Sentinel Security Agent

BETA — Phase 1 infrastructure.   Track record builds during the 90+ day seasoning window. Programmatic API access ships post-launch.

Open-World Track Record

Every newly-deployed contract on 17 chains is scanned by Sentinel's audit engine within hours of deployment. The verdict is logged before anyone knows whether the contract will be exploited. After a 90+ day seasoning window, predictions are cross-referenced against real exploits — yielding a defensible, time-stamped track record that can't be revised post-hoc.

Coverage: verified-source contracts get the full deterministic engine pass. Unverified contracts (bytecode-only) get pattern-matched against rug-pull signal selectors with findings capped at MEDIUM severity. Each row below is tagged with its audit mode.

Scanned
836
contracts audited at deploy time
Detections
408
48.8% of scans had ≥1 finding
High-severity
8
CRITICAL/HIGH source-mode
Correlated
0
predictions matched to exploits
Hit rate
n/a
of correlated predictions were TP

Per-chain coverage

Where the engine is currently scanning. Distribution reflects deployment volume, not selective focus. The High-severity column counts CRITICAL/HIGH source-mode findings only; bytecode-mode detections caps at MEDIUM and aren't included here (see the Detections card above for total any-severity detections including bytecode-mode rug signals).

ChainScannedHigh-severityRate
eth59110.2%
avalanche12200.0%
base5411.9%
bsc4812.1%
arbitrum900.0%
polygon800.0%
celo100.0%
linea100.0%
moonbeam11100.0%
optimism100.0%
Last cycle 2026-05-02 13:43:22 UTC
Next cycle scheduling…
Cadence every 4h 48m

How to read the Risk score

Every row is scored 0–100 from its severity counts. Higher = more concerning. Verified-source contracts can reach 100; bytecode-only signals cap at 60 because pattern-matching on unverified bytecode can't reliably claim CRITICAL severity (precision discipline, not a missing feature).

80–100 Critical Multiple HIGH or any CRITICAL severity finding from verified-source analysis. Treat as actionable now — review the contract before any interaction.
60–79 High Either 1–2 HIGH-severity source findings or a fully-loaded bytecode rug profile (mint + blacklist + selfdestruct selectors stacked together).
30–59 Medium A typical bytecode-only signal load (2–3 rug-pattern selectors detected) or one source HIGH-severity finding alone. Worth reviewing.
1–29 Low A single MEDIUM/LOW finding — usually a structural concern (e.g. ownership pattern present) rather than an active rug signal.
0 Clean No rug-signal selectors detected. Doesn't mean "safe to use" — means "no pattern matched the engine's rule set." Always do your own due diligence.

Score formula: CRITICAL×55 + HIGH×30 + MEDIUM×12 + LOW×4 (capped at 100 source / 60 bytecode). Hover any row's score to see the exact severity breakdown that produced it. The verified-source / bytecode badge next to each address tells you which scoring ceiling applies.

Token risks & rug indicators

Newly-deployed tokens whose code shows rug-pull or honeypot signatures: hidden approvals, owner-drainable treasuries, fee-on-transfer pool drains, uncapped mints, and similar token-class concerns. Click any row's findings to see the full list.

ChainAddressScannedWhat an attacker can doRisk
eth0xee2b…1ed7 bytecode2026-05-02 13:05:07 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Contract can self-destruct and drain ETH (bytecode signal)24
eth0x9f66…fd67 bytecode2026-05-02 13:04:49 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Ownership is renounceable — verify it actually was renounced12
eth0x4c97…5cd6 bytecode2026-05-02 13:04:10 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Ownership is renounceable — verify it actually was renounced12
eth0x118e…defa bytecode2026-05-02 13:04:01 UTCContract has an owner — privileges may not be renounced0
eth0x02e4…b9b0 bytecode2026-05-02 13:03:57 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug12
eth0xa5ec…4bd0 bytecode2026-05-02 13:03:37 UTCContract has an owner — privileges may not be renounced · Ownership is renounceable — verify it actually was renounced · Trading was/is gated by owner (bytecode signal)12
eth0x0833…2976 bytecode2026-05-02 13:03:15 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Ownership is renounceable — verify it actually was renounced12
eth0xe85d…d8df bytecode2026-05-02 13:02:47 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug12
eth0x42a3…aeb6 bytecode2026-05-02 13:02:23 UTCContract has an owner — privileges may not be renounced · Ownership is renounceable — verify it actually was renounced · Trading was/is gated by owner (bytecode signal)12
eth0xf211…a979 bytecode2026-05-02 13:01:57 UTC
Owner can mint extra supply (bytecode signal) · Contract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · …
  • Owner can mint extra supply (bytecode signal)
  • Contract has an owner — privileges may not be renounced
  • Owner can transfer admin to a fresh wallet pre-rug
  • Ownership is renounceable — verify it actually was renounced
24
eth0xe894…06e5 bytecode2026-05-02 13:01:50 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Ownership is renounceable — verify it actually was renounced12
eth0xeb3b…8dce bytecode2026-05-02 13:01:46 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug12
eth0xa50a…4ade bytecode2026-05-02 13:01:26 UTCContract has an owner — privileges may not be renounced · Ownership is renounceable — verify it actually was renounced · Trading was/is gated by owner (bytecode signal)12
eth0x258c…8094 bytecode2026-05-02 13:01:07 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug12
eth0x74e6…b2fa bytecode2026-05-02 13:00:51 UTCContract has an owner — privileges may not be renounced0
eth0xe3eb…1f70 bytecode2026-05-02 13:00:42 UTCContract can self-destruct and drain ETH (bytecode signal)12
eth0x9e57…ea4a bytecode2026-05-02 13:00:33 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Ownership is renounceable — verify it actually was renounced12
eth0x7413…a392 bytecode2026-05-02 13:00:28 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Contract can self-destruct and drain ETH (bytecode signal)24
eth0x78be…5cc8 bytecode2026-05-02 13:00:14 UTCOwner can halt all transfers (bytecode signal)12
eth0x1a94…ce6b bytecode2026-05-02 13:00:02 UTCContract has an owner — privileges may not be renounced · Ownership is renounceable — verify it actually was renounced0
eth0x978e…3214 bytecode2026-05-02 12:59:43 UTCContract has an owner — privileges may not be renounced · Ownership is renounceable — verify it actually was renounced · Trading was/is gated by owner (bytecode signal)12
eth0x5a21…056e bytecode2026-05-02 12:59:36 UTCContract has an owner — privileges may not be renounced · Ownership is renounceable — verify it actually was renounced0
eth0x3c7a…46d1 bytecode2026-05-02 12:59:35 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Ownership is renounceable — verify it actually was renounced12
eth0x17c4…3eea bytecode2026-05-02 12:59:28 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug · Contract can self-destruct and drain ETH (bytecode signal)24
eth0x6e8d…3dc4 bytecode2026-05-02 12:59:09 UTCOwner can halt all transfers (bytecode signal)12
eth0x4a0b…7827 bytecode2026-05-02 12:59:04 UTCContract has an owner — privileges may not be renounced · Owner can transfer admin to a fresh wallet pre-rug12
eth0x146b…fd7b bytecode2026-05-02 12:58:58 UTCContract has an owner — privileges may not be renounced · Ownership is renounceable — verify it actually was renounced · Trading was/is gated by owner (bytecode signal)12
eth0x2194…8900 bytecode2026-05-02 12:58:55 UTCContract can self-destruct and drain ETH (bytecode signal)12
eth0x93a1…afd6 bytecode2026-05-02 12:58:50 UTCContract has an owner — privileges may not be renounced · Ownership is renounceable — verify it actually was renounced0
eth0xca20…5d9b bytecode2026-05-02 12:58:47 UTCContract can self-destruct and drain ETH (bytecode signal)12
bsc0x83f1…c7e8 verified-source2026-05-01 15:36:00 UTCDrains tokens via hidden approval · Contract forces unwanted ETH inflow59
bsc0xadbe…4809 verified-source2026-04-29 03:56:58 UTC
Admin can drain treasury directly · External call return value ignored · Fee-on-transfer token can drain LP pool · …
  • Admin can drain treasury directly
  • External call return value ignored
  • Fee-on-transfer token can drain LP pool
  • Fee on transfer
84

DEX & MEV exposures

Newly-deployed contracts whose code is exposed to sandwich attacks, oracle manipulation, AMM-spot-price abuse, flashloan-driven governance hijacks, or first-depositor inflation.

ChainAddressScannedWhat an attacker can doRisk
base0xa6da…ff3c verified-source2026-04-30 00:22:56 UTC
Drains tokens via hidden approval · Trade can complete at any price · Outcome depends on miner timestamp · …
  • Drains tokens via hidden approval
  • Trade can complete at any price
  • Outcome depends on miner timestamp
  • Approval can be front-run for theft
  • State change emits no event (off-chain blind)
  • Hardcoded address can't be updated
  • Novel excessive external calls
  • Privilege concern flagged by AI review
100

Smart-contract vulnerabilities

Newly-deployed contracts flagged for general security concerns: reentrancy, arbitrary external calls, unsafe math, time-dependence, signature replay, and similar.

ChainAddressScannedWhat an attacker can doRisk
eth0x6228…e67e verified-source2026-05-02 12:54:56 UTC
tx.origin auth lets attacker impersonate user · Precision loss in division-then-multiply · Type cast truncates without check · …
  • tx.origin auth lets attacker impersonate user
  • Precision loss in division-then-multiply
  • Type cast truncates without check
  • Variable shadowing
  • Transfer gas stipend
  • Fee on transfer
  • Privilege concern flagged by AI review
90
eth0x7bc8…2d89 verified-source2026-05-01 13:59:27 UTC
Numeric overflow corrupts balances · Calls any address with attacker data · Outcome depends on miner timestamp · …
  • Numeric overflow corrupts balances
  • Calls any address with attacker data
  • Outcome depends on miner timestamp
  • Privileged function lacks proper guard
  • External-call concern flagged by AI review
  • Arithmetic concern flagged by AI review
100
eth0x8f57…19ec verified-source2026-04-29 23:45:41 UTC
Calls any address with attacker data · Math without overflow guards · Block data used without validation · …
  • Calls any address with attacker data
  • Math without overflow guards
  • Block data used without validation
  • Floating pragma
  • External call in unbounded loop
  • Push payment dos
  • Fee on transfer
  • External-call concern flagged by AI review
100
bsc0xdb60…d441 verified-source2026-04-29 03:56:57 UTC
ETH can be deposited but never withdrawn · Privileged function lacks proper guard · Precision loss in division-then-multiply · …
  • ETH can be deposited but never withdrawn
  • Privileged function lacks proper guard
  • Precision loss in division-then-multiply
  • Variable shadowing
  • Fee on transfer
100
moonbeam0x3e65…408c verified-source2026-04-25 22:01:18 UTC
Unbounded loop · Uncapped mint · Floating pragma · …
  • Unbounded loop
  • Uncapped mint
  • Floating pragma
  • Unsafe downcast no check
  • Hardcoded address can't be updated
100

Correlated exploits

True positives (engine flagged before exploit) and false negatives (engine missed) — the headline of the track record.

Seasoning in progress

No correlated exploits yet. The track record is built by waiting — predictions are recorded at scan time and cross-referenced against real exploits as they surface in the wild. The 90+ day window prevents post-hoc selection bias.

How the track record is built

  1. Continuous scanning: every newly-deployed contract on supported chains is audited automatically. Verified-source contracts run through the full deterministic engine that powers paid audits. Unverified contracts are bytecode-pattern-matched against rug-pull signal selectors — these findings carry a bytecode badge and are capped at MEDIUM severity.
  2. Tamper-proof commitment: each verdict is recorded together with a cryptographic fingerprint of the engine version, so predictions cannot be revised after the fact.
  3. Pre-exploit-only TP rule: a prediction only counts as a true positive if it was logged BEFORE the exploit timestamp. Anything else is excluded — no post-hoc selection.
  4. Periodic correlation: logged predictions are cross-referenced against curated exploit feeds at regular intervals. Outcomes are written back as TP / FN.
  5. Public surface: this page. Programmatic access ships after the seasoning window closes.

Last data point: 2026-05-02 13:43:22 UTC · Engine version 4.2.0 · No retroactive edits possible