Description
Hop Number of hops the risk propagates
Threshold Amount The sensitivity level between two points. This amount is used for risk propagation from A only when total transfers between A and B exceed the threshold amount.
Categories The categories to include in the detection
Transaction History The time range of transactions used to calculate the risk model, by default full range (recommended)
Feedback Signal Customer’s own whitelist and blacklist, customer’s own address list, known entities etc

How the config is being used:

Each organization is assigned at least one risk model configuration. This configuration periodically generates a risk model by analyzing the latest evolution of onchain transaction graph and offchain labels. Each version of the risk model is associated with a config revision, providing a linear audit trail for your compliance processes.

Notes:

  1. For feedback loop
    1. Customers can insert and apply changes immediately within ECS.
    2. Within minutes, these changes will be pushed to all docker images.
    3. Changes will also be leveraged for indirect exposure analysis within four hours at the latest.
  2. The ECS config defines the upper risk sensitivity level of an organization, and Ext - Risk Model Configuration System helps organization to define the priority.
  3. Each organization can have multiple ECS configs.

<aside> 🦉

Legal Disclaimer:

The parameters presented herein are provided for informational purposes only and represent a subset of the broader configuration utilized by CipherOwl’s ECS Risk Model. CipherOwl reserves the right to modify, adjust, or enhance these parameters and the underlying methodologies at any time without prior notice. While CipherOwl endeavors to ensure optimal performance through rigorous testing, we do not guarantee that such modifications will achieve specific outcomes or meet particular performance criteria. Please be aware that additional internal parameters and configurations, not disclosed here, are integral to the model’s operation. CipherOwl makes no warranties or representations regarding the completeness, accuracy, or reliability of the information provided in this document. Users should not rely solely on the disclosed parameters for decision-making purposes.

</aside>

bc1pmaf6wahsk6957y3wkyhcyhpl6jqwu2399leu3lmg33w3u0gjateq4g8v48