Air-gapped, client-side static analysis for Corda CorDapp contracts and Hyperledger Fabric chaincode. Rule-based pattern matching validates settlement finality conditions, obligation logic completeness, endorsement policy structure, and counterparty validation clauses. Not an interpreter — no code is executed.
Not an interpreter: This tool performs pattern-based static analysis using regular expressions. It does not execute, compile, or interpret the pasted code. It is safe to paste sensitive contract code — no data leaves the browser.
Corda rule basis: Rules derive from the CorDapp contract structure documented in Post Oak Labs' published Corda A2A architecture (postoaklabs.com/example-corda-a2a.html). Key patterns include: presence of verify() function, Commands interface, linearId for state tracking, explicit Settled/SETTLED terminal state, notary reference, and counterparty signature validation.
Fabric rule basis: Rules derive from Go chaincode patterns documented in Post Oak Labs' Fabric A2A architecture (postoaklabs.com/example-fabric-a2a.html). Key patterns include: GetState/PutState pairing, shim.Success/shim.Error response handling, transient map usage for Travel Rule data, and dual-control endorsement patterns.
After validation: Use Tool 71 (DLT Guardrail Builder) to generate policy stubs for identified gaps.
Your code never leaves your browser. All analysis is client-side regex pattern matching. No network requests are made. No code is executed. The tool has been designed for air-gapped environments — you can verify this by disconnecting from the network and re-running validation.