Learn how to use ThreatChain
Install guides, API references, and walkthroughs for every ThreatChain product. Start with the product you're using or dive straight into the API.
Products
SolidGuard AI
AI-powered auditor for Solidity, Rust, Move, Vyper, and Cairo. How to scan from the web, CLI, and CI pipelines, plus how to interpret findings.
Read the guide โAPI Reference
Full reference for every public endpoint โ hash lookup, CVE search, malware feed, wallet checks. Auth, rate limits, error codes, and examples in curl, Python, and Node.
Read the guide โThreatChain SIEM
Install the agent on Linux, stand up the server, configure mTLS, add detection rules, and read alerts. Step-by-step from zero.
Read the guide โWallet Check
How the exposure score is computed, how to batch-check many addresses, and how to interpret chain-specific results across Ethereum, Arbitrum, Base, and Polygon.
Read the guide โRugpull Scorer
What the 0โ100 risk score means, how honeypot and owner-power checks work, what triggers a scam-deployer flag, and how to integrate it into a bot or bookmarklet.
Read the guide โMCP Server
Plug ThreatChain into Claude Desktop, Cursor, Cline, or any MCP-compatible agent. Hash lookup, CVE search, rugpull scoring, and wallet exposure as native tools.
Read the guide โIf you're stuck, we usually respond within one business day.