ALGORITHM The algorithm uses a hybrid approach to analyzing token code, combining regular expressions with artificial intelligence. The analysis relies on patterns derived from historically identified vulnerabilities and unsafe practices. Regular expressions are used to detect obfuscation and violations of ERC-20 standards, while artificial intelligence is applied when the code contains complex or unusual anomalies that cannot be captured by pattern matching alone. The pattern database is regularly updated to reflect newly discovered issues and coding techniques. The token report is published instantly when the smart contract’s state meets the following criteria:
This field is evolving extremely rapidly, and code customization occurs constantly, which means that even reliable projects may sometimes not be recognized by the algorithm. Such cases are monitored, and analysis methods are regularly improved. At the same time, scammers also adapt their schemes, so the risk of missing a token with vulnerabilities remains. According to our test results, such errors occur in 1–4% of cases. All incidents are promptly reviewed, and the algorithm is updated accordingly. That’s exactly why we oppose using this data as a basis for trading. Even if no technical vulnerabilities are found in the published token, we cannot know the true intentions of its creator or their ability to promote the token. |