Contract says 0% tax. Reality: 12% sell tax kicks in after the first few buys. Static analysis can't see runtime behavior.
Token passes every code scanner. But try selling? Transaction reverts. Only a real swap simulation catches this.
The deployer has rugged 4 previous tokens. No static scanner checks wallet history. DryRunSec does.
Multi-source aggregation. Proxy detection, ownership analysis, mint functions, blacklist mechanisms.
Real buy/sell simulation via direct RPC eth_call with state overrides. Detects actual tax rates and honeypot behavior.
Deployer wallet history analysis. Balance, contract count, nonce, and cross-reference with known rug-pull patterns.
A composite score from 0-100, category breakdowns, actual tax rates from simulation, and specific risk flags with severity levels.
{
"score": 23,
"riskLevel": "HIGH",
"recommendation": "AVOID",
"taxRates": {
"buy": 5.2,
"sell": 12.8
},
"riskFlags": [
{
"severity": "critical",
"finding": "Honeypot Detected"
},
{
"severity": "high",
"finding": "Hidden Tax: 12.8%"
},
{
"severity": "high",
"finding": "4/6 tokens rugged"
}
],
"dataQuality": "FULL"
}
# Scan any Base chain token ($1.00 USDC via x402 payment) curl -X POST https://dryrunsec.draftlabs.org/api/token-report \ -H "Content-Type: application/json" \ -d '{ "tokenAddress": "0x833589fCD6eDb6E08f4c7C32D4f71b54bdA02913", "chainId": 8453 }'
Connect DryRunSec to Claude Desktop, Cursor, or any MCP-compatible client. Tool discovery is free — only token analysis calls require x402 payment ($1.00/report in USDC on Base).
// .mcp.json (with x402 payment proxy) { "mcpServers": { "dryrunsec": { "command": "node", "args": ["scripts/x402-proxy.mjs"], "env": { "TARGET_URL": "https://dryrunsec.draftlabs.org/mcp", "PRIVATE_KEY": "0xYOUR_PRIVATE_KEY" } } } }