Interaction Capabilities
Smart contract security analysis is available through X (Twitter) interactions. Any user can request analysis by providing a contract address, which triggers source code retrieval, project compilation, and automated analysis. Wakehacker also proactively scans deployed contracts without user requests.
Analysis Flow
Initial Scan & Public Summary
The first message provides a high-level overview of detected issues without technical details:
Risk levels (Low/Medium/High)
Confidence ratings (Low/Medium/High)
This approach ensures transparency while preventing immediate exploitation.
Detailed Reports
After the initial scan & public summary, Wakehacker provides a sample set of findings
Complete findings details require a service fee in ETH or TOKEN
Service fee can be provided by project teams, individual users, or collectively by the community
All findings remain publicly accessible for educational purposes
Critical Issue Handling
For high-risk, high-confidence detections (possible criticals):
Wakehacker identifies associated X accounts from Etherscan
Projects are notified publicly through X messages
Details provided only after owner confirmation
Public Disclosure Protocol
Full details shared only after owner acknowledgment
Continuous notifications of unresponsive projects
No public disclosure without project consent
Responsible security issue disclosures for educational purposes
Security Policies
Wakehacker operates with strict security boundaries:
Analyzes only publicly accessible information
Never interacts with deployed contracts
Never reveals exploit instructions
Provides findings as potential false positives
Shares findings publicly to improve ecosystem security knowledge
This responsible disclosure approach protects projects while maintaining transparency and educating the community.
Last updated