentralized Exchanges.

  • Application: Before a user withdraws funds from an exchange to an external wallet, SentrySol can scan the destination address for risk factors (e.g., is it a known scammer address? Is it a contract with no verified code?). This prevents costly user errors and reduces the support burden on exchanges.

  • NFT Drop & DeFi Protection

  • Target Audience: NFT collectors and DeFi users.

  • Application: Automatically identify and flag suspicious minting sites or DeFi protocols that use "blind signing" to hide malicious contract interactions. SentrySol decodes the transaction and warns the user: "This action will grant another contract the ability to move all your 'Cool Cat' NFTs."

  • Enterprise & Institutional Security

  • Target Audience: Crypto funds, DAOs, and companies managing corporate treasuries.

  • Application: Provide treasury managers with advanced, policy-based heuristics to prevent unauthorized transactions. For example, a policy could flag any transaction that attempts to send more than 10% of a specific asset to a non-whitelisted address, adding a critical layer of defense against both external attacks and internal fraud.

8. Competitive Landscape

SentrySol creates a new category of security focused on user intent and behavior at the point of interaction, a layer that current solutions completely ignore.

Solution

Layer

Strength

Why It Fails for Mobile Web3

General Antivirus

OS-Level

Detects known malware files.

No blockchain context; cannot understand transaction risk or smart contract logic.

Firewall / Blocklist SDKs

Network-Level

Blocks known malicious IPs/domains.

Static and reactive; easily bypassed by new domains and on-chain threats like phishing tokens.

Smart Contract Auditing Firms

Pre-Deployment

Secures backend protocol logic.

Not real-time; offers zero protection for user-layer exploits like phishing or address spoofing.

SentrySol

On-Device AI

Analyzes behavioral intent in real time.

-

In short, existing tools are looking in the wrong place. They are guarding the castle walls while attackers are inside, whispering in the king's ear. SentrySol is the only solution that operates as an end-user's personal security analyst, providing real-time, context-aware defense tailored specifically for the threats of mobile Web3. We don't just block known "bads"; we understand and flag suspicious behavior.

9. Project Roadmap

Phase 1: Foundation & Proof of Concept

  • Hackathon Launch: Release initial Proof of Concept at a major Solana ecosystem hackathon (e.g., Solana Hyperdrive) to validate the core concept with developers.

  • Core Agents (v1): Develop and test the 7 core security agents with a focus on Solana transaction decoding and address heuristics. Achieve >95% accuracy on known threat datasets.

  • Interactive Dashboard Demo: Showcase the UI Trace Renderer with real-world examples of caught threats, emphasizing the power of explainable AI.

  • Initial Partnerships: Onboard the first cohort of 3-5 alpha-testing partners from the Solana ecosystem, including an emerging wallet and a DeFi protocol.

Phase 2: SDK Development & Pilot Programs

  • Public SDK Release (Android): Launch the SentrySol SDK for Android, complete with comprehensive documentation and integration guides.

  • Wallet Pilots: Initiate full-scale pilot programs with 2-3 established mobile wallet providers to gather real-world performance data and user feedback.

  • Expand Agent Library: Develop new agents for advanced DeFi heuristics (e.g., impermanent loss warnings, high-slippage alerts, MEV risk assessment).

  • iOS Prototyping: Begin R&D for a feature-set adapted to the iOS security model, focusing initially on on-chain analysis agents while exploring non-intrusive methods for device-level signals.

Phase 3: Enterprise & Cross-Chain Expansion

  • Enterprise Telemetry Portal: Launch a subscription-based, privacy-preserving portal for institutional clients to monitor fleet-wide threats and configure custom security policies.

  • Cross-Chain Support: Integrate robust support for Ethereum, EVM L2s (e.g., Arbitrum, Optimism), and Cosmos chains via the Inter-Blockchain Communication (IBC) protocol.

  • Closed Beta Mobile Firewall: Release a standalone mobile application for advanced users, offering system-wide protection beyond a single integrated wallet.

  • Decentralized Threat Intelligence: Explore models for a community-driven, token-incentivized threat reporting network where users are rewarded for flagging new scams, feeding a decentralized intelligence loop that benefits the entire ecosystem.

10. Conclusion: The Future of Self-Guarding Wallets

Mobile is the undisputed frontier of Web3, but it will only achieve its potential for mass adoption if it is secure by design. The reactive security models of the past, which place the overwhelming burden of detection on the end-user, are no longer sufficient for the complexity and speed of modern threats. The future demands a proactive, intelligent, and invisible immune system that guards every tap, every swap, and every signature.

SentrySol provides this immune system. By embedding sophisticated AI reasoning directly on the device, we are building a new foundation of trust for the decentralized world. We empower users to navigate the exciting possibilities of Web3 with confidence, knowing they are protected by a guardian that understands the context of their actions. No more reactive patches. No more blind signing. No more anxious second-guessing. Just true, real-time behavioral defense.

Last updated

Was this helpful?