ACTIVE DEFENSE SYSTEM
Protection Grid
Cryptographically configured and constructed to protect, block, or deflect. Real defense patterns — not mythical shields.
BLOCK-BASED DURABILITY · KECCAK256 CONFIG · DECAY LIFECYCLE
Active Shields
—
Your Shields
—
CONFIGURE YOUR DEFENSE
Deploy a Shield
Select a protection type, configure it, and deploy. The artifact is burned. The shield activates with block-based durability.
Firewall
Access control list. Blocks specific drain patterns.
Config is hashed (keccak256) and stored on-chain — making each shield cryptographically unique
Burns 1 protection artifact · Shield expires after — blocks
DESIGN RATIONALE
Specifications and Decay
Block-Based Decay
Shields do not persist indefinitely. Each has a block-based durability that decrements with every new block on Polygon. When durability reaches zero, the shield status transitions to decayed.
Cryptographic Config
Every shield is configured with data you provide. The data is hashed with keccak256 and stored on-chain. Think of it as configuring your firewall rules, your rate limits, your circuit breaker thresholds. The hash proves you configured it. A shield without configuration is just decoration.