BlockQuery

What is BlockQuery?
As immutable ledgers, blockchains store valuable data to inform on the history of transactions and permutations of that data. Current block explorers and ecosystem analytics solutions are hard to understand and difficult to operate. BlockQuery removes the friction from leveraging the power of blockchain data, enabling better analysis and insights, with data served directly from the blockchain, not an API intermediary.
It provides:
- Information directly from the blockchain
- The ability to precisely query and return results
- Search history to create personal workflows for repeated activities
How Does BlockQuery Work?
BlockQuery is simply an interface to the blockchain, enabling ERC standard functions and data to be easily called through a simple UI.
In the future, Foolproof Labs plans to enhance the complexity of queries, enabling compound queries and wallet data, a more user-friendly environment, especially for those inexperienced in smart contract development, and the ability to display complex queries into visualizations, among other things.
Overall, it's an extremely lightweight tool that can be integrated into RPCs of EVM chains to provide functionality.
BlockVision

What Is BlockVision?
Web3 Traders and users who self-custody their crypto need a security solution to protect their assets in a decentralized manner to support their autonomy and independence. Current leading solutions either force users to sacrifice centralized control via custody or do not protect assets from user error in social engineering or phishing circumstances. BlockVision enhances your RPC, leveraging real-time data from the blockchain rather than finalized blocks; BlockVision proactively secures your wallet for everyday use.
BlockVision provides:
- A tool that sits in between your wallet application and transactions on the blockchain.
- The application provides transparency to transactions and acts as a “man in the middle” step to prevent loss from social engineering and malware attacks.
How Does Blockvision Work?
- BlockVision operates through a remote procedure call (RPC) within your wallet application or extension. An RPC refers to the node endpoint within a network that interacts with a client through an API and user interface, connecting a crypto wallet to the blockchain.
- Once a transaction has been queued and signed, the transaction has permission to enter the BlockVision RPC. Once the transaction has entered the RPC, a “handoff” step is taken, where BlockVision pauses the transaction in process and provides a detailed description of the history of the wallet and smart contract you are interacting with, as well as simulating the transaction to show the end result if the transaction was to be finalized. Through this process, users can preview transactions and recall any transactions that would be malicious.
- For users with trusted dapps they frequently interact with, specific contracts can be greenlighted and removed from transaction pauses.
Features and Use Case
- Prevent Phishing: catch phishing attempts from malicious transactions before or during the transaction and secure your valuable crypto & NFTs.
- Proactive Protection: understand what the approvals you sign on smart contracts mean without needing to be a solidity developer
WalletSnap

What Is WalletSnap?
WalletSnap is an on-chain “lifeboat” for your high-value blockchain assets. At its core, WalletSnap is a smart contract that records your highest-priority assets with a function to evacuate your assets to a “rescue” wallet in case of emergency. Operating as a sub-application of your custom Foolproof RPC, WalletSnap informs users with alerts of potentially malicious transactions by observing the memory pool (mempool) of pending transactions.
WalletSnap provides:
There are three degrees of control available in WalletSnap:
- Manually triggering the contract to evacuate the wallet with a signature
- Utilizing the Foolproof RPCs to send alerts to the user, indicating the movement of these assets that occur off the Foolproof RPC (not meeting MFA requirements)
- Presigning the contract to enable Foolproof to trigger the movement as a result of attempts on the assets that do need to meet MFA requirements
All of these actions result in the asset pod moving to the predesignated backup wallet.
How Does WalletSnap Work?
Features and Use Case
- Real-Time Alerts: get notified of any potential breach of your wallet security with the ability to take action
- Loss Mitigation: eject your assets to a pre-designated rescue wallet in case of an emergency or a compromised wallet.
Foolproof Token

What Is a Foolproof Token?
It provides:
- Support for existing tokens to protect provenance
- Compliant and on-chain brand reputation management
- Support for expanded revenue models
- Simple proof of ownership for expanded revenue models
- Trustless functionality and security
The Foolproof Token expands token functionality, providing web3 innovators the decentralized applications (dApps) and blockchain exploration support they need for:
- Security
- Admin Supported Moderation
- Legal Compliance
- Subscription Payments
How Does a Foolproof Token Work?
The Foolproof Token (FPT) contract is deployed on top of the target collection’s smart contract. This allows the FPT to recognize all functionality of the original deployed contract. This protects token provenance and enables added functionality, including easy-to-use features provided by the Foolproof Labs team.
The standard Foolproof Token creates asset security and delegation with a 1:1 mirrored token, the FPT allows users to store valuable assets in their cold wallets while establishing proof of ownership for token-gated experiences and utility. This design allows for a secure delegation method, where the principal token owner is always able to regain ownership.
Weeves Information Suite

Overview:
In the rapidly evolving world of blockchain and cryptocurrency, data reigns supreme. Yet, in this decentralized landscape, most struggle to access, understand, and leverage the vast amounts of information at their fingertips. This is where Weeves steps in, transforming raw blockchain data into actionable insights that drive success.
Weeves is your partner in navigating the complex web of blockchain interactions, ensuring that every decision you make is informed and every opportunity is maximized. Our suite of cutting-edge solutions is designed to give you an unparalleled advantage in the crypto space:
Sybil Detection and Prevention
Overview:
Our cutting-edge system uses graph-based technology to analyze transactions and account relationships, providing powerful insights for fraud detection and risk management.
Key Features
- Visualize complex transaction patterns
- Detect unusual account relationships
- Identify potential fraudulent activities
Benefits
- Enhanced fraud detection capabilities
- Intuitive data visualization for easier decision-making
- Proactive risk management
How It Works
Our system represents transactions and accounts as interconnected nodes, allowing for:
- Detection of circular transactions
- Identification of linked accounts
- Analysis of transaction patterns over time
By leveraging these insights, organizations can protect their resources, maintain accurate KPIs, and make informed decisions for product development and marketing strategies.
- Identify and prevent fraudulent activities before they impact your operations.
Smart Recommendations
Overview
Our innovative system uses graph technology to model products, users, and their interactions, enabling sophisticated recommendation algorithms that significantly enhance user experience and engagement.
Key Features
- Graph-based modeling of products, users, and interactions
- Advanced pattern recognition in user behavior
- Sophisticated recommendation algorithms
Benefits
- Highly personalized product or content suggestions
- Enhanced user experience and engagement
- Improved customer retention and purchase frequency
How It Works
Our system creates a comprehensive graph representation, allowing for:
- Deep analysis of user preferences and behaviors
- Identification of complex relationships between users and products
- Generation of highly relevant and personalized recommendations
By leveraging these capabilities, businesses can provide more engaging user experiences, drive customer satisfaction, and ultimately boost their bottom line through increased user activity and purchases.
Social Graph Analysis
Overview
Our cutting-edge system employs social graph technology to map and analyze complex user relationships and interactions, providing deep insights into user behavior and network dynamics.
Key Features
- Represent users and their diverse relationships
- Analyze multifaceted user interactions
- Identify influential nodes and communities
Benefits
- Comprehensive relationship mapping
- Advanced network analysis capabilities
- Enhanced targeting and personalization opportunities
How It Works
Our system creates a detailed social graph, allowing for:
- Visualization of various relationship types (e.g., senders, receivers, secondary wallets)
- Calculation of network centrality metrics
- Detection and analysis of user communities
By leveraging these insights, organizations can gain a nuanced understanding of user behavior, improve engagement strategies, and make data-driven decisions for marketing and product development.
Knowledge Graph Analysis
Overview
Our innovative system utilizes knowledge graph technology to represent and manage complex relationships between entities, enabling powerful semantic queries and intuitive data exploration.
Key Features
- Represent diverse entities (objects, events, concepts)
- Manage intricate interrelations between entities
- Support advanced semantic queries
Benefits
- Enhanced data interconnectivity
- More intuitive and powerful search capabilities
- Improved data insight and discovery
How It Works
Our system creates a network of interconnected entity descriptions, allowing for:
- Comprehensive representation of complex data landscapes
- Discovery of non-obvious relationships between entities
- Flexible and intuitive querying of interlinked data
By leveraging these capabilities, organizations can unlock deeper insights from their data, enhance decision-making processes, and drive innovation across various domains.
Sentiment Scores Provide Transparency
Our first publicly available tool is a dashboard for users to see their own social sentiment, with paths to improve their overall sentiment. With partner adoption, this leads to greater alignment of future users, ensuring customer acquisition costs are well targeted to high quality individual users and spending is optimized for the best possible return.
Sentiment Score
Overview
SentimentScore is an innovative blockchain-based service that provides users with a dynamic sentiment score based on their on-chain activities, combining credit score concepts with advanced sentiment analysis.
Key Features
- Transaction-based sentiment analysis
- Real-time score updates
- Free periodic score checks
- Reputation insights and improvement tips
- Privacy-focused, on-chain calculations
- Easy integration with wallets and platforms
Benefits
- Enhanced on-chain reputation management
- Informed decision-making for blockchain interactions
- Increased community trust and transparency
- Potential for rewards and incentives
How It Works
Our system analyzes user transactions and interactions on the blockchain to generate a sentiment score, considering factors such as:
- Transaction history and patterns
- User behavior and compliance with network norms
- Community feedback (where available)
By leveraging SentimentScore, users can actively manage their blockchain reputation, while platforms can offer reputation-based features, creating a more trustworthy and engaging blockchain ecosystem.
Gain an Advantage with Weeves:
- Targets the highest quality users
- Directs and extends resources for maximum value in User Acquisition spend
- Provides deep, actionable insights
- Enhances reputational security and delivers proactive risk management
- Knowledge Graph Integration: Gain a comprehensive, interconnected view of blockchain entities.
Woven Token

The Woven Token, from Foolproof Labs: The ultimate solution for user intelligence.
Overview
The Woven Token is a cutting-edge Web3 solution that provides intelligent, automated user management for blockchain and traditional applications. By integrating advanced social graph analysis with flexible permission controls, The Woven Token offers unparalleled security, efficiency, and user quality assessment.
Key Components
Foolproof Token (FPT)
- Smart contract technology separating asset ownership from user permissions
- Enables dynamic access control without affecting underlying asset ownership
- Facilitates efficient user moderation and management
Weeves
- Web3 social graph analyzer for comprehensive user quality assessment
- Analyzes on-chain data including transaction history, smart contract interactions, and token holding patterns
- Generates real-time user quality scores
Core Features
- Intelligent User Screening: Automated evaluation of user quality before granting access or permissions
- Dynamic Permission Management: Flexible, real-time adjustment of user rights based on ongoing behavior analysis
- Sybil Resistance: Advanced detection and prevention of fake or duplicate accounts
- Continuous Monitoring: Ongoing assessment of user behavior to maintain platform integrity
- Scalable Architecture: Designed to handle high-volume applications across various sectors
Applications
Blockchain Ecosystem
- Decentralized Finance (DeFi): Risk assessment, graduated access to financial products
- Decentralized Autonomous Organizations (DAOs): Voting power allocation, contributor reputation tracking
- NFT Marketplaces: Fraud prevention, verified creator programs
Beyond Blockchain
- Fandom and Community Management: Exclusive access control, tiered membership systems
- Certifying Authorities: Credential verification, continuous professional standing assessment
- Premier World Assets: Authenticity tracking for luxury goods, ownership verification for high-value assets
Benefits
- Enhanced Security: Proactive protection against malicious actors and fraudulent activities
- Improved User Quality: Attract and retain high-quality users while deterring bad actors
- Operational Efficiency: Automate user management processes, reducing manual oversight
- Flexible Integration: Adaptable to various platforms and use cases, both on and off the blockchain
- Data-Driven Insights: Gain valuable user behavior insights for informed decision-making
Technical Integration
The Woven Token offers a seamless API for easy integration into existing systems. Our documentation provides comprehensive guides for implementation across various EVM blockchains.
Immutable Control

Enterprise-Grade On-Chain Permissions via Paired-Key Architecture
Foolproof's Immutable Control framework provides organizations with secure, auditable access management using a paired smart contract model. A Center of Moderation (COM)-such as a corporation, DAO, or governing entity-deploys a principal NFT smart contract to represent core entitlements (e.g., licenses, memberships, credentials). This NFT is paired with the Foolproof Token (FPT), a programmable on-chain identity token issued to end users.
Unlike traditional token systems where asset loss equates to access loss, the COM maintains custody of the principal NFT. This ensures users cannot have their permissions stolen, sold, or transferred without authorization. If a user loses access to their wallet, their permissions can be safely restored to a new address without compromising the underlying asset or its governance model.
The FPT acts as a secure, non-custodial pointer to verified access rights, enabling:
- Automated rule-based updates (e.g., renewals, expirations, compliance checks)
- Manual intervention and overrides for governance actions
- Seamless integration with dashboards for real-time user and role management
All state changes occur directly on-chain, ensuring full transparency, auditability, and resilience.
This architecture is ideal for enterprises requiring recoverable, non-transferrable user permissions with centralized control over the original asset, while offering the flexibility of decentralized access.
Centralized Moderation

The Foolproof Token's Amped feature enables a status to be applied to a FPT. This status is used as a qualifier in token-gating experiences that utilize a FPT. This ensures a principal token owner meets all the requirements to participate in the community. A country club has an initiation fee, and also requires a monthly spend. This enables this model for any existing or new token collection.
Amped tokens provide flexible support for:
- Aubscriptions
- Compliance with Terms of Service and community guidelines
- VIP experiences
- Decentralized user management
Depending on the configuration of the amped feature, the status change can occur from an on-chain transaction triggered by:
- Contract owner
- Designated manager
- Token owner
- Foolproof token custodian
- Programmable function as a result of a web2 or on-chain user interaction (ex: complete social activity, gain asset, sign contract)
Decentralized User Management
Amped provides a robust mechanism for eligibility verification, ensuring that only compliant participants benefit from token-gated access. Suppose a holder's actions are deemed detrimental to the brand or community. In that case, their token-gated access can be swiftly disabled, preserving the brand's integrity and continual adherence to its core values. Combining the FPT's features with a multi-tiered blacklist check, this holistic approach streamlines compliance processes. It fortifies the brand's reputation in the decentralized landscape without restricting or altering ownership of the original digital asset.
CANN

Certifying Authority (CA) Verification Layer
On-chain Anonymized KYC with White Glove Service
Foolproof's Certifying Authority (CA) network offers a premium verification service designed for high-value participants. Clients undergo a discreet, white glove verification process; including fingerprinting, notary, deep credential validation, and proof-of-personhood. Once approved, the client is assigned a unique blockchain address, and their status is marked as “Verified” within the Foolproof internal trust registry.
All sensitive information is stored according to industry-leading security best practices, including:
- End-to-end encryption for at-rest and in-transit data
- Zero-knowledge data referencing to minimize exposure
- Multi-party access control and audit logging
- Biometric record hashing for non-reversible ID linkage
- SOC2-aligned infrastructure for ongoing operational integrity
By anchoring identity and compliance to a single cryptographic address, the CA system enables seamless interaction with verified-only services, including asset tokenization, escrow, licensing, and financial onboarding, all while preserving user anonymity on-chain.
CAs are credentialed professionals who undergo their own vetting before participating in the network. The CA registry itself is decentralized, allowing scalable credential verification for luxury markets, regulated digital assets, and exclusive token experiences.

BlockQuery
Enhance your chain's developer relations and experience by incorporating our smart contract driving tool

BlockVision
Detection systems that understand true user intent rather than just validating signatures

WalletSnap
Leverages Foolproof's patent pending blockchain MFA to protect against wide-spread and novel attack vectors

Foolproof Token
Creates shadows of onchain assets to facilitate identical permissions within or across wallets and blockchains while preserving asset ownership

Weeves Information Suite
Generates the inherent social graph of blockchain while combining web2 social data to create a comprehensive user quality score (UQS)

Woven Token
Combines current onchain/offchain actions to automatically moderate communities, supplying real-time Sybil detection to enhance reputational security for companies and users alike

Immutable Control
A trigger and time-driven permission management solution with onchain audit trail, that provides automated control of access rights based on predefined events or schedules

Centralized Moderation
Preserve existing decentralized community's token-controlled benefits while protecting the terms of brand, IP, and core tenets through revocation of access

CANN
Verifiable identity with KYC maintained anonymously onchain, customizable intervals for re-verification plus enhanced reputational awareness to establish a dynamic framework for trustless transacting