Paste a tx hash. Get a forensic report. No setup required to read one.
Argus turns any Ethereum transaction into a structured forensic report — attack patterns, fund flows, revert reasons — in seconds.
Real reports from mainnet transactions:
| Transaction | Risk | Patterns Detected |
|---|---|---|
| Balancer exploit | 🔴 HIGH | Reentrancy, FlashLoan, PriceManipulation ×5, AccessControlBypass |
| Access control bypass | 🔴 HIGH | AccessControlBypass, 6 ERC-20 transfers |
| Flash loan + price manipulation | 🔴 HIGH | FlashLoan, PriceManipulation ×8 |
One command to run it yourself (archive RPC required):
export ALCHEMY_API_KEY=your_key
argus tx 0xabc... # outputs a markdown forensic reportNo RPC key? Read the sample reports above — no installation needed.
The Hundred-Eyed Guardian for Ethereum
Real-time attack detection, post-hack forensics, and time-travel debugging for EVM transactions.
Built for: Protocol security teams, security researchers, and node operators seeking self-hosted Ethereum monitoring.
Existing security tools (Slither, Mythril, Echidna) analyze contracts before deployment. Argus protects after deployment — detecting attacks as they happen and analyzing them when they've already occurred.
$ cargo run --example sentinel_realtime_demo
┌─────────────────────────────────────────────────────┐
│ Argus Sentinel — Real-Time Attack Detection Demo │
└─────────────────────────────────────────────────────┘
Demo 1 Multi-TX Block Scanning
TX 0: Simple ETH transfer (21k gas, success) → CLEAN
TX 1: Flash loan via Aave (2.5M gas) → CLEAN
TX 2: 5 ETH transfer, reverted (950k gas) → FLAGGED
⚠ Alert #2
Priority: High Score: 0.75
Reason: HighValueWithRevert, UnusualGas, SelfDestruct
Demo 3 Mempool Pre-Filter (Pending TX Scanning)
Mempool TXs scanned: 4
Mempool TXs flagged: 3
Demo 4 Auto-Pause Circuit Breaker
Score below threshold — no pause triggered
(Pre-filter-only alerts may not reach confidence threshold)
No RPC key needed — demos run against local LEVM. Try it (~5 min first build, instant after):
git clone https://github.com/tokamak-network/Argus.git && cd Argus && cargo run --example sentinel_realtime_demoQuick path guide: Security researcher? → Run the demo. DevOps? → Use Docker. Developer? → Build from source.
Core features (pre-filter, deep analyzer, alerts, forensics, debugger) are implemented and tested (864 tests). Some features (mempool monitoring, auto-pause, ML pipeline) are available in embedded mode only — not yet wired in the RPC-mode CLI. See sentinel.toml.example for details. Argus is currently running on Ethereum mainnet via AWS ECS Fargate — see Deployment Guide and Roadmap.
A 2-stage detection pipeline integrated at the block processing level:
- Pre-filter: Receipt-based heuristics (~10-50μs/tx — see latency bench) eliminate 99% of benign transactions
- Deep analyzer: Full opcode-level replay on suspicious transactions only
- Mempool monitoring: Detect attacks before they're included in a block (embedded mode only; not yet in RPC-mode CLI)
- Auto-pause circuit breaker: Optionally halt processing on critical alerts (embedded mode only; disabled by default due to slashing risk)
- Multi-channel alerts: JSONL, Webhook (Slack/Discord/PagerDuty), WebSocket, Prometheus
Replay any mainnet transaction and generate a forensic report:
- Attack pattern classification: Reentrancy, flash loans, price oracle manipulation, access control bypasses
- Fund flow tracing: Track ETH and ERC-20 token movements through the attack
- Markdown report generation: Structured timeline with attack phases, evidence, and suggested fixes
GDB-style interactive replay at opcode granularity:
- Forward/backward stepping through execution
- Breakpoints on program counter (PC)
- Full state inspection at any point in execution
- Fast step navigation
git clone https://github.com/tokamak-network/Argus.git
cd Argus
cargo run --example sentinel_realtime_demoThis simulates a block containing both benign and malicious transactions, showing Sentinel's detection pipeline in action:
Demo 1 Multi-TX Block Scanning
TX 0: Simple ETH transfer (21k gas, success)
TX 1: Flash loan via Aave (2.5M gas, 6 ERC-20 transfers)
TX 2: 5 ETH transfer, reverted (950k gas)
Alert #2:
Priority: High
Score: 0.75
Summary: Pre-filter alert: high-value-revert, unusual-gas, self-destruct
Reason: HighValueWithRevert { value_wei: 5000000000000000000 }
Demo 3 Mempool Pre-Filter (Pending TX Scanning)
Mempool TXs scanned: 4
Mempool TXs flagged: 3
Demo 4 Auto-Pause Circuit Breaker
Critical alert → block processing HALTED
cargo run --example reentrancy_demoDeploys a vulnerable contract, executes a reentrancy attack, and runs full forensic analysis:
Phase 1 Deploy & Execute
Execution: SUCCESS (gas_used=82107)
Opcode steps recorded: 80
Phase 2 Verify Attack
Max call depth: 4 (need >= 3 for reentrancy)
CALL opcodes: 4
SSTORE opcodes: 4 (attacker counter writes)
Result: CONFIRMED — reentrancy pattern detected
Phase 3 AttackClassifier
Reentrancy (target=0x...0043)
confidence: 90.0%
evidence: Re-entrant call at step 47
evidence: State modified at step 69
evidence: Value transfer during re-entry
Phase 4 FundFlowTracer
ETH drain confirmed (victim -> attacker)
Phase 6 Summary
Pre-filter: no receipt-level alert (TX succeeded with normal gas)
Reentrancy was detected by the opcode-level classifier (Phase 3).
Argus is running on Ethereum mainnet via AWS ECS Fargate (since March 2026).
- 14-day continuous operation completed — see operations report
- Zero downtime, $7/month on Fargate
- No confirmed exploit interceptions yet — building baseline data
The following are retroactive, hypothetical analyses of past exploits. Argus was not running at the time of these attacks. These demonstrate what the detection pipeline would likely produce on similar patterns. Some signals shown are planned but not yet implemented — see each analysis for details.
Retroactive Analysis: $128M Balancer V2 Exploit
$128M drained via rounding error in Balancer V2's batchSwap (Nov 2025). Argus's pre-filter would likely flag the unusual gas + ERC-20 transfer count; deep analyzer classifies as price manipulation (82% confidence).
Retroactive Analysis: $1.5B Bybit Exploit
$1.5B drained from Bybit's cold wallet via supply chain attack on Safe{Wallet} (Feb 2025). Argus's pre-filter would likely flag unusual gas pattern from the multisig; deep analyzer identifies proxy implementation overwrite. Full detection of proxy upgrade anomalies requires planned signal additions.
| Argus | Forta | Phalcon | Tenderly | Hexagate | |
|---|---|---|---|---|---|
| Runtime detection | Yes | Yes (bot network) | Yes | Partial (alerts) | Yes |
| Mempool pre-detection | Yes* | Partial** | Yes | Yes | Yes |
| Post-hack forensics | Yes | No | No | Partial | No |
| Open source | Fully | Partial | No | No | No |
| Self-hosted | Yes | No (SaaS) | No (SaaS) | No (SaaS) | No (SaaS) |
| Multi-chain | No | Yes (7+) | Yes | Yes (109) | Yes |
| Production track record | Mainnet since Mar 2026 | 270M+ TX scanned | 20+ hacks blocked | 1.4M+ simulations | Undisclosed |
* Argus mempool monitoring is available in embedded mode only; not yet wired in RPC-mode CLI.
** Forta Firewall provides pre-execution screening for rollups, not L1 mempool monitoring (details).
Argus is early-stage but running on Ethereum mainnet via AWS ECS Fargate with zero downtime at $7/month. No confirmed exploit interceptions yet. Its primary differentiator is being fully open-source and self-hostable. See competitive analysis for an honest, detailed comparison.
Interactive module map with file-level detail: docs/argus-architecture.html
┌─────────────────────────────────────┐
│ Ethereum Network │
└──────────────┬──────────────────────┘
│
┌──────────────▼──────────────────────┐
│ Mempool Monitor │
│ (pre-execution calldata scan) │
└──────────────┬──────────────────────┘
│
┌────────────────────▼────────────────────────┐
│ Sentinel Pipeline │
│ │
│ ┌──────────┐ ┌────────────────────────┐ │
│ │Pre-filter │───▶│ Deep Analyzer │ │
│ │ ~10-50μs │ │ (opcode-level replay) │ │
│ │ per tx │ │ │ │
│ └──────────┘ └───────────┬────────────┘ │
└──────────────────────────────┼──────────────┘
│
┌────────────────────────▼─────────┐
│ Alert Dispatcher │
│ JSONL / Webhook / WS / Prometheus │
└────────────────────────┬─────────┘
│
┌────────────────────────▼─────────┐
│ Auto-Pause Circuit Breaker │
│ (halt on Critical severity) │
└──────────────────────────────────┘
| Feature | Description | Feature Flag |
|---|---|---|
| Sentinel | Real-time attack detection pipeline | sentinel (default) |
| Autopsy Lab | Post-hack forensic analysis | autopsy (default) |
| Time-Travel Debugger | Interactive opcode replay | always included |
| CLI | Interactive debugger shell | cli |
| Dashboard | Web UI for Sentinel metrics | sentinel |
| AI Agent | LLM-assisted attack verification (Phase 1 MVP complete — 2-tier judge, hallucination guard, cost tracking) | ai_agent |
# Default (Sentinel + Autopsy)
cargo build
# With CLI debugger
cargo build --features cli
# All features
cargo build --all-featuresRequirements: Rust 1.85+ (edition 2024)
# Build and run locally
docker build -t argus-demo .
# Run Sentinel on mainnet
docker run -d \
-e ARGUS_RPC_URL="https://eth-mainnet.g.alchemy.com/v2/YOUR_KEY" \
-p 9090:9090 \
argus-demo
# Or run in prefilter-only mode (foreground — no archive RPC needed, logs shown directly)
docker run -e ARGUS_RPC_URL="https://eth-mainnet.g.alchemy.com/v2/YOUR_KEY" argus-demoCopy the example config and adjust for your setup:
cp sentinel.toml.example sentinel.toml
# The argus binary requires the `cli` feature flag
cargo build --release --features cli
cargo run --release --features cli -- sentinel \
--rpc https://eth-mainnet.g.alchemy.com/v2/YOUR_KEY --config sentinel.tomlSee sentinel.toml.example for all available options with inline documentation.
For production deployment on AWS ECS Fargate, see Deployment Guide.
Argus uses ethrex LEVM as its EVM execution engine — a minimal, fast Ethereum Virtual Machine implementation in Rust. Argus depends on Tokamak Network's fork which includes the tokamak-debugger feature.
Currently maintained by Jason Hwang with AI-assisted development. Looking for contributors — see CONTRIBUTING.md to get started!
Dual-licensed under MIT or Apache 2.0.
Built by Tokamak Network.
