0
Number of Recorded Contracts
57
Types of Vulnerabilities Covered

| Token Name | Risky Permissions | Status | Submitted At | Actions |
|---|---|---|---|---|
Note: All information is provided by users, and while the platform helps identify potential scam contracts, it cannot guarantee complete accuracy. Audit results are for reference only and should not be taken as a definitive assessment of contract safety.
| Token Name | Number of Permissions | Platform | Risk Alerts | View Popularity | Daily Change | 24h Trading Volume | Actions |
|---|---|---|---|---|---|---|---|
Note: All information is provided by users, and while the platform helps identify potential scam contracts, it cannot guarantee complete accuracy. Audit results are for reference only and should not be taken as a definitive assessment of contract safety. The platform is not responsible for any risks associated with the listed tokens or contracts. If you have any questions, please contact us at sec@gate.com.
Token Name | Number of Permissions | Type | Chain | Submission Time |
|---|---|---|---|---|








We monitor on-chain activity in real time, detecting and alerting users to suspicious events within about 10 minutes. It addresses issues such as excessive permissions, fake NFTs, and on-chain attacks through a self-developed security platform that provides contract auditing, security reinforcement, and real-time monitoring of malicious behavior. By maintaining a database of malicious behaviors, models, and addresses, the system continuously enhances its detection and defense capabilities. It also collaborates with project teams to promote a "Don't be evil" initiative, encouraging transparency and preventing the abuse of centralized permissions.
Email: For any inquiries, please contact sec@gate.com