Know what you’ve approved.
How Allowance Guard Works
From connection to revocation in under a minute. Three steps, full control.
Connect & Scan
Link your wallet or paste any address. We read public blockchain data — your keys never leave your device.
See the Risk
Every approval gets a risk score. Unlimited amounts, unverified contracts, and known threats are flagged instantly.
Revoke & Secure
One click to revoke. Batch multiple approvals to save gas. Every transaction signs in your own wallet.
Built for Security & Clarity
Every feature earns its place. If it doesn't make your wallet safer, it doesn't ship.
Non-Custodial by Default
Your keys stay in your wallet. We read public data, you sign every transaction. No permissions to move funds, ever.
Dashboard Built for Decisions
Every approval, risk score, and action in one view. No jargon. No hunting. See your security posture and act on it.
Real-Time Risk Scoring
Each approval is scored against live threat data — flagging unlimited amounts, unverified code, and known exploit contracts.
Batch Revoke, Less Gas
Revoke multiple approvals in one transaction. Optimised contracts keep gas costs low so security stays affordable.
Take Back
Control.
Scan your wallet in under a minute. No account needed, no keys shared.
No email required · Read-only blockchain access · Open source core
Used by People Who Verify Everything
Traders, developers, and DAOs running AllowanceGuard on their own wallets.
Found 15 unlimited approvals I had completely forgotten about. Revoked them all in one session. The risk breakdown per approval is what sold me — I can see exactly why something is flagged.
I interact with 30+ dApps across Ethereum and Base. Batch revoke cleared out 40 stale approvals in one transaction. Gas cost was less than a single manual revoke would have been.
Open source was non-negotiable for our DAO. We audited the code ourselves before onboarding. The team dashboard lets our multisig signers review approvals before governance votes.
I use the API to check allowances across Ethereum, Arbitrum, and Base in our internal tooling. Clean endpoints, predictable responses. Integrated it in an afternoon.
Monitoring caught an approval to a contract that got exploited two days later. The alert came in before the exploit hit Twitter. That alone justified the Pro subscription.
I walk students through AllowanceGuard in every workshop. The risk scores give them a concrete way to understand approval danger — not abstract theory, but their own wallet data.
Securing wallets across
15 EVM chains. One dashboard.
