When submitting an Asset for threat detection, ChainPatrol will run our threat engine against all submitted assets to determine if they are malicious or impersonating your organization.If the asset passes an initial check, a report will be automatically created under your organization.
Enabling External Threat Sources for your Organization
Reach out to the ChainPatrol team to enable external threat sources for your organization. This will allow you to submit links to be scanned and added to your organization’s threat detection sources through the API.
Make a call to the Asset-Submit API with a list of the links that you want checked.Your ChainPatrol contact will confirm that submissions are being processed.