dune-sim-onchain-analytics
Dune Sim and Dune Analytics — on-chain analytics skill
This skill is the primary home for Dune-powered workflows in blockint: how to think, what to call when, and how to ship analytics that combine realtime Sim data with historical SQL where appropriate. It is not a thin link list—use it to structure tasks; open docs.sim.dune.com/llms.txt and openapi.json for exact parameters and auth as you implement.
Educational and integration guidance—users remain responsible for API keys, billing, and Terms.
Mental model: two engines
| Engine | Best for | Typical outputs |
|---|---|---|
| Dune Sim | Live wallet and token state—balances, activity feeds, transactions, NFT collectibles, DeFi positions, stablecoin views, webhook subscriptions | Apps, agents, alerts, “what does this address hold / do now” |
| Dune Analytics API | Historical exploration—SQL over Dune’s curated blockchain tables | Research, cohorts, backtests, dashboards backed by queries |
Rule of thumb: Need streaming or low-latency address/token views across many EVM chains or SVM (Solana / Eclipse, etc.) → start with Sim and chain-specific docs under chains/. Need long-horizon or custom aggregations across Dune SQL models → Analytics API and query execution docs.
When to use which surface (decision flow)
- Single address or small set — balances, recent activity, NFTs, token metadata → Sim EVM or SVM endpoints (see overviews below).
- Ongoing monitoring — balance or activity changes for a watchlist → Subscriptions / webhooks (create, update addresses, lifecycle per docs).
- Token distribution or “top holders” style — Sim token holders / related EVM docs; confirm spam / filtering parameters (e.g. exclude low-liquidity noise) in live API reference.
- Cross-wallet analytics, custom metrics, or historical slices — execute or manage SQL via Dune Analytics API; combine results with Sim in the application layer if needed.
- Multichain — confirm chain ID and supported chains in docs before assuming parity across EVM L2s or SVM deployments.
EVM vs SVM (Solana-class)
- EVM: Broad endpoint family—activity, balances, transactions, collectibles, DeFi positions, stablecoins, subscriptions, token info / holders. Use EVM overview as the map.
- SVM: SVM overview — realtime balances and transactions for Solana-class addresses; align address encoding and chain scope with docs. For Solana-only RPC-depth debugging, pair with solana-tracing-specialist and provider docs (e.g. Helius)—Sim is product API, not a full RPC replacement.
Operations: CUs, errors, keys
- Compute Units (CUs) — Billing is CU-based; estimate cost per workflow (polling vs webhooks, batch sizes). Read Compute Units before production sizing.
- Errors — Implement retries with backoff per Error handling; never treat 429/5xx as permanent failure without reading response bodies.
- Secrets — No Sim API keys in front-end bundles. Use server routes or Cloudflare proxy pattern from docs.
- Spam / noise — Use documented token filtering /
exclude_spam_tokens-style controls where available; labels and prices change—revalidate for reporting.
Agent and IDE integration
- Agent reference — drop-in file for Claude Code, Cursor, Codex, Gemini CLI, etc.
- Build with AI —
llms.txt, Markdown pages, OpenAPI for tool-calling designs.
How this skill fits blockint
| Task | Pair with |
|---|---|
| Abstract “what is blockchain analytics” | blockchain-analytics-operations |
| Solana forensic tracing patterns | solana-tracing-specialist |
| Full investigator narrative | on-chain-investigator-agent |
| Sanctions / compliance screening products | range-ai-investigation-playbook, chainalysis-sanctions-screening — different stacks; do not conflate with Dune outputs |
Guardrails
- Compliance — Dune data supports research; sanctions and legal outcomes need designated tools and counsel.
- Attribution — Wallet labels and heuristics can be wrong; separate fact (chain events) from inference (entity names).
- ToS — Respect Dune’s terms, rate limits, and attribution for published queries or embeds.
Authoritative specs (keep open while coding)
| Resource | URL |
|---|---|
| Doc index | docs.sim.dune.com/llms.txt |
| Quickstart | docs.sim.dune.com/index.md |
| Dune Analytics API (SQL) | docs.sim.dune.com/dune-analytics-api.md |
| OpenAPI | docs.sim.dune.com/openapi.json |
EVM: overview · activity · balances · transactions · subscriptions · supported chains · token filtering
SVM: overview · balances · transactions
More from agentic-reserve/blockint-skills
evm-solidity-defi-triage-agent
Guides EVM Solidity DeFi triage from public verified source or bytecode—access control, proxies, oracle usage, reentrancy and CEI patterns, DEX/router integrations, and common vulnerability classes. Use when the user asks for Ethereum or L2 smart contract security review, Solidity audit triage, OpenZeppelin proxy risks, or EVM-specific DeFi patterns—not for live exploits or private keys.
10solana-defi-vulnerability-analyst-agent
Guides discovery and documentation of Solana DeFi protocol risks from public code and chain state—Anchor/native programs, PDAs, CPIs, oracles, pools, SPL mechanics, and historical tx reconstruction. Use when the user asks for Solana program security review, DeFi vulnerability triage, PDA or CPI safety, oracle or liquidity-pool risk, launchpad/bonding-curve issues, or evidence-backed severity findings without exploits or private keys.
10solana-tracing-specialist
Guides Solana-specific on-chain forensics—ATA resolution, SPL instruction parsing, transaction history via RPC and indexers (e.g. Helius-style APIs), fund-flow graphs, Solana clustering heuristics, and program authority review. Use when the user investigates Solana wallets, SPL tokens, DEX/Jito flows, rug or phishing patterns on Solana, or needs evidence-structured tracing reports with public data only.
10risk-exposure-screening-concepts
Educational map of risk exposure screening—typical risk indicator taxonomies, exposure value and percentage, address-level vs transaction-level engines, and common template families (entity label, multi-hop interaction, blacklist). Use when the user asks how commercial screening tools reason about labeled addresses, tainted flows, or deposit vs withdrawal checks—not for legal sanctions determinations or substituting a vendor’s live rules.
10sealevel-attacks-solana
Points to the coral-xyz sealevel-attacks repository—minimal Anchor programs demonstrating common Solana (Sealevel) exploit patterns and recommended mitigations. Use when auditing or learning Solana program security, pairing with solana-defi-vulnerability-analyst-agent—not for deploying attacks against live systems or evading law.
9solana-clustering-advanced
Applies advanced Solana address-clustering—transaction graphs, temporal and behavioral heuristics, Jito bundle and launchpad patterns, PDA derivation links, and optional ML feature validation on public data. Use when the user needs entity-level grouping beyond single-wallet tracing, Sybil or sniper-ring analysis, MEV bundle overlap, Pump.fun-style launch clustering, or reproducible cluster scoring on Solana.
9