$
> [TRACE]

Hedgequarter / Trace

Trace.

Riskdecisionsthatarereproducible,auditable,anddefensible

Tracereplacesprobabilisticriskmodelswithadeterministicscoringpipeline.Samewallet,samedata,sameresulteverytime.Builtforcomplianceteamsthatmustdefendtheirmethodologytoregulators.

Launch Trace
TraceAnalysisReportsDatasetsWallet Address0x7a250d...f049e72HIGH RISKRisk BreakdownSanctionsCriminalMixer Exp.IndirectConfidenceHIGH3 datasets · 2 hopsEvidence4 signals · 12 counterpartiesSHA-256: a3f8c2...9e1dTransaction Graph · 2 HopsTargetExchangeOFACEvidence LogTypeSourceSeverityDistanceOFAC SDN MatchTreasury.govCRITICAL1 hopTornado CashContract RegistryHIGHDirectUnhosted WalletHeuristicMEDIUM2 hops
scroll
$
> [COMPLIANCE PROBLEM]

The compliance problem

Risk tools that cannot explain themselves.

Moston-chainriskplatformsproducescoresthroughopaquemodelsproprietaryalgorithmsthatweightsignalsdifferentlyacrossversions,returninconsistentresultsforthesameaddress,andoffernomethodologydisclosure.Acomplianceofficercannotdefendwhattheycannotreproduce.

Whenaregulatoraskswhyawalletwasratedhigh-risk,theanswercannotbe'themodelsaidso.'Regulatoryframeworksdemandexplainability:definedinputs,governedlogic,auditableoutputs.Probabilisticconfidenceisnotacompliancemethodology.

Thegapisstructural.Currenttoolswerebuilttodetectpatterns,nottoproducedefensibleregulatorydecisions.Detectionisnecessarybutinsufficientwhatcompliancerequiresisagovernedassessmentpipelinewhereeveryoutputtracesbacktoitsinputs.

Opaque Model?678254Same wallet, different resultsDeterministic Pipeline727272Same wallet, same result

If the methodology cannot be reproduced, the decision cannot be defended.

$
> [CAPABILITIES]

Capabilities

Governed risk assessment, not probabilistic guessing.

Deterministic Risk Scoring

Quantitative0–100scoringacrosssanctions,criminalassociation,mixerexposure,andindirectcounterpartyrisk.Everyscoreisreproduciblethesamemethodology,appliedtothesamedata,producesthesameresult.

Scoring weights are governed, not trained. Risk categories are hierarchical: direct sanctions override behavioral signals. For compliance teams, this means every risk decision can be explained to a regulator with full methodology lineage — not just a number, but the governed reasoning that produced it.

72HIGHRisk CategoriesSanctions85CRITICALCriminal Assoc.40MEDIUMMixer Exposure55HIGHIndirect Risk20LOWDeterministic · Engine v1.0 · Snapshot #a3f8c2

Multi-Hop Graph Analysis

Counterpartytracingwithconfigurabledepthandhop-distancedecay.Understandnotjustwhoawallettransactedwith,buttheriskprofileoftheircounterparties.

Expand from 0 to 2 hops across the transaction graph. Each hop reduces exposure weight. Tier 1 regulated exchanges act as risk firewalls — exposure beyond KYC-enforced boundaries is not propagated. In practice, this determines whether an investor's wallet has indirect exposure to sanctioned entities — and at what distance that exposure becomes immaterial under your compliance policy.

Hop 0Hop 1Hop 2TargetBinanceOFACGraph MetricsNodes explored47Edges traversed128Counterparties12Max depth2 hopsExchange boundary: Tier 1 firewall

Structural Pattern Detection

Anti-gamingdiagnostics:peelchains,dustclustering,washloops,fan-in/fan-out.Identifiesobfuscationattemptsthatshouldtriggerenhancedduediligence.

Patterns are confidence-scored and diagnostic-only — they inform the analyst, not the risk score. Detection runs independently of scoring to prevent adversarial manipulation of the assessment. These patterns surface in your onboarding review as diagnostic signals — flagging wallets where the transaction structure suggests deliberate obfuscation, warranting manual review before approval.

Anti-Gaming DiagnosticsDiagnostic only · Does not affect scorePeel ChainSequential value reduction82%Dust DilutionLow-value noise injection45%Wash LoopCircular self-transfersNot detectedFan-Out BurstRapid multi-output spread67%

Immutable Reporting

Write-oncereportswithSHA-256integrityverificationandfullaudittrail.Everyassessmentissealed,versioned,anddefensibleunderregulatoryexamination.

Reports are WORM-enforced at the database level. Every output includes engine version, dataset snapshot, and cryptographic content hash. When an auditor asks for the risk assessment that cleared an investor eighteen months ago, the exact report — with its methodology version, data snapshot, and cryptographic seal — is retrievable and verifiable.

Risk Assessment ReportReport ID: RPT-2026-0342Issued: 2026-03-24T14:32:00ZSEALEDWORMContent Hashsha256:a3f8c2e1...9b4d7f0eReport SectionsExecutive SummaryScope of AnalysisFindings & SignalsRisk BreakdownConfidence LevelEvidence LogMethodology AnnexEngine v1.0 · Snapshot #a3f8c2 · Supersedes: none
$
> [SCORING PIPELINE]

Architecture

A scoring pipeline, not a black box.

Tracedecomposesriskassessmentintodiscrete,auditablestages.Eachstagehasdefinedinputs,transformationlogic,andoutputsgovernedbyversionedspecificationsratherthanopaquemodels.

Thepipelineisdeterministicbydesign.Reproducibilityisnotafeatureitisastructuralguaranteeenforcedateverylayerofthesystem.

Data IngestionGraph BuilderScoring EngineEntity ResolutionReport Issuance
$
> [INTEGRATED]

Integration

Live inside Sentinel today.

Traceisnotastandaloneforensicstool.ItoperatesastheriskintelligencelayerwithinSentinelHedgequarter'soperationalcontrolsurface.WalletrisksignalsfromTracefeeddirectlyintoinvestoronboardingworkflows,flaggingaddressesthatrequireenhancedduediligencebeforetheyreachcompliancereview.Thisintegrationisliveandoperational.