Audit a dApp URL for security risks via x402 micropayment — part of a 26-endpoint DeFi intelligence suite.
What it does
The `/defi/dapp` endpoint on the DeFi Intelligence API at defi.hugen.tokyo performs a security audit of a decentralized application (dApp) given its URL. It is one of 26 DeFi-focused endpoints covering token audits, address checks, rugpull detection, phishing screening, bridge routing, protocol analytics, gas prices, TVL data, and more. Each call is paid individually via the x402 protocol at $0.01 USDC on Base — no API keys, no rate limits, and no upfront setup required.
The dApp security endpoint accepts a single required query parameter `url` (the dApp URL to audit) and returns a JSON response with the audit results. The broader API aggregates data from 3+ upstream services and is documented via an OpenAPI 3.1 spec. Alternative access methods include a broker API (POST to a broker endpoint with an API key), an MCP server at mcp.hugen.tokyo with 2,300+ tools, and a Python SDK (`x402-pay`). The API's x402 challenge indicates it has been audited by CertiK and is on a trust list.
Response schemas for individual endpoints are not detailed in the OpenAPI spec (they use empty schema objects), so the exact shape of the dApp audit response is not documented. Pricing is confirmed at $0.01 USDC per call from the 402 challenge. The endpoint is live and returning a proper 402 payment challenge.
Capabilities
Use cases
- —Audit a dApp URL before interacting with it to check for known vulnerabilities or malicious behavior
- —Integrate dApp security screening into a wallet or portfolio dashboard
- —Build an AI agent that pre-screens DeFi protocols before executing trades
- —Automate security due diligence on new DeFi projects in a research pipeline
- —Add a safety layer to a browser extension that warns users about risky dApps
Fit
Best for
- —AI agents needing programmatic dApp security checks with micropayments
- —DeFi developers integrating security screening without managing multiple upstream API keys
- —Wallet and portfolio apps that want one-call dApp risk assessment
Not for
- —Full smart-contract source-code auditing (this checks dApp URLs, not raw Solidity)
- —Free or high-volume bulk scanning (every call costs $0.01 USDC)
- —Users who need detailed response schema documentation upfront (response shapes are undocumented)
Quick start
# Using the x402-pay Python SDK
pip install x402-pay
import x402_pay
result = x402_pay.get(
'https://defi.hugen.tokyo/defi/dapp?url=https://app.uniswap.org'
)
print(result.json())Example
Request
{
"url": "https://defi.hugen.tokyo/defi/dapp?url=https://app.uniswap.org",
"method": "GET",
"headers": {
"X-Payment": "<x402-payment-token>"
}
}Endpoint
Quality
The endpoint is live with a valid 402 challenge and a full OpenAPI 3.1 spec listing all 26 endpoints. However, response schemas for the dApp endpoint (and most others) are empty, so the exact output format is unknown. No example responses or detailed field documentation are available. Pricing is clear at $0.01 USDC on Base.
Warnings
- —Response schema for /defi/dapp is empty in the OpenAPI spec — exact response shape is undocumented
- —No example responses available for any endpoint in the crawled material
- —Root URL returns 404; documentation is only at /docs
- —CertiK audit claim comes from the provider's own 402 challenge and is not independently verified
Citations
- —26 DeFi security and data endpoints — token audits, bridge routing, protocol analytics. No API keys, no rate limits, no setup for 3+ upstream services. One x402 payment per call.https://defi.hugen.tokyo/docs
- —Payment required ($0.01 USDC on Base) per callhttps://defi.hugen.tokyo/defi/dapp
- —The /defi/dapp endpoint accepts a required query parameter 'url' described as 'dApp URL to audit'https://defi.hugen.tokyo/openapi.json
- —Alternative access via broker, MCP server, and x402-pay Python SDKhttps://defi.hugen.tokyo/defi/dapp
- —Audit info lists CertiK as audit firm; trust_list is truehttps://defi.hugen.tokyo/defi/dapp