Configuration
Overview
You can configure various aspects of how your node operates, focusing on these topics:
Node Management Configure what address, port, and route the node uses for the Node Management API. Alternatively, you can use opt to disable this API altogether.
Security Inspection Signature Configure what address, port, route, and private key the node uses when inspecting and signing transactions.
Threat Modeling Detectors Venn's threat modeling works by leveraging Detectors. Use this configuration section to what detectors your node uses when inspecting incoming transactions.
Blockchain Nodes Your node can interact and protect transactions for any EVM-like blockchain. Use this configuration section to setup the Web3 providers and chains your node interacts with.
Protocol Registration This configuration section tells the node what protocols are whitelisted for Venn's protection through your node. Only whitelisted protocols can use your node for transaction inspection.
Network & Peer Management Use this section to configure your operator's display name on the network, as well as what hostname, port, and route it exposes for peer-to-peer communication on the Network. This is also where you configure what peers your node is connected to.
During Venn Testnet phases, protocol registration and peer discovery is handled manually, in a permissioned model.
Once Venn goes live no mainnet, both protocol registration and peer discovery will be done on-chain through dedicated registration contracts.
Node Management
Security Inspection Signature
Threat Modeling Detectors
Blockchain Nodes
Network & Peer Management
Protocol Registration
Last updated