// public beta · running on synthetic on-chain data · roadmap · status
SYBILSHIELD

Detection methodology

Six detection methods, each with rules anyone can audit and replicate. Source code MIT.

#1

Funding-source clustering

apps/ml/sybilshield/clustering/funding_cluster.py

#2

Behavioral clustering

apps/ml/sybilshield/clustering/behavior_cluster.py

#3

Graph community detection

apps/ml/sybilshield/clustering/graph_community.py

#4

Cross-chain identity linking

apps/ml/sybilshield/clustering/cross_chain.py

#5

Temporal anomaly features

apps/ml/sybilshield/features/temporal.py

#6

ML ensemble scoring

apps/ml/sybilshield/scoring/train.py

Label tier system

We do not pretend our labels are perfect. Each labelled address has a tier:

TierConfidenceSource example
T10.98Confessed via amnesty (LayerZero, Optimism)
T20.95Manually investigated (Hop, security researchers)
T30.85Multiple detectors agree
T40.65Single detector output (raw Arbitrum/Linea lists)
T50.75Self-derived heuristic (shared funder same block)
G10.95Verified human (Gitcoin Passport ≥20 stamps)
G20.80Likely human (ENS pre-2021 + active history)

What we DON'T do

Reproducibility

Every model artifact stores its feature_schema_hash and training_manifest_hash. If you can't reproduce a score from the published artifact + manifest hashes, the score is invalid.