LogoLogo
  • 📘Introduction
    • What is Forge?
    • Why We Built Forge
  • 🧠How Forge Works
    • Core Architecture
    • Agent System Overview
  • Model Context Protocol (MCP)
  • On-Chain Data Indexing
  • AI Query Handling
  • ⚙️Using Forge
    • Setting Up Forge
    • How to Ask Questions
  • Supported Use Cases
  • Interacting with Agents
  • Limitations and Data Scope
  • 🛠️Advanced Features
    • Agent Personalities and Prompt Logic
  • Creating Custom Agents
  • Integrating External APIs
  • Running Multi-Agent Workflows
  • Token Behavior Tracking
  • Suspicious Wallet Detection
  • 📀Forge Modules
    • Liquidity Pool Scanner
  • LP Burner Tracker
  • Telegram Sniper Detector
  • Contract Creator Profiler
  • Whale Movement Watcher
  • ⚙️Developer Tools
    • Custom Prompt Engineering
  • 📃Appendix
    • Glossary
    • Security and Privacy
    • Roadmap and Vision
Powered by GitBook
On this page
  • Token Analysis
  • Wallet Tracing
  • Telegram Sniper Detection
  • Fresh Launch Monitoring
  • Rug Pattern Recognition
  • Sniper Activity Tracking
  • Contract Creator Profiling
Export as PDF

Supported Use Cases

Forge was built to solve one thing: information overload on Solana. Memecoins, snipers, rugs, LP burns, deployer patterns — the chaos never stops. Most tools show raw data but expect you to interpret it yourself. Forge goes further by analyzing, summarizing, and explaining everything as you ask.

This page covers the most common ways people use Forge and how each use case works in practice.


Token Analysis

Goal: Quickly understand if a token is legit, risky, or already compromised.

Ask things like:

  • “Is $GIBRUG safe?”

  • “Did this token burn LP?”

  • “What’s the deployer history?”

  • “When was this created and who bought first?”

Forge checks:

  • Deployer reputation

  • LP setup and lock

  • Market cap and supply

  • Token metadata (socials, audits, etc.)

  • Buyer wallets and sniper activity

It returns a natural-language breakdown that explains the token’s structure and red flags.


Wallet Tracing

Goal: Track individual wallets, see their patterns, and detect suspicious behavior.

Ask:

  • “What did this wallet buy today?”

  • “Has this wallet rugged before?”

  • “What’s their funding source?”

  • “What tokens did they sell in the last hour?”

Forge maps wallet behavior across:

  • Buy and sell history

  • Timing of entries and exits

  • Deployments and interactions

  • Relationships to other wallets

This is useful for checking a sniper, finding alts, or confirming if someone is dumping into you.


Telegram Sniper Detection

Goal: Identify wallets that act based on Telegram KOL groups.

Ask:

  • “Which wallets joined this Telegram group?”

  • “Did any sniper from Group A buy this?”

  • “Did the deployer join a Telegram before launch?”

Forge connects:

  • Telegram join events

  • Deployer or buyer activity

  • Time windows between join and launch

Useful when tracing KOL-backed launches or spotting coordinated pumps.


Fresh Launch Monitoring

Goal: Catch tokens as they deploy and see if they’re worth entering.

Ask:

  • “What launched in the last 5 minutes?”

  • “Any good-looking launches today?”

  • “Which of these are safe?”

Forge looks at all new tokens and auto-sorts them by:

  • Deployer score

  • LP burn status

  • Time since creation

  • Volume, sniper entries, social metadata

You can filter by safety or risk profile and jump straight into analysis.


Rug Pattern Recognition

Goal: Detect if a deployer or token is likely to rug based on known traits.

Ask:

  • “Does this look like a rug?”

  • “How many rugs has this deployer done?”

  • “What are rug signals in this token?”

Forge analyzes:

  • LP unlock timing

  • Sudden large sells

  • Contract ownership

  • Deploy frequency and success rate

It compares against known rug patterns and explains the result clearly.


Sniper Activity Tracking

Goal: Watch wallets that enter fast, move big money, and exit early.

Ask:

  • “Which wallets just sniped this?”

  • “Is this token being farmed?”

  • “Any repeat snipers active?”

Forge finds:

  • Wallets that entered within 10 seconds of launch

  • Wallets linked to Telegram joins

  • Repeat entries into new tokens

  • Fast sell-offs

This helps you know when a token is already compromised or being botted.


Contract Creator Profiling

Goal: Analyze a token’s creator wallet in depth.

Ask:

  • “Who made this contract?”

  • “What other tokens have they launched?”

  • “Any history of rugs?”

Forge returns:

  • Contract deploy time and metadata

  • History of previous launches

  • Known links to rug clusters

  • Telegram group presence

You’ll get a full profile on the person behind the token.

PreviousHow to Ask QuestionsNextInteracting with Agents

Last updated 12 days ago