ApprovalGuard Response Console
Exploit response mode Revoke risky approvals fast

Revoke all approvals
linked to the Phantom Wallet exploit.

If you interacted with suspicious dApps or unknown token contracts, you may have granted approvals that allow spending your assets. This page helps you invalidate those approvals and reduce further risk.

UI only — connect & revoke logic is added later via wallet integration.
Risk scan
High sensitivity
Approvals
Review all
Recommended
Revoke unknown

Security status

A clean, professional layout designed for incident response and user confidence.

🛡️

Contain the blast radius

Approvals can be abused even without your signature later. Revoking reduces exposure.

🔎

Audit approvals

Look for “unlimited” allowances, unknown contracts, and recent dApp interactions.

🧾

Document actions

Export a report for future reference. Keep incident notes and timestamps.

Recommended actions

A clear flow users can follow under stress.

1

Disconnect & isolate

Stop interacting with unknown sites. Close sessions and revoke permissions first.

2

Revoke risky approvals

Invalidate allowances for unknown contracts and “unlimited spend” approvals.

3

Rotate credentials (optional)

If compromise is suspected, move assets to a fresh wallet and update your security posture.

One-click revoke (design)

This is the front-end shell. Add wallet integration later to fetch allowances and submit revoke transactions.

FAQ

Quick answers users expect on an incident page.

What does “revoke approvals” mean?

Token approvals (allowances) let a contract spend your tokens. Revoking sets that allowance back to zero.

Will revoking recover stolen funds?

Revoking prevents future spending via those approvals, but it won’t automatically reverse past transfers.

Why does this page say “UI only”?

Actual revocation needs wallet connection + on-chain calls. This design is the polished front-end shell.