Configuration

Overview

You can configure various aspects of how your node operates, focusing on these topics:

  • Node Management Configure what address, port, and route the node uses for the Node Management API. Alternatively, you can use opt to disable this API altogether.

  • Security Inspection Signature Configure what address, port, route, and private key the node uses when inspecting and signing transactions.

  • Threat Modeling Detectors Venn's threat modeling works by leveraging Detectors. Use this configuration section to what detectors your node uses when inspecting incoming transactions.

  • Blockchain Nodes Your node can interact and protect transactions for any EVM-like blockchain. Use this configuration section to setup the Web3 providers and chains your node interacts with.

  • Protocol Registration This configuration section tells the node what protocols are whitelisted for Venn's protection through your node. Only whitelisted protocols can use your node for transaction inspection.

  • Network & Peer Management Use this section to configure your operator's display name on the network, as well as what hostname, port, and route it exposes for peer-to-peer communication on the Network. This is also where you configure what peers your node is connected to.

Node Management

Security Inspection Signature

Threat Modeling Detectors

Blockchain Nodes

Network & Peer Management

Protocol Registration

Last updated

Was this helpful?