# Response mechanisms when malicious opcodes are detected

1. Once the machine learning model identifies potentially malicious opcodes, the threat oracle initiates a predefined response protocol. This could include:
   * **Alerting:** Notifying system administrators or relevant stakeholders about the potential threat.
   * **Quarantining:** Temporarily isolating the suspicious contract to prevent its execution until further investigation.
   * **Log Request:** Triggering a deeper analysis or manual review of the suspicious contract recording a log.
   * **Mitigation Suggestions:** Allow for mitigation and tree-based analysis of the contract's structure and the calls it has made in cases where a malicious contract has already executed an attack (call graph)

These response mechanisms ensure that potential threats are promptly addressed, minimizing the risk and impact on the blockchain ecosystem.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://neurablock.gitbook.io/whitepaper/protection-oracle/response-mechanisms-when-malicious-opcodes-are-detected.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
