Overview
The Webacy API uses a modular approach to risk assessment. Select specific modules to optimize performance and focus on relevant risk categories.
When selecting specific modules, the risk score reflects only the selected modules, not a comprehensive view of the address’s risk profile.
Available Modules
Security Essentials
Essential security checks for real-time applications.
Risk Tags: not-renounced, freezeable, mintable
Use Cases: Trading interfaces, wallet integrations, real-time screening
Governance Analysis
Contract ownership, upgradeability, and access controls.
Risk Tags: hidden_owner, can_take_back_ownership, is_proxy, access_control, unprotected_upgrade, anti_whale_modifiable, slippage_modifiable, upgradeable_contract, trust_list
Use Cases: DeFi protocol analysis, smart contract auditing, governance evaluation
Token Security
Token manipulation capabilities and restrictions.
Risk Tags: freezeable, mintable, is_blacklisted, is_whitelisted, owner_change_balance, transfer_without_approval, privileged_burn, oversupply_minting, trading_cooldown, transfer_pausable, buy_tax, sell_tax, is_anti_whale, non-transferable, is_burnable
Use Cases: Token screening, DEX listings, portfolio management, trading bot integration
Contract Analysis
Static and dynamic code analysis with vulnerability detection.
Risk Tags: is_closed_source, selfdestruct, external_call, reentrancy vulnerabilities, integer overflow/underflow, front-running variants, mint risks, centralized_risk, price_manipulation, locked_ether, weak_prng, timestamp issues, 50+ additional vulnerability tags
Use Cases: Security audits, DeFi risk assessment, smart contract due diligence
Market Data
Price, volatility, market cap, and liquidity analysis.
Risk Tags: volatility, market_cap, is_in_dex, cannot_buy, is_honeypot, honeypot_with_same_creator
Use Cases: Trading algorithms, market analysis, portfolio optimization
Holder Analysis
Token distribution and concentration risks.
Risk Tags: Top-10-holders percentages (10%-100%), minter/owner/update-authority ownership percentages
Use Cases: Investment research, rugpull prevention, tokenomics analysis, whale monitoring
Liquidity Analysis
Pool data, unlock schedules, and LP analysis.
Risk Tags: unlocked-liquidity, lp_holder_count, lp_total_supply, creator_balance, creator_percent, owner_balance, owner_percent
Use Cases: DeFi investments, yield farming, liquidity provision, rugpull prevention
Fraud Detection
Malicious actor and rugpull detection.
Risk Tags: hacker, drainer, associated variants, rugged, stealing_attack, financial_crime, cybercrime, exploitation, fundflow associations
Use Cases: AML compliance, fraud prevention, risk screening, security monitoring
Sanctions Compliance
Regulatory compliance and sanctions screening.
Risk Tags: sanctioned, associated_sanctioned, ofac_sanctioned, OFAC associations, fundflow_ofac
Use Cases: Compliance programs, regulatory reporting, KYC/AML, institutional trading
Mixer Detection
Privacy coin and mixer usage detection.
Risk Tags: mixer, associated_mixer, tornado, associated_tornado, mixer services, fixedfloat, simpleswap, fundflow variants
Use Cases: AML compliance, transaction monitoring, regulatory reporting
Address Behavior
Trading patterns and behavioral analysis.
Risk Tags: wash_trading, automated_trading, money_laundering, darkweb_transactions, malicious_mining_activities, blackmail_activities, phishing_activities, deployed_high_volatility_token, malicious_contracts_created
Use Cases: Behavioral analysis, fraud detection, compliance monitoring, bot detection
Transaction Analysis
Transaction-level risk detection.
Risk Tags: address_poisoning
Use Cases: Wallet security, transaction monitoring, attack prevention
Reputation Analysis
Community reports and reputation scoring.
Risk Tags: blacklist_doubt, spam_domain, spam, valid_report, fake_kyc, is_fake_token, is_true_token, is_scam, illegal_unicode, is_airdrop_scam
Use Cases: Community-driven security, reputation systems, scam prevention
Chain-Specific Modules
Solana Specific
Risk Tags: has_been_sniped, bundled_token, mutable-metadata, recently minted tokens, impersonator, known-malicious-token
TON Specific
Risk Tags: is_nonstandard_jetton, is_nonstandard_jetton_wallet
Basic Info
Fast metadata checks for quick screening.
Risk Tags: insufficient_wallet_age, insufficient_wallet_balance, insufficient_wallet_transactions
Recommended Combinations
| Use Case | Modules |
|---|
| Real-Time Trading | security_essentials |
| Security Analysis | token_security, fraud_detection, sanctions_compliance, contract_analysis |
| Investment Research | market_data, liquidity_analysis, holder_analysis, governance_analysis |
| AML Compliance | sanctions_compliance, fraud_detection, mixer_detection, address_behavior |
| Comprehensive | security_essentials, token_security, fraud_detection, sanctions_compliance, market_data, liquidity_analysis |
Usage Example
curl -X GET "https://api.webacy.com/addresses/0x...?chain=eth&modules=security_essentials,fraud_detection" \
-H "x-api-key: YOUR_API_KEY"