Overview
As the registry moderator, you review attack requests and decide whether to approve or reject them.Approve a Request
If the request passes review:- State changes to
UNDER_ATTACK - Safe Harbor protection begins
- Whitehats can attack
Reject a Request
If the request fails review:- State returns to
NOT_DEPLOYED - Contract mappings cleared
- Protocol can resubmit with fixes
Review Checklist
Before deciding, verify:- Deployment method: Deployed via BattleChainDeployer?
- Not a copycat: Bytecode doesn’t match mainnet contracts
- Legitimate protocol: Has web presence, audit reports, valid contacts
- Reasonable terms: Bounty percentage in normal range (5-15%)
- Clear scope: All contracts properly defined
Check Deployment Method
Timing
| Scenario | Action |
|---|---|
| Clear approval | Approve immediately |
| Clear rejection | Reject with feedback |
| Needs investigation | Decide before 14-day deadline |
| Approaching deadline, uncertain | Reject to reset clock |
If no action is taken within 14 days, the agreement auto-promotes to
PRODUCTION.Batch Processing
Process multiple requests efficiently:How to Use Instant Promotion
Handle emergency copycat situations