ChainAware Behavioural Prediction MCP Server

1

Add it to Claude Code

Run this in a terminal.

Run in terminal
claude mcp add -e "API_KEY=${API_KEY}" chainaware-behavioural-prediction -- npx -y @chainaware/behavioral-prediction-mcp
Required:API_KEY
README.md

AI-powered tools to analyze wallet behaviour, fraud, and rug pull prediction.

🧠 ChainAware Behavioural Prediction MCP Server

MCP Server Name: ChainAware Behavioural Prediction MCP

Category: Web3 / Security / DeFi Analytics

Status: Public tools – Private backend

Access: By request (API key)

Server URL: [https://prediction.mcp.chainaware.ai/sse]

Repository: [https://github.com/ChainAware/behavioral-prediction-mcp]

Website: [https://chainaware.ai/]

Twitter: [https://x.com/ChainAware/]

mcp-name: io.github.ChainAware/chainaware-behavioral-prediction-mcp


📖 Description

The Behavioural Prediction MCP Server provides AI-powered tools to analyze wallet behaviour prediction,fraud detection and rug pull prediction.

Developers and platforms can integrate these tools through the MCP protocol to safeguard DeFi users, monitor liquidity risks, and score wallet or contract trustworthiness.

All tools follow the Model Context Protocol (MCP) and can be consumed via MCP-compatible clients.


⚙️ Available Tools

1. Predictive Fraud Detection Tool

ID: predictive_fraud

Description: This AI‑powered algorithm forecasts the likelihood of fraudulent activity on a given wallet address before it happens (≈98% accuracy), and performs AML/Anti‑Money‑Laundering checks. Use this when your user wants a risk assessment or early‑warning on a blockchain address.

➡️ Example Use Cases:

• Is it safe to intercant with vitalik.eth ?
• What is the fraudulent status of this address ?
• Is my new wallet at risk of being used for fraud?  

Inputs:

Name Type Required Description
apiKey string API key for authentication
network string Blockchain network (ETH, BNB,POLYGON,TON,BASE, TRON, HAQQ)
walletAddress string The wallet address to evaluate

Outputs (JSON):

{
  "message": "string",                         // e.g. “Success” or error description
  "walletAddress": "string",                   // blockchain wallet address that was analyzed
  "chain": "string",                           // blockchain network identifier (e.g. ETH, BNB,POLYGON,TON,BASE, TRON, HAQQ)
  "status": "string",                          // classification result (e.g. “Fraud” | “Not Fraud” | “New Address”)
  "probabilityFraud": "0.00–1.00",             // decimal fraud probability score (string to preserve precision)
  
  "token": "string | null",                    // optional token associated with the check (may be null)
  "lastChecked": "ISO-8601 timestamp",         // last time the wallet risk analysis was executed
  
  "forensic_details": {
    "cybercrime": "string",                    // indicator score for cybercrime activity
    "money_laundering": "string",              // indicator score for money laundering activity
    "number_of_malicious_contracts_created": "string",  // number of malicious contracts deployed by this wallet
    "gas_abuse": "string",                     // gas abuse indicator
    "financial_crime": "string",               // financial crime indicator
    "darkweb_transactions": "string",          // interaction with darkweb-linked wallets
    "reinit": "string",                        // reinitialization exploit indicator
    "phishing_activities": "string",           // phishing activity indicator
    "fake_kyc": "string",                      // fake KYC related activity
    "blacklist_doubt": "string",               // suspected blacklist association
    "fake_standard_interface": "string",       // fake ERC interface indicator
    "data_source": "string",                   // source of forensic intelligence (may be empty)
    "stealing_attack": "string",               // stealing attack indicator
    "blackmail_activities": "string",          // blackmail activity indicator
    "sanctioned": "string",                    // sanction exposure indicator
    "malicious_mining_activities": "string",   // malicious mining indicator
    "mixer": "string",                         // interaction with mixing services
    "fake_token": "string",                    // fake token creation or usage indicator
    "honeypot_related_address": "string"       // interaction with honeypot-related addresses
  },
  "checked_times": 0,                          // integer — number of times this wallet has been analyzed
  
  "createdAt": "ISO-8601 timestamp",           // record creation timestamp
  "updatedAt": "ISO-8601 timestamp",           // record last update timestamp

  "sanctionData": [
    {
      "category": "strin

Tools (1)

predictive_fraudForecasts the likelihood of fraudulent activity on a wallet address and performs AML checks.

Environment Variables

API_KEYrequiredAPI key for authentication with the ChainAware service

Configuration

claude_desktop_config.json
{"mcpServers": {"chainaware": {"command": "npx", "args": ["-y", "@chainaware/behavioral-prediction-mcp"], "env": {"API_KEY": "YOUR_API_KEY"}}}}

Try it

Analyze the wallet address 0x... on the ETH network to check for potential fraudulent activity.
Is it safe to interact with vitalik.eth? Please perform a risk assessment.
What is the fraudulent status and AML risk score for this Polygon wallet address?
Check if my new wallet address is at risk of being flagged for malicious activity.

Frequently Asked Questions

What are the key features of ChainAware Behavioural Prediction?

AI-powered wallet behaviour prediction. Real-time fraud detection with 98% accuracy. AML (Anti-Money-Laundering) compliance checks. Rug pull and malicious contract deployment monitoring. Multi-chain support including ETH, BNB, POLYGON, TON, BASE, TRON, and HAQQ.

What can I use ChainAware Behavioural Prediction for?

Safeguarding DeFi users by assessing the risk of interacting with unknown addresses.. Monitoring liquidity risks for platforms and developers.. Scoring wallet or contract trustworthiness before executing transactions.. Performing automated forensic analysis on blockchain addresses for security audits..

How do I install ChainAware Behavioural Prediction?

Install ChainAware Behavioural Prediction by running: npx -y @chainaware/behavioral-prediction-mcp

What MCP clients work with ChainAware Behavioural Prediction?

ChainAware Behavioural Prediction works with any MCP-compatible client including Claude Desktop, Claude Code, Cursor, and other editors with MCP support.

Turn this server into reusable context

Keep ChainAware Behavioural Prediction docs, env vars, and workflow notes in Conare so your agent carries them across sessions.

Need the old visual installer? Open Conare IDE.
Open Conare