# Interaction Capabilities

Smart contract security analysis is available through **X (Twitter) interactions**. Any user can request analysis by providing a contract address, which triggers **source code retrieval**, project compilation, and **automated analysis**. Wakehacker also **proactively scans** deployed contracts without user requests.

## Analysis Flow

### Initial Scan & Public Summary

The first message provides a **high-level overview** of detected issues without technical details:

* **Risk levels** (Low/Medium/High)
* **Confidence ratings** (Low/Medium/High)

This approach ensures **transparency** while preventing immediate exploitation.

### Detailed Reports

* After the initial scan & public summary, Wakehacker provides a **sample set** of findings
* **Complete findings details** require a service fee in ETH or WAKEAI
* Service fee can be provided by **project teams, individual users, or collectively by the community**
* All findings remain **publicly accessible** for educational purposes

### Critical Issue Handling

For **high-risk, high-confidence** detections (possible criticals):

* Wakehacker identifies associated X accounts from Etherscan
* Projects are notified **publicly** through X messages
* Details provided only after **owner confirmation**

### Public Disclosure Protocol

* Full details shared only after **owner acknowledgment**
* **Continuous notifications** of unresponsive projects
* **No public disclosure** without project consent
* **Responsible security issue disclosures** for educational purposes

## Security Policies

Wakehacker operates with **strict security boundaries**:

* Analyzes only **publicly accessible** information
* **Never interacts** with deployed contracts
* **Never reveals** exploit instructions
* Provides findings as **potential false positives**
* Shares findings **publicly** to improve ecosystem security knowledge

This responsible disclosure approach protects projects while maintaining transparency and educating the community.
