Usage Guide & Help Center

Master the Protocol Bank interface. Learn how to manage multi-chain payments, visualize your financial network, and secure your enterprise assets.

Getting Started

Protocol Bank supports a multi-chain environment. To begin, click the "Connect Wallet" button in the top right corner. We support the following wallets:

  • Ethereum & EVM: MetaMask, Rabby, Coinbase Wallet.
  • Solana: Phantom, Solflare.
  • Bitcoin: Unisat, Xverse.

Once connected, the dashboard will automatically sync your balances for USDT, USDC, and DAI across supported networks.

Batch Payments & Advanced Protocols

The Batch Payment tool allows you to send multiple transactions in a single session. Protocol Bank integrates advanced standards to optimize for cost, speed, and cross-chain interoperability.

X402 & ERC-3009 (Gasless)

What is it? ERC-3009 is a standard for "Transfer with Authorization". It allows you to move USDC without holding ETH for gas fees.

  • Gasless for Sender: You cryptographically sign an authorization message instead of a transaction.
  • Delegated Execution: A third-party relayer pays the gas to submit your transaction.
  • How to use: Toggle "x402 Protocol" in the Batch Payment settings. When prompted, sign the typed data message in your wallet.

CCTP (Cross-Chain)

What is it? Circle's Cross-Chain Transfer Protocol (CCTP) enables native USDC transfers between blockchains without traditional lock-and-mint bridges.

  • 1:1 Efficiency: USDC is burned on the source chain and minted natively on the destination chain.
  • No Slippage: Unlike liquidity pools, you receive exactly what you send (minus network fees).
  • How to use: In Batch Payment, simply select a different Destination Chain for any recipient. The system automatically routes via CCTP.

Payment Cost & Efficiency Analysis

Payment MethodNetworkAvg. Cost (USD)Settlement Time
Standard Transfer (ERC-20)Ethereum Mainnet$2.00 - $15.00+~12 sec (1 Block)
x402 Protocol (ERC-3009)Ethereum Mainnet$0.00 (Gasless for User)Instant Signature
CCTP Cross-ChainEth ↔ Base/Op/Arb~ $0.50 (Gas only)~13 mins (Finality)
Layer 2 TransferOptimism / Arbitrum$0.01 - $0.10~2 sec
Solana TransferSolana< $0.001~400 ms
Bitcoin TransferBitcoin Network$1.50 - $5.00+~10 - 60 min
* Costs are estimates based on average network congestion and token prices. Actual fees may vary.

Network Visualization

The Wallet Tags (Entity Network) dashboard provides a visual map of your financial relationships.

  • Tagging: Assign names and categories (e.g., "Supplier", "Subsidiary") to wallet addresses.
  • Interactive Graph: Visualize payment flows as animated particles. Click nodes to view detailed financial history.
  • Privacy: All tags are stored locally or encrypted with your user session. Your labeled data is never exposed publicly.

Security Architecture

Protocol Bank employs a multi-layered enterprise-grade security architecture to protect your assets and data before, during, and after transactions.

Principle of Least Privilege

  • Exact Authorization: Each transaction only approves the exact amount needed, avoiding unlimited approvals.
  • Amount Verification: System compares UI-displayed amount with actually submitted amount to prevent tampering.
  • Batch Limits: Maximum $100,000 per transaction, $500,000 per batch.

Rate Limiting

  • Batch Payments: Maximum 3 per hour
  • Single Payments: Maximum 10 per minute
  • API Requests: Automatic detection and blocking of anomalous traffic

Address Validation & Tamper Protection

  • EIP-55 Checksum: Validates mixed-case address format to detect input errors.
  • Homograph Detection: Identifies visually similar malicious characters (e.g., Cyrillic letters).
  • Integrity Hash: Stores address hash values, re-verified before each transfer.

Audit Logging

  • Operation Records: All payments, modifications, and logins are logged.
  • Address Change Tracking: Complete history of vendor wallet address modifications.
  • IP/Device Logging: Anomalous access can be traced.

Transaction Lifecycle Security

Pre-Transfer
Input Sanitization - Filters SQL injection, XSS attacks, invisible Unicode characters; Address Validation - EIP-55 checksum + homograph detection; Amount Verification - Range, precision, and limit checks.
During Transfer
Integrity Hash - Client generates transaction parameter hash, server verifies consistency; Rate Check - Real-time rate limiting prevents malicious spamming; Audit Recording - Operations immediately written to logs.
Post-Transfer
Transaction Verification - Status updated after on-chain confirmation; Anomaly Alerts - Failed or suspicious transactions automatically trigger security alerts; History Protection - Database RLS policies prevent unauthorized access.
Long-Term Storage
Address Hash Verification - Periodic verification that vendor addresses have not been tampered with; Change History - Complete records retained for all address modifications; Access Control - Row-Level Security (RLS) ensures data isolation.

Malicious Content Protection

Malicious Text / Garbage Data

Automatically filters invisible characters, zero-width characters, control characters.

Malicious Contract Addresses

Checksum validation + optional blacklist checking.

Injection Attacks

SQL/XSS/script tags completely filtered.

Is Protocol Bank Safe?

Yes. We operate on a strict Zero-Trust / Client-Side Execution model. The application runs entirely in your browser. Your private keys are managed solely by your wallet (MetaMask, Ledger, etc.) and are never exposed to our servers. We cannot access or move your funds.

Where are my funds held?

Your funds always remain in your own non-custodial wallet or on the blockchain itself. Protocol Bank is simply an interface (a "frontend") to interact with the blockchain. We do not hold user deposits.

Is my data private?

Blockchain Data: All transactions are public on the blockchain. This is the nature of Web3.
Metadata (Tags & Notes): Your custom data (Vendor Names, Categories, Notes) is encrypted and stored separately. We utilize Row-Level Security (RLS) to ensure that only your authenticated wallet address can read or write this data.

Audited & Verified Secure

Important: User Responsibility Disclaimer

While Protocol Bank implements robust security measures to protect you from common risks, you are ultimately responsible for your own security. This includes but is not limited to:

  • Safeguarding your private keys and seed phrases - never share them with anyone.
  • Verifying recipient addresses before confirming any transaction.
  • Using hardware wallets for large holdings.
  • Keeping your browser, wallet extensions, and devices updated and secure.
  • Being vigilant against phishing attacks and social engineering.

Protocol Bank provides tools and safeguards, but cannot be held liable for losses resulting from user negligence, compromised devices, phishing attacks, or actions outside our control. Cryptocurrency transactions are irreversible. Please proceed with caution.

Advanced Blockchain Security

Protocol Bank implements cutting-edge protections against sophisticated blockchain attack vectors. Our pre-transaction security analysis automatically scans for these threats before any funds leave your wallet.

Proxy Contract Backdoors

Malicious upgradeable contracts can change behavior after deployment.

  • • Bytecode analysis for proxy patterns
  • • Detection of upgrade functions
  • • Verified contract whitelist checking
  • • Self-destruct capability warnings

Signature Phishing

Malicious dApps trick users into signing harmful messages.

  • • EIP-712 typed data validation
  • • Domain name verification
  • • Unlimited approval detection
  • • Spender address analysis

Flash Loan Attacks

Attackers manipulate prices within a single transaction block.

  • • Large transaction warnings
  • • Price impact analysis
  • • MEV/sandwich attack detection
  • • Private mempool recommendations

Cross-Chain Bridge Attacks

Bridge exploits have caused billions in losses.

  • • Official CCTP contract verification
  • • Destination chain validation
  • • Amount limit enforcement
  • • Recipient address verification

Double Spending

Duplicate transactions or nonce manipulation attacks.

  • • Pending transaction tracking
  • • Nonce conflict detection
  • • Duplicate transaction warnings
  • • 30-second rapid-fire protection

Malicious Approvals

Unlimited token approvals can drain your entire balance.

  • • Max uint256 approval detection
  • • Exact-amount approval enforcement
  • • Existing approval scanning
  • • Safe approval calculation

Pre-Transaction Security Check

Before any transaction is submitted to the blockchain, Protocol Bank performs an automated security analysis. You will see a modal displaying:

Risk Assessment

SAFELOWMEDIUMHIGHCRITICAL

Security Checks

  • ✓ Contract Verification
  • ✓ Double Spend Protection
  • ✓ Flash Loan Risk Analysis
  • ✓ Signature Safety (if applicable)
  • ✓ Bridge Security (if cross-chain)

Note: Transactions with CRITICAL risk level will be blocked. For HIGH/MEDIUM risk, you must acknowledge the warnings before proceeding.

Transaction Simulation

For complex transactions, Protocol Bank can simulate the outcome before submission usingeth_call. This allows you to preview:

  • • Whether the transaction will succeed or revert
  • • Estimated gas consumption
  • • Potential revert reasons (decoded from error data)