7.2 KiB
theme, title, titleTemplate, class, fonts, lineNumbers, drawings, transition, colorSchema, mdc
| theme | title | titleTemplate | class | fonts | lineNumbers | drawings | transition | colorSchema | mdc | ||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| default | Stealth — Bitcoin Wallet Privacy Analyzer | %s | Stealth | stealth-theme |
|
false |
|
fade | dark | true |
STEALTH
Bitcoin Wallet Privacy Analyzer
A read-only audit engine that surfaces wallet exposure at the UTXO level before funds move.
The Problem
Visibility gap
Bitcoin privacy leaks are invisible to users
- Companies like Chainalysis can analyze wallet privacy
- Users cannot
- People may expose: full transaction history, identity links, and behavioral fingerprints
Companies can analyze your privacy better than you can.
Why This Happens
Privacy is broken by patterns, not hacks
Common wallet patterns that leak privacy:
- Multi-input transactions (CIOH / consolidation)
- Combining coins
- Address reuse
- Sending change to same input address
- Dust UTXOs
- Exchange linkage / taint signals
Visibility Imbalance
Chainalysis users can see wallet-linkage signals that the average user cannot see about themselves.
Privacy Parity
With Stealth, users gain visibility closer to institutional-grade analysis.
What Stealth Does
Input
- Paste a wallet descriptor
Output
- Structured findings plus warnings
- Type, severity, description, and evidence
- Severity badges mapped directly from detectors
# one click
wpkh([xpub...]/0/*) -> Analyze
=> Full report with actionable, spend-aware insights
Vulnerabilities Detected
| Detector Type | Meaning |
|---|---|
ADDRESS_REUSE | Repeated receive address links payment history |
CIOH | Multi-input ownership clustering signal |
DUST / DUST_SPENDING | Dust + normal co-spend linkage pattern |
CHANGE_DETECTION | Payment and change outputs become distinguishable |
CONSOLIDATION / CLUSTER_MERGE | Input histories merged into one traceable cluster |
SCRIPT_TYPE_MIXING | Mixed script families create a wallet fingerprint |
UTXO_AGE_SPREAD | Old/new spread leaks dormancy behavior |
EXCHANGE_ORIGIN | Probable exchange withdrawal origin signature |
TAINTED_UTXO_MERGE | Tainted + clean merge propagates contamination |
BEHAVIORAL_FINGERPRINT | Consistent transaction style re-identifies wallet |
Warnings: DORMANT_UTXOS and DIRECT_TAINT are shown as contextual risk signals.
How It Works
01
Parse
- Extract addresses from descriptor
- Normalize all common formats
02
Fetch
- Load on-chain history per address
- Use Bitcoin node or indexed API source
03
Analyze
- Apply privacy heuristics and warnings
- Flag each UTXO with findings and evidence
Demo Flow
- Input Paste descriptor and trigger analysis
- Load Fetch + parse + detect in one pipeline
- Report Summary bar: findings / warnings / transactions
- Inspect Expand finding cards for severity and evidence payloads
Demo
2x playback and compressed for lightweight deck rendering.
Roadmap
Expanded Heuristics
LEGACY_SCRIPT_EXPOSURE— old script usage (p2pkh/ nested-only flows) shrinking anonymity setADDRESS_GAP_LEAK— sparse derivation usage exposing wallet generation behaviorAMOUNT_FINGERPRINT— repeated denomination templates across spendsTIME_PATTERN_FINGERPRINT— recurring timing cadence linking sessions
Improvements
- Mainnet Support
- Mobile Support
- Cluster Visualization
- One-click solution
Roadmap detectors are additive and keep the same read-only, no-key security model.
Thank You
STEALTH
Bitcoin Wallet Privacy Analyzer
Protect privacy before you broadcast intent.