Skip to main content

Overview

The Webacy API uses a modular approach to risk assessment. Select specific modules to optimize performance and focus on relevant risk categories.
When selecting specific modules, the risk score reflects only the selected modules, not a comprehensive view of the address’s risk profile.

Available Modules

Security Essentials

Essential security checks for real-time applications. Risk Tags: not-renounced, freezeable, mintable Use Cases: Trading interfaces, wallet integrations, real-time screening

Governance Analysis

Contract ownership, upgradeability, and access controls. Risk Tags: hidden_owner, can_take_back_ownership, is_proxy, access_control, unprotected_upgrade, anti_whale_modifiable, slippage_modifiable, upgradeable_contract, trust_list Use Cases: DeFi protocol analysis, smart contract auditing, governance evaluation

Token Security

Token manipulation capabilities and restrictions. Risk Tags: freezeable, mintable, is_blacklisted, is_whitelisted, owner_change_balance, transfer_without_approval, privileged_burn, oversupply_minting, trading_cooldown, transfer_pausable, buy_tax, sell_tax, is_anti_whale, non-transferable, is_burnable Use Cases: Token screening, DEX listings, portfolio management, trading bot integration

Contract Analysis

Static and dynamic code analysis with vulnerability detection. Risk Tags: is_closed_source, selfdestruct, external_call, reentrancy vulnerabilities, integer overflow/underflow, front-running variants, mint risks, centralized_risk, price_manipulation, locked_ether, weak_prng, timestamp issues, 50+ additional vulnerability tags Use Cases: Security audits, DeFi risk assessment, smart contract due diligence

Market Data

Price, volatility, market cap, and liquidity analysis. Risk Tags: volatility, market_cap, is_in_dex, cannot_buy, is_honeypot, honeypot_with_same_creator Use Cases: Trading algorithms, market analysis, portfolio optimization

Holder Analysis

Token distribution and concentration risks. Risk Tags: Top-10-holders percentages (10%-100%), minter/owner/update-authority ownership percentages Use Cases: Investment research, rugpull prevention, tokenomics analysis, whale monitoring

Liquidity Analysis

Pool data, unlock schedules, and LP analysis. Risk Tags: unlocked-liquidity, lp_holder_count, lp_total_supply, creator_balance, creator_percent, owner_balance, owner_percent Use Cases: DeFi investments, yield farming, liquidity provision, rugpull prevention

Fraud Detection

Malicious actor and rugpull detection. Risk Tags: hacker, drainer, associated variants, rugged, stealing_attack, financial_crime, cybercrime, exploitation, fundflow associations Use Cases: AML compliance, fraud prevention, risk screening, security monitoring

Sanctions Compliance

Regulatory compliance and sanctions screening. Risk Tags: sanctioned, associated_sanctioned, ofac_sanctioned, OFAC associations, fundflow_ofac Use Cases: Compliance programs, regulatory reporting, KYC/AML, institutional trading

Mixer Detection

Privacy coin and mixer usage detection. Risk Tags: mixer, associated_mixer, tornado, associated_tornado, mixer services, fixedfloat, simpleswap, fundflow variants Use Cases: AML compliance, transaction monitoring, regulatory reporting

Address Behavior

Trading patterns and behavioral analysis. Risk Tags: wash_trading, automated_trading, money_laundering, darkweb_transactions, malicious_mining_activities, blackmail_activities, phishing_activities, deployed_high_volatility_token, malicious_contracts_created Use Cases: Behavioral analysis, fraud detection, compliance monitoring, bot detection

Transaction Analysis

Transaction-level risk detection. Risk Tags: address_poisoning Use Cases: Wallet security, transaction monitoring, attack prevention

Reputation Analysis

Community reports and reputation scoring. Risk Tags: blacklist_doubt, spam_domain, spam, valid_report, fake_kyc, is_fake_token, is_true_token, is_scam, illegal_unicode, is_airdrop_scam Use Cases: Community-driven security, reputation systems, scam prevention

Chain-Specific Modules

Solana Specific

Risk Tags: has_been_sniped, bundled_token, mutable-metadata, recently minted tokens, impersonator, known-malicious-token

TON Specific

Risk Tags: is_nonstandard_jetton, is_nonstandard_jetton_wallet

Basic Info

Fast metadata checks for quick screening. Risk Tags: insufficient_wallet_age, insufficient_wallet_balance, insufficient_wallet_transactions
Use CaseModules
Real-Time Tradingsecurity_essentials
Security Analysistoken_security, fraud_detection, sanctions_compliance, contract_analysis
Investment Researchmarket_data, liquidity_analysis, holder_analysis, governance_analysis
AML Compliancesanctions_compliance, fraud_detection, mixer_detection, address_behavior
Comprehensivesecurity_essentials, token_security, fraud_detection, sanctions_compliance, market_data, liquidity_analysis

Usage Example

curl -X GET "https://api.webacy.com/addresses/0x...?chain=eth&modules=security_essentials,fraud_detection" \
  -H "x-api-key: YOUR_API_KEY"