β GET - /api/audit/<network>/<contract>
This API endpoint performs an audit of a specified token contract on a supported blockchain. It identifies potential vulnerabilities and provides metadata on the token.
Request
URL:
/api/audit/<network/<contract>Method:
GETContent-Type:
application/json
Body
NoneResponse
Success Response (200 OK)
{
audit: {
contract: string;
chain: SupportedChain;
open_source: boolean;
contract_type: ContractType;
creator?: string;
hash?: string;
safe: boolean;
description?: string;
vulnerabilities?: Vulnerability[];
name?: string;
symbol?: string;
total_supply?: number;
logo?: string;
tokenDescription?: string;
holders?: TokenHolder[];
}
}Error Response
Examples
Additional types
Vulnerability Types Explained
UnlimitedMinting
Owner can mint unlimited tokens or manipulate the total supply, leading to inflation and value dilution.
UnauthorizedTransfer
Owner can transfer tokens directly from user wallets without their consent, effectively stealing funds.
HiddenFees
Hidden or owner-adjustable transfer fees that can be changed at any time, allowing the owner to drain value from transactions.
LiquidityDrain
Owner can withdraw contract funds or liquidity pool assets, commonly known as a "rug pull".
MaliciousUpgrade
Unrestricted upgrade patterns or self-destruct functions that allow the owner to change contract behavior or destroy it entirely.
UnsafeExternalCall
Unsafe external calls or reentrancy vulnerabilities that can be exploited to drain funds or manipulate contract state.
ApprovalAbuse
Mechanisms designed to trick users into granting unlimited token allowances, enabling future theft of funds.
Last updated