🧞 Crypto Genie v2.0
Your AI-powered cryptocurrency safety assistant for OpenClaw
Analyzes crypto addresses for phishing, honeypots, rug pulls, and ponzi schemes using a local database with background sync from Etherscan. Zero external API calls during user checks = instant results!
✨ What's New in v2.0
🚀 Major Architecture Upgrade
- - ✅ Database-first design - All checks query local SQLite database
- ✅ Instant results - No API latency during checks (<5ms)
- ✅ No rate limits - User queries never hit Etherscan API
- ✅ Background sync worker - Separate process pulls from Etherscan
- ✅ Transaction message analysis - Decodes and analyzes hex data
- ✅ Auto-queue system - Unknown addresses automatically queued for sync
- ✅ Deep scanning - Detects suspicious keywords in transaction data
🔍 Enhanced Detection
Now catches scams the old version missed:
- - ✅ "Lazarus Vanguard" hacking group references
- ✅ "Orbit Bridge Hacker" mentions
- ✅ Private key phishing attempts
- ✅ Exploit recruitment messages
- ✅ And much more...
📦 What's Included
CODEBLOCK0
🚀 Quick Start
1. Install
CODEBLOCK1
2. Configure Etherscan API Key (Optional but Recommended)
Option A: Interactive Setup (Encrypted storage)
CODEBLOCK2
Option B: Environment Variable
CODEBLOCK3
Get free API key: https://etherscan.io/myapikey
3. Check an Address
CODEBLOCK4
4. Run Background Sync Worker
Manual mode:
CODEBLOCK5
Batch mode:
CODEBLOCK6
Cron schedule (recommended):
CODEBLOCK7
💡 How It Works
Architecture Flow
CODEBLOCK8
User Flow
- 1. Check address: INLINECODE0
- If in database: Instant results with full analysis
- If NOT in database:
- Returns "unknown" status
-
Automatically adds to sync queue
- Shows: "⏳ Check again in a few minutes"
- 4. Background worker syncs it (next cron run or manual trigger)
- Check again: Full analysis now available
🔍 Detection Capabilities
Scam Types Detected
| Type | Detection Method |
|---|
| Phishing | Keyword analysis: "private key", "seed phrase", "verify wallet" |
| Honeypot |
Contract code analysis (unverified contracts) |
|
Rug Pull | Transaction pattern analysis |
|
Exploit Groups | Keywords: "Lazarus", "hack", "exploit", "breach" |
|
Social Engineering | Keywords: "urgent", "claim reward", "airdrop winner" |
Risk Scoring
Algorithm factors:
- - Suspicious transaction count (+25 per TX, max +50)
- Account age (new addresses: +10)
- Balance patterns (large balance + suspicious TX: +20)
- Contract verification (unverified: +30)
Risk Levels:
- - 0-19: ✅ Low Risk
- 20-49: ℹ️ Medium Risk
- 50-79: ⚠️ High Risk
- 80-100: 🚨 Critical Risk
📋 Commands Reference
Check Address
CODEBLOCK9
Sync Worker
CODEBLOCK10
Convenience Script
CODEBLOCK11
🎯 Example Output
Critical Risk Address
CODEBLOCK12
Unknown Address (Not Yet Synced)
CODEBLOCK13
⚙️ Configuration
Database Location
Default: INLINECODE1
Etherscan API Rate Limits
- - Free tier: 5 calls/second, 100,000 calls/day
- Each address: 4 API calls (balance, TX count, TX list, code)
- Default delay: 1.5 seconds between addresses (safe for free tier)
Recommended Cron Schedule
CODEBLOCK14
🛡️ Security
- - ✅ Encrypted API key storage - AES-256 with PBKDF2
- ✅ No third-party sharing - API key only sent to Etherscan
- ✅ Local processing - All analysis happens on your machine
- ✅ No telemetry - Zero data collection
- ✅ Open source - Fully auditable code
📊 Database Schema
Tables
- - addresses - Address info, risk scores, balances, metadata
- transactions - Suspicious transactions with decoded messages
- scamindicators - Individual red flags per address
- syncqueue - Addresses waiting to be synced
See DATABASE_ARCHITECTURE.md for full technical details.
🔄 Sync Frequency
Default behavior:
- - First check → address queued for sync
- Worker processes queue (manual or cron)
- Subsequent checks → instant from database
Recommended: Run worker via cron every 5-10 minutes
💻 OpenClaw Integration
Via Chat
CODEBLOCK15
Automatic Detection
When you check an address, OpenClaw:
- 1. Runs INLINECODE3
- If not in DB → queues for sync
- Returns current status
- Suggests checking again after sync
🐛 Troubleshooting
"Address not in database"
Solution: Wait for background worker to sync it, or manually trigger:
CODEBLOCK16
"Etherscan API key not configured"
Solution: Set API key via environment or setup wizard:
CODEBLOCK17
Rate limit errors
Solution: Increase delay between addresses:
CODEBLOCK18
📈 Performance
- - ✅ Check latency: <5ms (database query)
- ✅ Sync time: ~2 seconds per address (4 API calls)
- ✅ Database size: ~1KB per address
- ✅ Capacity: Handles millions of addresses
🆚 Comparison: v1 vs v2
| Feature | v1.1.3 (Old) | v2.0.0 (New) |
|---|
| Check speed | 2-5 seconds (API calls) | <5ms (database) |
| Rate limits |
Yes (every check) | No (checks only query DB) |
|
TX message analysis | ❌ Not analyzed | ✅ Fully analyzed |
|
False negatives | High (missed scams) | Low (deep analysis) |
|
Architecture | Direct API calls | Database + background worker |
|
API key usage | Every check | Only background worker |
📜 License
MIT License - Free and open source
🤝 Support
- - ClawHub: https://clawhub.com/crypto-genie
- Hackathon: NeoClaw Hackathon 2026
🏆 Credits
Developed by Trust Claw Team for NeoClaw Hackathon 2026
Built with:
- - SQLite - Local database
- Etherscan API - Blockchain data
- ChainAbuse API - Community scam reports
- Python asyncio - Async operations
🔐 Stay safe in crypto! Always verify addresses before sending funds.
🧞 Crypto Genie v2.0
您的AI驱动加密货币安全助手,专为OpenClaw打造
使用本地数据库(通过Etherscan后台同步)分析加密货币地址是否存在钓鱼、蜜罐、拉地毯和庞氏骗局。用户检查期间零外部API调用 = 即时结果!
✨ v2.0 新特性
🚀 重大架构升级
- - ✅ 数据库优先设计 - 所有检查均查询本地SQLite数据库
- ✅ 即时结果 - 检查期间无API延迟(<5毫秒)
- ✅ 无速率限制 - 用户查询永不触及Etherscan API
- ✅ 后台同步工作器 - 独立进程从Etherscan拉取数据
- ✅ 交易消息分析 - 解码并分析十六进制数据
- ✅ 自动排队系统 - 未知地址自动加入同步队列
- ✅ 深度扫描 - 检测交易数据中的可疑关键词
🔍 增强检测能力
现在能捕捉旧版本遗漏的骗局:
- - ✅ Lazarus Vanguard黑客组织相关引用
- ✅ Orbit Bridge Hacker提及
- ✅ 私钥钓鱼尝试
- ✅ 漏洞利用招募信息
- ✅ 以及更多...
📦 包含内容
crypto-genie/
├── SKILL.md # 本文件
├── DATABASE_ARCHITECTURE.md # 技术文档
├── database.py # SQLite数据库层
├── cryptocheckdb.py # 仅数据库检查器(即时)
├── sync_worker.py # 后台Etherscan同步工作器
├── securekeymanager.py # 加密API密钥存储
├── install.sh # 自动安装程序
├── setup.sh # API密钥设置向导
├── check_address.sh # 便捷脚本(需要时同步)
├── requirements.txt # Python依赖
└── venv/ # 虚拟环境(安装时创建)
🚀 快速开始
1. 安装
bash
cd ~/.openclaw/workspace/skills/crypto-genie
bash install.sh
2. 配置Etherscan API密钥(可选但推荐)
选项A:交互式设置(加密存储)
bash
./setup.sh
按照向导加密您的API密钥
选项B:环境变量
bash
export ETHERSCANAPIKEY=yourkeyhere
获取免费API密钥:https://etherscan.io/myapikey
3. 检查地址
bash
检查地址(即时,仅数据库)
python3 crypto
checkdb.py 0x1234567890abcdef1234567890abcdef12345678
4. 运行后台同步工作器
手动模式:
bash
python3 sync_worker.py
持续运行,处理队列
批量模式:
bash
python3 sync_worker.py --max-jobs 20
处理20个地址后退出
Cron定时任务(推荐):
bash
添加到crontab
/10 * cd ~/.openclaw/workspace/skills/crypto-genie && source venv/bin/activate && ETHERSCAN
APIKEY=key python3 sync_worker.py --max-jobs 30
💡 工作原理
架构流程
用户检查地址
↓
┌──────────────────┐
│ cryptocheckdb │ ← 仅查询本地数据库
└────────┬─────────┘ (无外部API调用)
│
↓
┌──────────────────────┐
│ 本地SQLite数据库 │
│ ~/.config/crypto- │
│ scam-detector/ │
│ │
│ • 地址 │
│ • 交易 │
│ • 风险评分 │
│ • 骗局指标 │
│ • 同步队列 │
└────────▲─────────────┘
│
│ 后台同步
│
┌────────┴─────────────┐
│ sync_worker.py │ ← 从Etherscan拉取
│ │ (使用您的API密钥)
│ • 读取队列 │
│ • 调用Etherscan │
│ • 解码交易数据 │
│ • 分析消息 │
│ • 存储到数据库 │
└──────────────────────┘
用户流程
- 1. 检查地址: python3 cryptocheckdb.py 0x...
- 如果在数据库中: 即时结果,包含完整分析
- 如果不在数据库中:
- 返回未知状态
-
自动加入同步队列
- 显示:⏳ 几分钟后再检查
- 4. 后台工作器同步(下次cron运行或手动触发)
- 再次检查: 现在可获取完整分析
🔍 检测能力
检测的骗局类型
| 类型 | 检测方法 |
|---|
| 钓鱼 | 关键词分析:私钥、助记词、验证钱包 |
| 蜜罐 |
合约代码分析(未验证合约) |
|
拉地毯 | 交易模式分析 |
|
漏洞利用组织 | 关键词:Lazarus、hack、exploit、breach |
|
社会工程 | 关键词:紧急、领取奖励、空投赢家 |
风险评分
算法因素:
- - 可疑交易数量(每笔+25,最高+50)
- 账户年龄(新地址:+10)
- 余额模式(大额余额+可疑交易:+20)
- 合约验证(未验证:+30)
风险等级:
- - 0-19:✅ 低风险
- 20-49:ℹ️ 中等风险
- 50-79:⚠️ 高风险
- 80-100:🚨 严重风险
📋 命令参考
检查地址
bash
人类可读输出
python3 crypto
checkdb.py 0x...
JSON输出
python3 crypto
checkdb.py 0x... --json
同步工作器
bash
将地址加入队列
python3 sync_worker.py --add-address 0x...
运行工作器(持续)
python3 sync_worker.py
处理N个地址后停止
python3 sync_worker.py --max-jobs 20
自定义地址间延迟
python3 sync_worker.py --delay 2.0
显示数据库统计信息
python3 sync_worker.py --stats
便捷脚本
bash
检查并在需要时自动同步
./check_address.sh 0x...
如果不在数据库中自动同步,然后显示结果
🎯 示例输出
严重风险地址
🚨 分析结果:0x098b716b8aaf21512996dc57eb0615e2383e2f96
风险评分:100/100 - 严重风险
最后更新:2026-02-20 07:14:32
🚨 检测到已知骗局!
⚙️ 智能合约
⚠️ 未在Etherscan上验证
交易数:38
余额:101.802430 ETH
🚨 检测到5个骗局指标:
• 检测到可疑关键词:lazarus(置信度:80%)
• 检测到可疑关键词:hack(置信度:80%)
• 检测到可疑关键词:exploit(置信度:80%)
• 检测到可疑关键词:private key(置信度:80%)
⚠️ 5笔可疑交易:
• 0x74f7fbfe5a0bd3...
原因:检测到可疑关键词:lazarus
消息:Greetings Lazarus Vanguard...
📋 建议:
🚫 不要向此地址发送资金
⚠️ 此地址已被标记为高风险
📞 举报提供此地址的来源
未知地址(尚未同步)
⏳ 分析结果:0xnewaddressnotindb
风险评分:0/100 - 未知
最后更新:N/A
⏳ 地址不在数据库中
地址不在数据库中。已加入同步队列。
📋 建议:
⏳ 此地址将很快被分析
🔍 几分钟后再检查
⚠️ 在分析完成前请谨慎操作
⚙️ 配置
数据库位置
默认:~/.config/crypto-genie/crypto_data.db
Etherscan API速率限制
- - 免费层: 5次调用/秒,100,000次调用/天
- 每个地址: 4次API调用(余额、交易数