Skip to main content
Sign in
Phantom Wallet2 decisions on this page

Audit log

Every state-changing event for Phantom Wallet: moderation decisions on community submissions, plus corrections and updates from the news pipeline. URL-based decisions carry three independent witnesses — the original source, an Internet Archive snapshot taken at submission time, and a Solana memo signed by our publicly-disclosed publisher key.

  1. #1reviewby reviewerreviewer
    2026-05-06 02:50:06Z
    Score: 7474 (no score change)
    The investigation is well-sourced and largely accurate. Two factual errors were identified: (1) the Solana web3.js compromised version is listed as '1.96.7' but should be '1.95.7', and (2) the timeline attributes the CFTC no-action letter to the 'Division of Enforcement' when it was issued by the Market Participants Division. The August 2022 exploit loss estimate of '$5-7 million' skews slightly above most cited sources ($4-6M). Three claims are unverifiable due to reliance on self-reported metrics.
    anchoranchored
    chain
    mainnet-betaslot 417,878,548
    sig
    4TwdcPN9XCwZ…paBNJaVQexplorer ↗
    hash
    AYou1mvo9BEg…sKo4NCnbsha256 → base58
    verifying row…full verify ↗
    canonical bytes (854 B) ▸
    {"actor":"reviewer","decided_at":"2026-05-06T02:50:06.503Z","decision":"review","investigation_id":"534e51fc-2dbe-42e6-86ff-3f144efce521","new_score":74,"page_slug":"phantom-wallet","prev_score":74,"reason":"The investigation is well-sourced and largely accurate. Two factual errors were identified: (1) the Solana web3.js compromised version is listed as '1.96.7' but should be '1.95.7', and (2) the timeline attributes the CFTC no-action letter to the 'Division of Enforcement' when it was issued by the Market Participants Division. The August 2022 exploit loss estimate of '$5-7 million' skews slightly above most cited sources ($4-6M). Three claims are unverifiable due to reliance on self-reported metrics.","score_delta":0,"sequence_num":1,"submission_content_hash":null,"submission_id":null,"submission_kind":null,"submission_valence":null,"v":1}
    Verify offline (run on your own machine)
    python -m src.verify_decision 07703ced-0b45-4e48-836e-43c2e247e505
  2. #2review reviseby judgejudge
    2026-05-06 02:50:06Z
    Score: 7469 (-5)
    The investigation is well-sourced and broadly accurate, but the reviewer identified three correctible errors: the Solana web3.js compromised version is listed as 1.96.7 when it should be 1.95.7, the timeline attributes CFTC Staff Letter 26-09 to the Division of Enforcement instead of the Market Participants Division, and the August 2022 exploit loss estimate of $5-7M skews above cited sources ($4-6M). None of these errors materially misrepresent risk, but they warrant revision before the page is fully approved.
    anchoranchored
    chain
    mainnet-betaslot 417,878,551
    sig
    BkxwbxhenHvq…NXdFrjziexplorer ↗
    hash
    ELUE9SbUiZfp…753SRWDMsha256 → base58
    verifying row…full verify ↗
    canonical bytes (871 B) ▸
    {"actor":"judge","decided_at":"2026-05-06T02:50:06.503Z","decision":"review_revise","investigation_id":"534e51fc-2dbe-42e6-86ff-3f144efce521","new_score":69,"page_slug":"phantom-wallet","prev_score":74,"reason":"The investigation is well-sourced and broadly accurate, but the reviewer identified three correctible errors: the Solana web3.js compromised version is listed as 1.96.7 when it should be 1.95.7, the timeline attributes CFTC Staff Letter 26-09 to the Division of Enforcement instead of the Market Participants Division, and the August 2022 exploit loss estimate of $5-7M skews above cited sources ($4-6M). None of these errors materially misrepresent risk, but they warrant revision before the page is fully approved.","score_delta":-5,"sequence_num":2,"submission_content_hash":null,"submission_id":null,"submission_kind":null,"submission_valence":null,"v":1}
    Verify offline (run on your own machine)
    python -m src.verify_decision fd102876-3d7c-4245-acb6-fa6f12355629
How verification works. The “Row integrity” check above is computed in your browser — your machine recomputes the SHA-256 of the canonical bytes and compares against the stored hash. No avoid.net server can fake that check. The “full verify” link goes one level deeper: your browser fetches the on-chain transaction from a Solana RPC node and confirms the same hash is in the memo. If you don’t want to trust either avoid.net or the public RPC, run the CLI verifier on your own machine — python -m src.verify_decision <event_id>.