Interlock & ThreatSlayer AI:  A Powerful Synergy Protecting Web3

The Web3 space is exciting and full of opportunities, but it's also a hotbed for scams and exploits. That's where Interlock steps in, providing a suite of security tools to protect users. And now, with the introduction of ThreatSlayer AI and its dedicated $SLAYER token, Interlock is taking Web3 security to the next level

We're integrating ThreatSlayer AI directly into our ThreatSlayer extension to significantly boost its threat detection capabilities, while enhancing product capabilites for both ecosystems.

Here's how AI Agents will make ThreatSlayer even more powerful:

Threat Detection and URL Analysis

ThreatSlayerAI will evaluate links from the ThreatSlayer security browser extension while enhancing the speed and effectiveness of our unique Security Staking feature. It will operate autonomously, eliminating the need for users to evaluate links one-by-one. This will allow for rewards for URL reporting to be delivered quickly and accurately

(New to Interlock? ThreatSlayer is our free browser security extension that rewards users $ILOCK for sharing security info. You can earn a 30% yield on $ILOCK by helping us identify dangerous sites and correcting our existing threat detection. Interlock will sell the shared security data as a B2B product, Learn about our business model here.)

New Scam URL Aggregation

The AI agent will actively collect new scam URLs shared across social media platforms like X and Discord, expanding its threat database. Since ThreatSlayer currently only works on desktop browsers, this allows us to protect users from scams shared in these popular communication channels. The AI will also add new known good sites in Web3 more quickly, reducing false positives.

Malicious Wallet and Smart Contract Addresses

ThreatSlayerAI will scan websites found by users of ThreatSlayer to identify wallets and smart contracts, assessing their potential malicious nature, adding an extra layer of security for users.

Pattern Recognition and Fuzzing

The system will identify patterns in website URLs and employ fuzzing techniques to discover other potentially malicious sites, proactively expanding its threat detection capabilities. This attack is commonly known as a “homograph attack”

User Query Interface

While primarily operating in the background, ThreatSlayerAI will be able to be queried by users seeking specific data or insights into the threats we’ve discovered.

Data Processing and Refinement

ThreatSlayerAI will process submitted data, removing duplicates and false positives to maintain a clean, accurate database of threats. This structure will allow ThreatSlayerAI to function as a powerful, largely autonomous tool in the cybersecurity landscape, combining advanced AI capabilities with user-submitted data to create a robust and efficient threat detection and reporting ecosystem.

$ILOCK and $SLAYER: A Symbiotic Relationship

  • $ILOCK: Main utility token for Interlock's security platform
  • $SLAYER: Token for AI-powered security features

How They Work Together

  1. Token Lock: A portion of $ILOCK tokens are locked by the founders.
  2. Shared Utility: $SLAYER uses some of $ILOCK's core features (e.g., threat detection, data sharing).
  3. Contribution Model: When people buy $SLAYER, a small percentage goes back to $ILOCK as liquidity

    Incentive Structure:
  1. $ILOCK holders get stronger liquidity and reasons to hold
  2. $SLAYER holders gain access to Interlock's security ecosystem
  3. Both token holders benefit from shared security data and features
  4. Dual Token Benefits: Holding both $ILOCK and $SLAYER will maximizes rewards and will allow access to elite “ThreatHunters” community(TBA) for higher rewards

    Advantages
  5. For $ILOCK: Increased liquidity,  user engagement, and stronger security data
  6. For $SLAYER: Access to established security infrastructure
  7. For Users: More comprehensive security solutions and potential for higher rewards
  8. For Developers & Partners: Creates a larger, more engaged ecosystem


Token Holding Benefits

$ILOCK:

  • Security transaction fees within ThreatSlayer act as rewards for holders of ILOCK
  • Premium access and features on ThreatSlayer extension
  • Staking rewards from revenue % earned via B2B sales
  • Security Staking rewards (30%) on identifying mis-classified sites
  • Must hold both to access ThreatHunters community (TBA)

$SLAYER: 

  • SLAYER token holders might gain early or exclusive access to new AI security features and products developed by the platform.
  • Owning SLAYER tokens could grant voting rights on proposed changes or upgrades to the AI security systems, allowing holders to influence the project's direction.
  • SLAYER staking rewards from revenue percentage  earned from AI services
  • Must hold both to access ThreatHunters community (TBA)

Roadmap for ThreatSlayerAI

Phase 1: Foundation and Initial Launch (0-3 Months)

ThreatSlayer AI Deployment:

- Launch AI-powered security scanning for X, Telegram, and Discord URLs

- Security staking automation

Security Protocol:

- Implement manual oversight for URLs

- Restrict direct user interaction with AI to prevent misuse

$SLAYER Token Launch:

- Launch $SLAYER token on a suitable DEX/CEX

- Implement a burn structure

Phase 2: Enhancement and Community Engagement (3-6 Months)

Community Involvement:

- Establish a system for community-reported vulnerabilities via Discord, Telegram, and X

- User interface to query for information and burn

AI Capability Upgrade:

- Improve ThreatSlayer's algorithms based on new vulnerability data

- Expand scanning and reporting capabilities to multiple blockchains

- Pattern recognition and fuzzing

- Wallet and contract address aggregation

Governance Groundwork:

- Plan and structure a DAO for ThreatSlayerAI governance

Staking Mechanism:

- Implement $SLAYER staking for access to advanced features and governance rights

Phase 3: Ecosystem Growth and Autonomy (6-18 Months)

Autonomous Operations:

- Gradually implement fully autonomous URL scanning detection and mitigation

B2B Sales and Revenue:

- ThreatSlayerAI assists in cleaning classifying security data which is sold

- Revenue sharing implementation

Protocol Integration:

- Develop plug-and-play security modules for easy integration with other protocols

- Position ThreatSlayerAI as a security standard in the Web3 space

Phase 4: Full-Scale Operations and Innovation (18+ Months)

Cross-Chain Expansion:

- Extend ThreatSlayerAI capabilities across multiple blockchain networks

- Achieve full autonomous operation on all supported chains

DAO Activation:

- Transition to full DAO governance for ThreatSlayerAI

Developer Toolkit:

- Launch API and developer tools for on-demand security scans

Industry Collaboration:

- Partner with leading cybersecurity firms to establish blockchain security standards

Stay Informed with Interlock's Latest News and Insights

ThreatSlayer Unleashes Rewards System and Security Staking to Crowdsource Web3 Security
Exciting news! We just launched two awesome new features for ThreatSlayer, our Web3 cybersecurity browser extension: security staking and the $ILOCK utility token. These additions are a game-changer, enabling us to build a truly incentivized, crowdsourced internet security community!
Read More
Interlock Token Launch: Navigating the CEX Maze and Choosing a Sustainable Path
Get an inside look at what it's it's like negotiating the minefield of centralized exchanges and our launch strategy.
Read More
The Scoop: Recent Update
We’re excited to share our latest accomplishments, including new milestones, a new ThreatSlayer, spaces, Ambassador Corner debut, and more!
Read More

Browse Safely. Earn Generously.

Checklist
Easy Install
Checklist
Earn Rewards
Checklist
AI Protection