Our Approach
Clicker’s philosophy is to exclude data we don’t trust rather than try to correct it after the fact. At a high level:- Sends and receives aren’t trades - moving tokens between wallets doesn’t create phantom gains
- Unknown or extreme prices are rejected rather than estimated
- Anomalous traders and tokens are blocked from leaderboards
Price Integrity Safeguards
Manipulated prices are a common attack vector. We validate pricing at multiple levels:| Safeguard | Implementation |
|---|---|
| Liquidity thresholds | Reject prices with under 1K or over 1B USD liquidity |
| Price ratio outlier detection | Flag if ratio exceeds 10x or falls below 0.1x between swap sides |
| Quote token preference | When prices conflict, prefer stablecoin side |
| 5-minute quantization | Price windows prevent manipulation via timing |
Leaderboard Eligibility
Appearing on a leaderboard requires meeting multiple criteria. High PnL alone isn’t enough.| Requirement | Value |
|---|---|
| Recent trading activity | 3+ swaps in last 7 days |
| Minimum trade value | 500+ USD each |
| Recent swap comment | Within 30 days (for commenters section) |
| Not blocked | Address not flagged by moderation |
Token & User Moderation
Global Blocklists
When we identify a manipulated token or bad actor:- Token blocklist: Admin-curated list of suspicious tokens. When a token is blocked, all affected user metrics are recalculated from scratch.
- Leaderboard-specific blocks: Profiles can be hidden from leaderboards while remaining visible in other contexts.
Manual Curation
Our moderation team:- Reviews PnL leaderboards daily
- Blocks tokens that inappropriately impact PnL across users
- Investigates and removes accounts that appear to be gaming
- Searches for new addresses of known traders across public sources
- Manually adjust PnL values - all PnLs are calculated
- Remove traders without documented reason
- Discriminate against legitimate trading activity
Summary
| Layer | What It Protects Against |
|---|---|
| Data exclusion | Airdrops, sends, dust, non-trade transactions |
| Price validation | Manipulated prices, illiquid tokens, timing attacks |
| Eligibility gates | Inactive accounts, one-time outliers |
| Manual curation | Novel manipulation, edge cases, bad actors |