Here’s how it works: Users submit their URLs or files to PolySwarm to check for malicious code that could be embedded within such files. An automated engine then runs a search against several other “safe” codes, following which the user-submitted file is either deemed malicious or safe. Transactions for this service are done via nectar tokens, which are additionally rewarded to software partners and customers using PolySwarm.
Leave a Reply