API Reference

Here is an overview of risks and scams your dApp will be able to detect with W3A API.

Critical risks

This category features critical risks that can lead to asset theft or significant transaction restrictions.

RiskMechanismCoverage
Phishing websiteA scam website that pretends to be a well-known and reliable project (ex. use of homoglyphs or typosquatting) and manipulates users into revealing their crypto wallet credentials, clicking on malicious links, or signing dangerous signature requests.
Wallet drainerA malicious transaction that allows scammers to steal most of a user's ETH and ERC-20 tokens.
HoneypotA token that will be almost impossible to transfer or sell due to high commission fees or contract restrictions.
Fake tokenA fake token that exploits the original token’s address in its name.
Wash traded tokenA token with artificially inflated price and demand.
Poisoning attackA transaction with a scam address that mimics an address a user has interacted with before. The fake address appears in the user’s transaction history as a result of a poisoning attack.
Risky token approvalsApprovals to malicious or compromised dApps.
Token management restrictionsA token that does not allow its holder to transfer or grant approvals for it.
Risky contract permissionsA token that allows its contract owner to manage it as they see fit: transfer, burn, block or grant token approvals without the holder’s consent.
ERC-20/ETH direct transferA risky transaction that will transfer your assets but guarantees no assets in return.
Scam zero addressA malicious transaction involving a fake address that mimics 0x00000...00000 address.
Suspicious deployerA transaction with a wallet address that took part in malicious contract creation.
Anti-whale restrictionsA contract that restricts the number of token transactions if there is an excessive amount of specific tokens on a user’s balance.
Contract self-destructionA contract can self-destruct, potentially leading to the loss of assets.
Metamorphic contractA contract owner can change its code as they like and potentially make it malicious.
Oversupply mintingA contract that allows for token minting beyond the maximum supply limit, which can negatively affect the token price.
No DEX pairA token that has no trading pair and thus can’t be sold.
Volatile token liquidityA token with a weak DEX pair, which may negatively affect the token price when selling.

Moderate risks

While these risks are categorized as moderate, they can still have a negative impact on asset security and the transaction process.

RiskMechanismCoverage
ETH lockA contract can lock ETH, causing a user to lose their tokens.
Custom block- and allowlistsA contract owner can add users to their special allow and blocklists, potentially restricting their token transactions.
Hidden token mintingA contract owner can secretly mint as many new tokens as they wish, which can negatively affect the token price.
Reentrancy attacksA contract is prone to reentrancy attacks that target ETH and other tokens. It may allow scammers to continuously call the withdraw function and drain the contract funds.
Unchecked transfer and sendA contract transfers and sends assets without validating the transfer's successful completion. If it fails, a user won't receive any assets or get back the tokens sent.
Delegated callA contract can delegate calls to other contracts, which could result in unpredictable outcomes.
Obsolete functionalityA contract uses an outdated tx.origin function, which makes it vulnerable.
Incorrect ERC-721/ERC-20 interfaceAn incorrect ERC-721/ERC-20 contract interface results in reduced functionality or deviation from generally accepted workflow.
Arbitrary send ETH/ERC-20A contract can send ETH/ERC-20 tokens to random addresses.
Upgradable contractA contract can upgrade, which could result in unpredictable outcomes.
Trading cooldownA contract can restrict a user’s number of transactions for some time.
Hardcoded logicA contract has hardcoded addresses, which can be a sign of suspicious activity.

Suspicious activity

This category highlights illegal or dangerous activities contracts and wallet addresses were involved in.

ActivityMechanismCoverage
Terrorist financingAn address associated with terrorist financing.
FakeAn address involved in the creation of fake assets.
ScamAn address involved in fraud schemes.
CompromisedAn address is compromised or can jeopardize a user's address.
MixerAn address belongs to a mixing service that enables anonymous and untraceable transactions.
SanctionsAn address is under sanctions.
ExchangeAn address linked to suspicious crypto exchanges.
Rug pullAn address involved in rug pull scams.
PonziAn address involved in Ponzi schemes.
ImpersonationAn address mimics some other address or is associated with such activity.
Contract exploitAn address exploits flaws in contracts’ or protocols’ logic to its advantage.
PhishingAn address involved in phishing.
GamblingAn address involved in gambling.
ExtortionAn address involved in extortion.
HeistAn address involved in asset theft.
BugAn address related to bugs on some contracts or projects.
TheftAn address involved in asset theft.
DarknetAn address related to the darknet.
SpamAn address that generates spam or is associated with such activity.
OtherThe suspicious activity of an address is not related to any specific category.