Verdik audits the developer and the code behind every Solana token — before you ape. Real GitHub forensics, AST plagiarism scan, and 24 security rules. Free. Open. Transparent.
29
rug-pull signatures in database
24
security rules across 4 languages
<12s
average end-to-end scan time
100%
free · no API keys · open source
Two engines. One verdict. Zero guesswork.
Verdik runs every Solana project through forensic checks on the developer behind it and the code they shipped. The output is evidence — not vibes.
One Command. Full Verdict.
From GitHub handle to risk verdict in seconds
No setup. No accounts. No paid APIs. Paste a GitHub username or repo and watch the engine work live — every fetch, hash, and match streamed straight to your screen.
- Single command, full forensic trail
- Live SSE pipeline — every step auditable
- Cited evidence behind every penalty
- Verdict in under 12 seconds
Built for Solana
Four ways to scan. One verdict you can verify.
Solidity, Rust, Anchor, TypeScript, JavaScript — Verdik handles the whole Solana stack. Scan a developer, scan a repo, paste a single function, or compare against the rug template database.
Every weight. Every rule. Documented.
Verdik is transparent by design. Every signal we measure and every penalty we apply is explained, cited, and open to scrutiny.
Getting Started
Run your first developer scan in under a minute. No accounts, no installs.
DTS Forensics
How Developer Trust Score combines GitHub signals into a single verdict.
AST Scanner
Function-level fingerprinting, normalization, and the 29-signature database.
Security Rules
All 24 pattern rules across Solidity, Rust, Anchor, JavaScript, and TypeScript.
API Reference
Streaming SSE endpoints for programmatic access from your own tooling.
Self-Hosting
Run Verdik on your own infrastructure — no telemetry, no external dependencies.
From scanner to on-chain trust layer
Verdik starts as a forensic scanner. The endgame is a self-sustaining trust layer for Solana — community-curated, on-chain attested, skin-in-the-game reputation.
DTS Forensics + AST Scanner (MVP)
- Developer Trust Score with transparent reasoning engine
- AST plagiarism scanner · 29 rug signatures · 24 security rules
- Live SSE streaming pipeline · code diff viewer · category heatmap
- Three input modes: GitHub repo, direct paste, file upload
Verdik on Solana mainnet
- $VERDIK utility token launch on Solana
- Scan-result attestations stored on-chain (Verdik-PDA)
- Embed badges + shareable permalinks for verified projects
- Public scan archive (anonymized, opt-in)
Pre-launch verification & code intelligence
- Pre-launch Verified Badge for legitimate Solana projects
- Function call graph + self-similarity detection
- AI explanations per match (local Ollama, zero API cost)
- Cyclomatic complexity metrics + per-function quality profile
Community-staked attestations
- Stake $VERDIK to vouch for a project — skin in the game
- Rugged projects burn the staked $VERDIK, redistribute to early flaggers
- DAO-curated signature database with on-chain governance
- Cross-chain reputation lookup (Ethereum, Base, Bitcoin L2)
Roadmap commitments are public and verifiable. All MVP code is open-source from day one.
Prove you're legit before anyone asks
Verdik isn't only for investors. Serious teams use it to demonstrate clean code, transparent developer history, and continuous security posture before token launch.
Built for the Solana ecosystem
Pre-launch Verified Badge
Get audited before launch and earn a public Verdik badge for your README and landing page.
Continuous monitoring
Automated re-scans on every push so the verdict stays accurate as your codebase evolves.
Team & contributor scoring
Full DTS profile for every contributor — flag suspicious activity in your own org before it ships.
Public scan permalinks
Shareable on-chain attested scan results. Embed proof in your launch announcement.
Self-hostable
Run Verdik entirely on your own infrastructure. No telemetry, no third-party data calls.
Risk dashboards
Aggregate scan history across your portfolio. Track risk trends across teams and products.
CI/CD integration
Block merges that introduce rug-pattern code. Fail builds when security rules trigger.
Private signature database
Add your own internal patterns to the signature database. Catch issues unique to your stack.