Summary of Zero//Stack
Zero//Stack is a modular, security-focused plugin architecture designed to detect, fingerprint, and neutralize threats in Web3 environments. Built for performance, stealth, and interoperability, this system powers on-device, edge-based, and server-integrated threat analytics.
System Setup
- Clone or download the Zero//Stack system.
- Configure your
.env
file (see.env.template
). - Include the core runtime files in your environment:
zs-bootstrap.js
zerobus.js
zs-data-dispatcher.js
freemius-loader.js
- Drop any plugins into
/plugins
. - In each plugin, place
import { bootstrapPlugin } from './zs-bootstrap.js'; bootstrapPlugin();
at the top.
Freemius Licensing (one of multiple licensing outlets)
- Add your license keys to
.env
(or if using our wordpress plugin admin -> ZS Panel -> Config Tab):ZS_LICENSE_KEY_MAIN
for full suiteZS_LICENSE_KEY_PACK1
for bundle-specific keys
Zero//Stack Premium Plugin Licensing Notice
Premium Zero//Stack plugins require a valid license key to function.
If the system cannot verify your license with the licensing server, the associated plugin(s) will be automatically disabled until validation is successful.
Tamper Protection Warning
All license enforcement logic is obfuscated, encrypted, and may include active protection layers to detect and defend against unauthorized modifications.
Any attempt to bypass, disable, alter, or reverse-engineer licensing components is strictly prohibited.
By installing or using this software, you acknowledge and agree:
• Tampering with any part of the plugin codebase or license system is a direct violation of the Terms of Use. • The code may include security measures that respond automatically to unauthorized tampering. • Rugdox LLC, Zero//Stack, and its developers, partners, or affiliates are not liable for any resulting damage, data loss, system instability, or degraded functionality caused by unauthorized modification or interference.
- If you’re experiencing issues validating your license, transferring access, or activating premium features, please contact Zero//Stack Support directly through your customer dashboard or official support channels.
Plugin List & Use Cases
- spoof-breaker-pro: Detects spoofed browser environments and sends structured fingerprint output.
- zero-cloak: Stealth plugin to collect entropy/fingerprint data without detection. Auto-runs from
/plugins
folder. - wallet-sniffer: Captures signature requests and monitors Web3 wallet behaviors.
- cursor-inertia: Detects natural vs synthetic mouse movement.
- font-preference-fingerprint: Fingerprint entropy based on font preferences and rendering.
- gpu-context-fingerprint: Detects headless GPU emulation or spoofing.
- math-function-entropy: Validates native math entropy consistency (anti-bot).
- session-velocity: Tracks behavioral speed and interaction patterns across sessions.
- clipboard-entropy: Detects automated data injections via clipboard.
- dom-anomaly-detector: Watches for DOM mutation patterns common in injection attacks.
- screen-color-depth: Uses screen resolution and depth to fingerprint display environments.
- session-timing: Measures performance and timing APIs to detect virtualization.
- trace-dynamic-mapper: Builds a dynamic map of all traceable entropy signals.
- plugin-hash-summary: Summarizes output of all plugin signals into a hashed identity.
- touch-precision: Mobile/touchscreen-based entropy detection plugin.
- advanced-entropy-cluster: Multi-plugin entropy combiner for behavioral fingerprinting.
- signalweave-fingerprint: Advanced cross-signal anomaly detection and fingerprint correlation.
Use Case Examples
- Web3 dApps: Detect spoofed wallets, headless browsers, or bots before they can interact.
- Security Platforms: Integrate with your own APIs or threat feeds to enrich detection.
- Threat Feeds
- Mapping Surface Threat Events
- Use to Identify Repeat Web3/Web2 Fraud Offenders
- Help in Identifying TOR and VPN Users
- Find out the Intentions of Users
- (Optional) Spoof Signals back to Bad Actors Scanning Your platform/site
- (Optional) Active Threat Response to Defend your Zero//Stack
- Other Use Cases: Web3 Platforms, Crypto Platforms, Small Websites, or any website that wishes to harden security and map surface threat signal data.
Questions?
Reach out at support@zerostack.shop or utilize our Help Desk.