{
  "schemaVersion": "1.0",
  "item": {
    "slug": "crypto-genie",
    "name": "Crypto Genie",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/princedoss77/crypto-genie",
    "canonicalUrl": "https://clawhub.ai/princedoss77/crypto-genie",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/crypto-genie",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=crypto-genie",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "blockchain_detector.py",
      "CHANGELOG.md",
      "check_address.sh",
      "clawhub-manifest.json",
      "crypto_check_db.py",
      "database.py"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/crypto-genie"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/crypto-genie",
    "agentPageUrl": "https://openagent3.xyz/skills/crypto-genie/agent",
    "manifestUrl": "https://openagent3.xyz/skills/crypto-genie/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/crypto-genie/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "🧞 Crypto Genie v2.0",
        "body": "Your AI-powered cryptocurrency safety assistant for OpenClaw\n\nAnalyzes crypto addresses for phishing, honeypots, rug pulls, and ponzi schemes using a local database with background sync from Etherscan. Zero external API calls during user checks = instant results!"
      },
      {
        "title": "🚀 Major Architecture Upgrade",
        "body": "✅ Database-first design - All checks query local SQLite database\n✅ Instant results - No API latency during checks (<5ms)\n✅ No rate limits - User queries never hit Etherscan API\n✅ Background sync worker - Separate process pulls from Etherscan\n✅ Transaction message analysis - Decodes and analyzes hex data\n✅ Auto-queue system - Unknown addresses automatically queued for sync\n✅ Deep scanning - Detects suspicious keywords in transaction data"
      },
      {
        "title": "🔍 Enhanced Detection",
        "body": "Now catches scams the old version missed:\n\n✅ \"Lazarus Vanguard\" hacking group references\n✅ \"Orbit Bridge Hacker\" mentions\n✅ Private key phishing attempts\n✅ Exploit recruitment messages\n✅ And much more..."
      },
      {
        "title": "📦 What's Included",
        "body": "crypto-genie/\n├── SKILL.md                    # This file\n├── DATABASE_ARCHITECTURE.md    # Technical documentation\n├── database.py                 # SQLite database layer\n├── crypto_check_db.py          # Database-only checker (instant)\n├── sync_worker.py              # Background Etherscan sync worker\n├── secure_key_manager.py       # Encrypted API key storage\n├── install.sh                  # Auto-installer\n├── setup.sh                    # API key setup wizard\n├── check_address.sh            # Convenience script (sync if needed)\n├── requirements.txt            # Python dependencies\n└── venv/                       # Virtual environment (created on install)"
      },
      {
        "title": "1. Install",
        "body": "cd ~/.openclaw/workspace/skills/crypto-genie\nbash install.sh"
      },
      {
        "title": "2. Configure Etherscan API Key (Optional but Recommended)",
        "body": "Option A: Interactive Setup (Encrypted storage)\n\n./setup.sh\n# Follow the wizard to encrypt your API key\n\nOption B: Environment Variable\n\nexport ETHERSCAN_API_KEY=\"your_key_here\"\n\nGet free API key: https://etherscan.io/myapikey"
      },
      {
        "title": "3. Check an Address",
        "body": "# Check address (instant, database-only)\npython3 crypto_check_db.py 0x1234567890abcdef1234567890abcdef12345678"
      },
      {
        "title": "4. Run Background Sync Worker",
        "body": "Manual mode:\n\npython3 sync_worker.py\n# Runs continuously, processes queue\n\nBatch mode:\n\npython3 sync_worker.py --max-jobs 20\n# Process 20 addresses then exit\n\nCron schedule (recommended):\n\n# Add to crontab\n*/10 * * * * cd ~/.openclaw/workspace/skills/crypto-genie && source venv/bin/activate && ETHERSCAN_API_KEY=\"key\" python3 sync_worker.py --max-jobs 30"
      },
      {
        "title": "Architecture Flow",
        "body": "User checks address\n       ↓\n┌──────────────────┐\n│ crypto_check_db  │ ← Queries local database ONLY\n└────────┬─────────┘   (No external API calls)\n         │\n         ↓\n┌──────────────────────┐\n│ Local SQLite DB      │\n│ ~/.config/crypto-    │\n│  scam-detector/      │\n│                      │\n│ • Addresses          │\n│ • Transactions       │\n│ • Risk scores        │\n│ • Scam indicators    │\n│ • Sync queue         │\n└────────▲─────────────┘\n         │\n         │ Background sync\n         │\n┌────────┴─────────────┐\n│ sync_worker.py       │ ← Pulls from Etherscan\n│                      │   (Uses your API key)\n│ • Reads queue        │\n│ • Calls Etherscan    │\n│ • Decodes TX data    │\n│ • Analyzes messages  │\n│ • Stores in DB       │\n└──────────────────────┘"
      },
      {
        "title": "User Flow",
        "body": "Check address: python3 crypto_check_db.py 0x...\nIf in database: Instant results with full analysis\nIf NOT in database:\n\nReturns \"unknown\" status\nAutomatically adds to sync queue\nShows: \"⏳ Check again in a few minutes\"\n\n\nBackground worker syncs it (next cron run or manual trigger)\nCheck again: Full analysis now available"
      },
      {
        "title": "Scam Types Detected",
        "body": "TypeDetection MethodPhishingKeyword analysis: \"private key\", \"seed phrase\", \"verify wallet\"HoneypotContract code analysis (unverified contracts)Rug PullTransaction pattern analysisExploit GroupsKeywords: \"Lazarus\", \"hack\", \"exploit\", \"breach\"Social EngineeringKeywords: \"urgent\", \"claim reward\", \"airdrop winner\""
      },
      {
        "title": "Risk Scoring",
        "body": "Algorithm factors:\n\nSuspicious transaction count (+25 per TX, max +50)\nAccount age (new addresses: +10)\nBalance patterns (large balance + suspicious TX: +20)\nContract verification (unverified: +30)\n\nRisk Levels:\n\n0-19: ✅ Low Risk\n20-49: ℹ️ Medium Risk\n50-79: ⚠️ High Risk\n80-100: 🚨 Critical Risk"
      },
      {
        "title": "Check Address",
        "body": "# Human-readable output\npython3 crypto_check_db.py 0x...\n\n# JSON output\npython3 crypto_check_db.py 0x... --json"
      },
      {
        "title": "Sync Worker",
        "body": "# Add address to queue\npython3 sync_worker.py --add-address 0x...\n\n# Run worker (continuous)\npython3 sync_worker.py\n\n# Process N addresses then stop\npython3 sync_worker.py --max-jobs 20\n\n# Custom delay between addresses\npython3 sync_worker.py --delay 2.0\n\n# Show database stats\npython3 sync_worker.py --stats"
      },
      {
        "title": "Convenience Script",
        "body": "# Check and auto-sync if needed\n./check_address.sh 0x...\n# Automatically syncs if not in DB, then shows results"
      },
      {
        "title": "Critical Risk Address",
        "body": "🚨 Analysis for 0x098b716b8aaf21512996dc57eb0615e2383e2f96\n\nRisk Score: 100/100 - CRITICAL RISK\nLast Updated: 2026-02-20 07:14:32\n\n🚨 KNOWN SCAM DETECTED!\n\n⚙️ Smart Contract\n⚠️ NOT VERIFIED on Etherscan\n   Transactions: 38\n   Balance: 101.802430 ETH\n\n🚨 5 Scam Indicator(s) Detected:\n   • Suspicious keyword detected: 'lazarus' (confidence: 80%)\n   • Suspicious keyword detected: 'hack' (confidence: 80%)\n   • Suspicious keyword detected: 'exploit' (confidence: 80%)\n   • Suspicious keyword detected: 'private key' (confidence: 80%)\n\n⚠️ 5 Suspicious Transaction(s):\n   • 0x74f7fbfe5a0bd3...\n     Reason: Suspicious keyword detected: 'lazarus'\n     Message: \"Greetings Lazarus Vanguard...\"\n\n📋 Recommendations:\n  🚫 DO NOT send funds to this address\n  ⚠️ This address has been flagged as high risk\n  📞 Report the source that gave you this address"
      },
      {
        "title": "Unknown Address (Not Yet Synced)",
        "body": "⏳ Analysis for 0xnew_address_not_in_db\n\nRisk Score: 0/100 - UNKNOWN\nLast Updated: N/A\n\n⏳ Address not yet in database\n   Address not in database. Added to sync queue.\n\n📋 Recommendations:\n  ⏳ This address will be analyzed soon\n  🔍 Check again in a few minutes\n  ⚠️ Exercise caution until analysis completes"
      },
      {
        "title": "Database Location",
        "body": "Default: ~/.config/crypto-genie/crypto_data.db"
      },
      {
        "title": "Etherscan API Rate Limits",
        "body": "Free tier: 5 calls/second, 100,000 calls/day\nEach address: 4 API calls (balance, TX count, TX list, code)\nDefault delay: 1.5 seconds between addresses (safe for free tier)"
      },
      {
        "title": "Recommended Cron Schedule",
        "body": "# Every 10 minutes, process 30 addresses\n*/10 * * * * cd ~/.openclaw/workspace/skills/crypto-genie && source venv/bin/activate && ETHERSCAN_API_KEY=\"key\" python3 sync_worker.py --max-jobs 30 --delay 2.0\n\n# Handles ~4,320 addresses per day"
      },
      {
        "title": "🛡️ Security",
        "body": "✅ Encrypted API key storage - AES-256 with PBKDF2\n✅ No third-party sharing - API key only sent to Etherscan\n✅ Local processing - All analysis happens on your machine\n✅ No telemetry - Zero data collection\n✅ Open source - Fully auditable code"
      },
      {
        "title": "Tables",
        "body": "addresses - Address info, risk scores, balances, metadata\ntransactions - Suspicious transactions with decoded messages\nscam_indicators - Individual red flags per address\nsync_queue - Addresses waiting to be synced\n\nSee DATABASE_ARCHITECTURE.md for full technical details."
      },
      {
        "title": "🔄 Sync Frequency",
        "body": "Default behavior:\n\nFirst check → address queued for sync\nWorker processes queue (manual or cron)\nSubsequent checks → instant from database\n\nRecommended: Run worker via cron every 5-10 minutes"
      },
      {
        "title": "Via Chat",
        "body": "\"Check if 0x1234... is a scam\"\n\"Is this address safe: 0xabc...\"\n\"Verify 0xdef... before I send ETH\""
      },
      {
        "title": "Automatic Detection",
        "body": "When you check an address, OpenClaw:\n\nRuns crypto_check_db.py\nIf not in DB → queues for sync\nReturns current status\nSuggests checking again after sync"
      },
      {
        "title": "\"Address not in database\"",
        "body": "Solution: Wait for background worker to sync it, or manually trigger:\n\npython3 sync_worker.py --add-address 0x...\npython3 sync_worker.py --max-jobs 1"
      },
      {
        "title": "\"Etherscan API key not configured\"",
        "body": "Solution: Set API key via environment or setup wizard:\n\n./setup.sh  # or\nexport ETHERSCAN_API_KEY=\"your_key\""
      },
      {
        "title": "Rate limit errors",
        "body": "Solution: Increase delay between addresses:\n\npython3 sync_worker.py --delay 3.0"
      },
      {
        "title": "📈 Performance",
        "body": "✅ Check latency: <5ms (database query)\n✅ Sync time: ~2 seconds per address (4 API calls)\n✅ Database size: ~1KB per address\n✅ Capacity: Handles millions of addresses"
      },
      {
        "title": "🆚 Comparison: v1 vs v2",
        "body": "Featurev1.1.3 (Old)v2.0.0 (New)Check speed2-5 seconds (API calls)<5ms (database)Rate limitsYes (every check)No (checks only query DB)TX message analysis❌ Not analyzed✅ Fully analyzedFalse negativesHigh (missed scams)Low (deep analysis)ArchitectureDirect API callsDatabase + background workerAPI key usageEvery checkOnly background worker"
      },
      {
        "title": "📜 License",
        "body": "MIT License - Free and open source"
      },
      {
        "title": "🤝 Support",
        "body": "ClawHub: https://clawhub.com/crypto-genie\nHackathon: NeoClaw Hackathon 2026"
      },
      {
        "title": "🏆 Credits",
        "body": "Developed by Trust Claw Team for NeoClaw Hackathon 2026\n\nBuilt with:\n\nSQLite - Local database\nEtherscan API - Blockchain data\nChainAbuse API - Community scam reports\nPython asyncio - Async operations\n\n🔐 Stay safe in crypto! Always verify addresses before sending funds."
      }
    ],
    "body": "🧞 Crypto Genie v2.0\n\nYour AI-powered cryptocurrency safety assistant for OpenClaw\n\nAnalyzes crypto addresses for phishing, honeypots, rug pulls, and ponzi schemes using a local database with background sync from Etherscan. Zero external API calls during user checks = instant results!\n\n✨ What's New in v2.0\n🚀 Major Architecture Upgrade\n✅ Database-first design - All checks query local SQLite database\n✅ Instant results - No API latency during checks (<5ms)\n✅ No rate limits - User queries never hit Etherscan API\n✅ Background sync worker - Separate process pulls from Etherscan\n✅ Transaction message analysis - Decodes and analyzes hex data\n✅ Auto-queue system - Unknown addresses automatically queued for sync\n✅ Deep scanning - Detects suspicious keywords in transaction data\n🔍 Enhanced Detection\n\nNow catches scams the old version missed:\n\n✅ \"Lazarus Vanguard\" hacking group references\n✅ \"Orbit Bridge Hacker\" mentions\n✅ Private key phishing attempts\n✅ Exploit recruitment messages\n✅ And much more...\n📦 What's Included\ncrypto-genie/\n├── SKILL.md                    # This file\n├── DATABASE_ARCHITECTURE.md    # Technical documentation\n├── database.py                 # SQLite database layer\n├── crypto_check_db.py          # Database-only checker (instant)\n├── sync_worker.py              # Background Etherscan sync worker\n├── secure_key_manager.py       # Encrypted API key storage\n├── install.sh                  # Auto-installer\n├── setup.sh                    # API key setup wizard\n├── check_address.sh            # Convenience script (sync if needed)\n├── requirements.txt            # Python dependencies\n└── venv/                       # Virtual environment (created on install)\n\n🚀 Quick Start\n1. Install\ncd ~/.openclaw/workspace/skills/crypto-genie\nbash install.sh\n\n2. Configure Etherscan API Key (Optional but Recommended)\n\nOption A: Interactive Setup (Encrypted storage)\n\n./setup.sh\n# Follow the wizard to encrypt your API key\n\n\nOption B: Environment Variable\n\nexport ETHERSCAN_API_KEY=\"your_key_here\"\n\n\nGet free API key: https://etherscan.io/myapikey\n\n3. Check an Address\n# Check address (instant, database-only)\npython3 crypto_check_db.py 0x1234567890abcdef1234567890abcdef12345678\n\n4. Run Background Sync Worker\n\nManual mode:\n\npython3 sync_worker.py\n# Runs continuously, processes queue\n\n\nBatch mode:\n\npython3 sync_worker.py --max-jobs 20\n# Process 20 addresses then exit\n\n\nCron schedule (recommended):\n\n# Add to crontab\n*/10 * * * * cd ~/.openclaw/workspace/skills/crypto-genie && source venv/bin/activate && ETHERSCAN_API_KEY=\"key\" python3 sync_worker.py --max-jobs 30\n\n💡 How It Works\nArchitecture Flow\nUser checks address\n       ↓\n┌──────────────────┐\n│ crypto_check_db  │ ← Queries local database ONLY\n└────────┬─────────┘   (No external API calls)\n         │\n         ↓\n┌──────────────────────┐\n│ Local SQLite DB      │\n│ ~/.config/crypto-    │\n│  scam-detector/      │\n│                      │\n│ • Addresses          │\n│ • Transactions       │\n│ • Risk scores        │\n│ • Scam indicators    │\n│ • Sync queue         │\n└────────▲─────────────┘\n         │\n         │ Background sync\n         │\n┌────────┴─────────────┐\n│ sync_worker.py       │ ← Pulls from Etherscan\n│                      │   (Uses your API key)\n│ • Reads queue        │\n│ • Calls Etherscan    │\n│ • Decodes TX data    │\n│ • Analyzes messages  │\n│ • Stores in DB       │\n└──────────────────────┘\n\nUser Flow\nCheck address: python3 crypto_check_db.py 0x...\nIf in database: Instant results with full analysis\nIf NOT in database:\nReturns \"unknown\" status\nAutomatically adds to sync queue\nShows: \"⏳ Check again in a few minutes\"\nBackground worker syncs it (next cron run or manual trigger)\nCheck again: Full analysis now available\n🔍 Detection Capabilities\nScam Types Detected\nType\tDetection Method\nPhishing\tKeyword analysis: \"private key\", \"seed phrase\", \"verify wallet\"\nHoneypot\tContract code analysis (unverified contracts)\nRug Pull\tTransaction pattern analysis\nExploit Groups\tKeywords: \"Lazarus\", \"hack\", \"exploit\", \"breach\"\nSocial Engineering\tKeywords: \"urgent\", \"claim reward\", \"airdrop winner\"\nRisk Scoring\n\nAlgorithm factors:\n\nSuspicious transaction count (+25 per TX, max +50)\nAccount age (new addresses: +10)\nBalance patterns (large balance + suspicious TX: +20)\nContract verification (unverified: +30)\n\nRisk Levels:\n\n0-19: ✅ Low Risk\n20-49: ℹ️ Medium Risk\n50-79: ⚠️ High Risk\n80-100: 🚨 Critical Risk\n📋 Commands Reference\nCheck Address\n# Human-readable output\npython3 crypto_check_db.py 0x...\n\n# JSON output\npython3 crypto_check_db.py 0x... --json\n\nSync Worker\n# Add address to queue\npython3 sync_worker.py --add-address 0x...\n\n# Run worker (continuous)\npython3 sync_worker.py\n\n# Process N addresses then stop\npython3 sync_worker.py --max-jobs 20\n\n# Custom delay between addresses\npython3 sync_worker.py --delay 2.0\n\n# Show database stats\npython3 sync_worker.py --stats\n\nConvenience Script\n# Check and auto-sync if needed\n./check_address.sh 0x...\n# Automatically syncs if not in DB, then shows results\n\n🎯 Example Output\nCritical Risk Address\n🚨 Analysis for 0x098b716b8aaf21512996dc57eb0615e2383e2f96\n\nRisk Score: 100/100 - CRITICAL RISK\nLast Updated: 2026-02-20 07:14:32\n\n🚨 KNOWN SCAM DETECTED!\n\n⚙️ Smart Contract\n⚠️ NOT VERIFIED on Etherscan\n   Transactions: 38\n   Balance: 101.802430 ETH\n\n🚨 5 Scam Indicator(s) Detected:\n   • Suspicious keyword detected: 'lazarus' (confidence: 80%)\n   • Suspicious keyword detected: 'hack' (confidence: 80%)\n   • Suspicious keyword detected: 'exploit' (confidence: 80%)\n   • Suspicious keyword detected: 'private key' (confidence: 80%)\n\n⚠️ 5 Suspicious Transaction(s):\n   • 0x74f7fbfe5a0bd3...\n     Reason: Suspicious keyword detected: 'lazarus'\n     Message: \"Greetings Lazarus Vanguard...\"\n\n📋 Recommendations:\n  🚫 DO NOT send funds to this address\n  ⚠️ This address has been flagged as high risk\n  📞 Report the source that gave you this address\n\nUnknown Address (Not Yet Synced)\n⏳ Analysis for 0xnew_address_not_in_db\n\nRisk Score: 0/100 - UNKNOWN\nLast Updated: N/A\n\n⏳ Address not yet in database\n   Address not in database. Added to sync queue.\n\n📋 Recommendations:\n  ⏳ This address will be analyzed soon\n  🔍 Check again in a few minutes\n  ⚠️ Exercise caution until analysis completes\n\n⚙️ Configuration\nDatabase Location\n\nDefault: ~/.config/crypto-genie/crypto_data.db\n\nEtherscan API Rate Limits\nFree tier: 5 calls/second, 100,000 calls/day\nEach address: 4 API calls (balance, TX count, TX list, code)\nDefault delay: 1.5 seconds between addresses (safe for free tier)\nRecommended Cron Schedule\n# Every 10 minutes, process 30 addresses\n*/10 * * * * cd ~/.openclaw/workspace/skills/crypto-genie && source venv/bin/activate && ETHERSCAN_API_KEY=\"key\" python3 sync_worker.py --max-jobs 30 --delay 2.0\n\n# Handles ~4,320 addresses per day\n\n🛡️ Security\n✅ Encrypted API key storage - AES-256 with PBKDF2\n✅ No third-party sharing - API key only sent to Etherscan\n✅ Local processing - All analysis happens on your machine\n✅ No telemetry - Zero data collection\n✅ Open source - Fully auditable code\n📊 Database Schema\nTables\naddresses - Address info, risk scores, balances, metadata\ntransactions - Suspicious transactions with decoded messages\nscam_indicators - Individual red flags per address\nsync_queue - Addresses waiting to be synced\n\nSee DATABASE_ARCHITECTURE.md for full technical details.\n\n🔄 Sync Frequency\n\nDefault behavior:\n\nFirst check → address queued for sync\nWorker processes queue (manual or cron)\nSubsequent checks → instant from database\n\nRecommended: Run worker via cron every 5-10 minutes\n\n💻 OpenClaw Integration\nVia Chat\n\"Check if 0x1234... is a scam\"\n\"Is this address safe: 0xabc...\"\n\"Verify 0xdef... before I send ETH\"\n\nAutomatic Detection\n\nWhen you check an address, OpenClaw:\n\nRuns crypto_check_db.py\nIf not in DB → queues for sync\nReturns current status\nSuggests checking again after sync\n🐛 Troubleshooting\n\"Address not in database\"\n\nSolution: Wait for background worker to sync it, or manually trigger:\n\npython3 sync_worker.py --add-address 0x...\npython3 sync_worker.py --max-jobs 1\n\n\"Etherscan API key not configured\"\n\nSolution: Set API key via environment or setup wizard:\n\n./setup.sh  # or\nexport ETHERSCAN_API_KEY=\"your_key\"\n\nRate limit errors\n\nSolution: Increase delay between addresses:\n\npython3 sync_worker.py --delay 3.0\n\n📈 Performance\n✅ Check latency: <5ms (database query)\n✅ Sync time: ~2 seconds per address (4 API calls)\n✅ Database size: ~1KB per address\n✅ Capacity: Handles millions of addresses\n🆚 Comparison: v1 vs v2\nFeature\tv1.1.3 (Old)\tv2.0.0 (New)\nCheck speed\t2-5 seconds (API calls)\t<5ms (database)\nRate limits\tYes (every check)\tNo (checks only query DB)\nTX message analysis\t❌ Not analyzed\t✅ Fully analyzed\nFalse negatives\tHigh (missed scams)\tLow (deep analysis)\nArchitecture\tDirect API calls\tDatabase + background worker\nAPI key usage\tEvery check\tOnly background worker\n📜 License\n\nMIT License - Free and open source\n\n🤝 Support\nClawHub: https://clawhub.com/crypto-genie\nHackathon: NeoClaw Hackathon 2026\n🏆 Credits\n\nDeveloped by Trust Claw Team for NeoClaw Hackathon 2026\n\nBuilt with:\n\nSQLite - Local database\nEtherscan API - Blockchain data\nChainAbuse API - Community scam reports\nPython asyncio - Async operations\n\n🔐 Stay safe in crypto! Always verify addresses before sending funds."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/princedoss77/crypto-genie",
    "publisherUrl": "https://clawhub.ai/princedoss77/crypto-genie",
    "owner": "princedoss77",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/crypto-genie",
    "downloadUrl": "https://openagent3.xyz/downloads/crypto-genie",
    "agentUrl": "https://openagent3.xyz/skills/crypto-genie/agent",
    "manifestUrl": "https://openagent3.xyz/skills/crypto-genie/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/crypto-genie/agent.md"
  }
}