Check out our latest blogs
Read through our updates covering feature launches, partnerships, thought leadership pieces and trending topics on how we are solving the security and custody problem for Web3 institutions
Team Liminal |
September 1, 2025
In the digital asset ecosystem, the stakes are high and threats are amplified. Every interaction with a new wallet or unfamiliar smart contract is an irreversible trust decision. If the counterparty is malicious or compromised, funds could be lost forever. That’s why real-time information provides more visibility on the transaction. So, each token is fully intact.
Strengthening every transaction requires a strategy that doesn’t just react to threats, but prevents them, even before they reach a digital asset. The year 2022 alone was the worst recorded for cryptocurrency heists amounting to US$3.8 billion, the highest annual total, yet. The majority of funds were stolen in on-chain attacks.
Don’t Just Send, Send Smart
Liminal’s integrated real-time Address Screening and composite Risk Score powered by Cyvers helps prevent fund loss from malicious address interactions. With built-in address screening, a composite risk score is also available for review.
Depending on the risk threshold, Liminal will either warn or block transactions before:
- Whitelisting a new destination
- Signing an MPC transaction
Together, these tools redefine how digital assets are safeguarded.
A Double Edged Sword: Borderless Networks
On-chain transparency is among blockchain’s most powerful characteristics. Every transaction is recorded on a ledger and verifiable anywhere. This openness is what enables trustless transactions. Participants know the underlying infrastructure is supposed to be enforced exactly as coded. Protocols can interact without relying on centralized gatekeepers.
Yet, this transparency also acts as a spotlight. Exposing users to risks. Since every transaction is visible in real time, malicious actors can track wallets, monitor investment patterns, and front-run large trades. So, On-chain transparency is a double-edged sword. While enabling trustless transactions, it also exposes users to:
- Malicious addresses planted through phishing or social engineering
- Compromised smart contracts with hidden vulnerabilities
- High-risk counterparties linked to illicit finance
These risks often hide in plain sight. The moment of signing is the last line of defense to pause a breach.
The Solution: Intelligence at the Point of Decision
The Address Screening and Risk Score feature is built on a simple philosophy: to strengthen every transaction. Rather than disrupting the transaction, the system performs real-time checks when an address enters the workflow during:
Whitelisting a new destination
Whitelisting a new destination is a critical control for institutional operations. It’s the process of approving and registering a wallet address as a trusted counterparty to which funds can be transferred. After an address has been whitelisted, it becomes part of a pre-approved set of destinations that can be interacted with, not requiring additional authorization for every transaction.
From a security perspective, whitelisting is a preventive safeguard as blockchain transactions are irreversible. By embedding Address Screening and Risk Score into the whitelisting process, enterprises can ensure that every new destination is evaluated against cyber and fraud risks, before approval.
Signing an MPC transaction
An MPC (Multi-Party Computation) transaction distributes key material across multiple parties or devices. Each participant holds a “share/shard” of the private key. To authorize a transaction, the MPC protocol enables these distributed shards to collaboratively generate a valid signature.
From an operational standpoint, signing an MPC transaction means that no single participant has unilateral control. Each designated participant must approve the transaction using their shard of the key. This structure reduces the risk of theft from compromised devices or targeted attacks because no single point can yield the full signing authority.
The key takeaway from this is,
For businesses handling significant transaction volumes, the ability to seamlessly create requests while embedding risk intelligence controls are transaction mainstays. The process is a trust-enabled movement of value.
Your Thresholds, Your Way: Risk Score
A composite Risk Score is an aggregated metric that consolidates multiple dimensions of risk into a single value. Enabling faster and more informed decisions on whether to proceed, flag, or block a transaction. Unlike traditional binary checks, a composite risk score evaluates a transaction thoroughly. This multi-layered approach is critical in blockchain environments, where threats evolve rapidly.
For enterprises, the value of a composite Risk Score lies in its ability to automate at scale. It shifts risk management from a reactive exercise to a real-time, proactive control embedded directly into transaction workflows. Operations teams benefit from streamlined approvals with consistent standards.
This score is calculated in real time, drawing from live intelligence powered by Cyvers. The result is an overall view of an address’s trustworthiness, factoring in cyber threats, fraud indicators, and compliance obligations on par.
A Safety Net: Built In
When pre-configured risk thresholds are exceeded, the features respond by issuing a warning for manual review, or blocking the transaction outright to prevent potential loss. The alerts are contextual and presented concisely. Signers understand not just that something is wrong, but why it’s risky.
If an address passes all checks, the transaction flows seamlessly to the next step. When the system detects an anomaly, a contract-level vulnerability, or suspicious transaction history, the user is notified with timely actionable guidance. The Address Screening and Risk Score feature surfaces before tokens are committed to the chain. As every risk appetite is different, a composite Risk Score can be interpreted dynamically.
Why It Matters Most – Now
For enterprises operating in the digital asset ecosystem, the stakes in every transaction are exponentially higher than for individual users. The threat landscape has never been more aggressive. Malicious actors have more attack vectors and speed than ever before.
A real-time composite Risk Score and Address Screening checks how every outgoing transfer, contract interaction, or whitelist addition is assessed against the full spectrum of cyber fraud, and compliance risks before being finalized. Red flags are raised at the moment of transaction initiation, and not after an incident occurs.
Enterprise-Grade Security
With Risk Score and Address Screening, the guardrails on the transaction remove the guesswork from critical decision points with direct intelligence. The need is also compounded by how many threats today don’t present as a single, obvious danger. Moreover, safe transactions move forward seamlessly, without adding bottlenecks. This proactive detection capability is essential for businesses with large transaction volumes.
Enterprises mandate enterprise-grade security. Know that every transaction is backed by a defense layer that is always on and always current. Risk Score and Address Screening are more than just proactive features. They are strategic accelerators of trust and compounding growth.
To see the product in action or to secure your digital asset transactions, book a demo with our team.