ContractDNA© / Dark Alpha© Documentation

Blockchain security vertical for detecting known and variant exploits on Base.

Architecture

Real-time monitoring + forensic analysis + episodic memory.

Dark Alpha Listener

Watches Base chain for new contracts, extracts bytecode, and compares against the Library of Ruin©.

Base WebSocket → dark_alpha_listener → matches

Hunter Engine

Processes high-severity matches, performs deeper analysis and fork tests, and generates reports.

matches → hunter → forensic reports

VAAS-X Memory

Stores exploit-related episodes so the system can recognize similar patterns faster over time.

Episode Model

Each detection is a state-action-outcome episode.

State

On-chain context when a contract is seen.

  • Chain and block information
  • Contract address and bytecode hash
  • Liquidity and pair metadata (for DEX monitoring)

Action

How the system evaluated the contract.

  • Similarity matches to exploit patterns
  • Additional heuristics and checks

Outcome

What was concluded.

  • Clean, suspicious, or confirmed exploit
  • Associated pattern identifiers
  • Economic impact and follow-up

Operational Runbook

1. Start All Components

Use the bundled script to launch shard, listener, and hunter together.

  • Start VAAS-X shard for Library of Ruin©
  • Start Dark Alpha listener on Base
  • Start Hunter engine for deep analysis

2. Manual Control

Run each component in a separate terminal.

  • Shard node process
  • Dark Alpha listener process
  • Hunter process

3. Health Checks

Verify that the system is operating correctly.

  • Confirm listener is connected to Base
  • Ensure matches are being produced
  • Check dashboards for live detections