Infrastructure API

Developer documentation

Production-grade Solana risk analysis — authenticate with API keys, optionally sign requests with HMAC-SHA256, and consume compact platform JSON for integrations.

Quick start

One integration path — TypeScript SDK (recommended), or raw HTTP in Python / cURL.

import { CryptoCheckClient } from '@/lib/sdk/cryptocheck-sdk'

const client = new CryptoCheckClient({
  apiKey: process.env.CRYPTOCHECK_API_KEY!,
  // baseUrl optional — defaults to https://www.cryptocheckai.com
  // signingSalt optional — uses CRYPTOCHECK_SIGNING_SALT → API_SIGNING_SALT → dev fallback
})

const result = await client.scanToken('EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v', {
  chain: 'solana',
  responseMode: 'platform',
})

console.log(result)

Environment

  • CRYPTOCHECK_API_KEY — your secret key (Bearer)
  • API_SIGNING_SALT or CRYPTOCHECK_SIGNING_SALT — must match the server in production
  • Local dev: server falls back to the documented dev salt when unset — same default the SDK uses
  • CRYPTOCHECK_BASE_URL — override API host (optional)

Security

Optional X-CryptoCheck-Signature uses a derived key — never the raw API string as HMAC material. Message format: timestamp + "\\n" + raw body.

Signing details →

One-click mental model

  1. Create a key in the dashboard.
  2. Copy CRYPTOCHECK_API_KEY into your runtime.
  3. Align API_SIGNING_SALT with production (or rely on dev defaults locally).
  4. Instantiate CryptoCheckClient and call scanToken(mint).