FRB security overview explains how the agent stays signed, isolated, and auditable.
This FRB security overview shows IT, compliance, and MEV searchers how the Windows agent is signed, how telemetry behaves, and how to escalate vulnerabilities. Share it with auditors whenever someone asks how the FRB MEV agent protects pending transactions and private keys.
Linkable summary
Security in one paragraph
FRB signs every Windows build, documents isolation guidelines, and operates a public disclosure channel so exchanges and policy lists can link to a single security overview without vendor spin.
Signing & Verification
The Windows installer is Authenticode‑signed. Verify the SHA‑256 and publisher before running.
CertUtil -hashfile MultiChainFrontRunningAgent.iso SHA256Get-AuthenticodeSignature .\MultiChainFrontAgent.exe | Format-ListPublisher: FRB Labs Ltd. • Certificate valid through: [date]
Isolation & Best Practices
- Run in VM/WSL2 or non‑primary PC first.
- Start in Simulation with strict slippage/budget caps.
- Use a burner wallet; never share keys/seed.
Credential hygiene
- Rotate wallet permissions quarterly and document who holds signing authority.
- Use separate RPC keys for simulation vs production to isolate throttling.
- Keep antivirus/EDR enabled; our signed binaries work with major vendors.
Incident response
If you suspect compromise:
- Disconnect the agent, revoke RPC keys, and snapshot logs.
- Alert security@ai-frb.com with timestamps.
- Reinstall from a fresh hash-verified build after root cause analysis.
We coordinate on disclosures and can provide extra metadata (signing cert, hash history) upon request.
Vulnerability disclosure & escalation
Report suspected vulnerabilities via /vulnerability or email security@ai-frb.com. Please include proof-of-concept steps, affected versions, and contact info for coordinated disclosure. We acknowledge within 48 hours and share remediation timelines when possible.
Telemetry & privacy highlights
See /telemetry for what FRB logs (agent version, anonymous health metrics) and how to opt out. We do not capture private keys or trade data; telemetry exists to improve node health alerts and refund guard behavior.
Apply the FRB security checklist
Move from review to action with the links below, then log every step inside your internal KB for audit trails.
Need to report an issue directly? Email security@ai-frb.com or visit /vulnerability with hashes, pending transaction context, and affected versions.
Related FRB resources
- Telemetry policy for data retention details.
- Responsible disclosure instructions for researchers.
- Refund & billing policy when incidents impact financial ops.
For ecosystem context
Ecosystem research: how FRB’s telemetry and policies fit next to Flashbots and Blocknative