KYS Logo
KYS Docs
HomeDocumentation

KYS Documentation

Complete guide to using the Keep Yourself Safe browser extension for crypto Twitter intelligence

Getting Started

Installation

Chromium-based Browsers

Install from Chrome Web Store (works with Chrome, Edge, Brave, Opera)

Step-by-Step Installation

1
Visit Chrome Web Store

Go to the Chrome Web Store and search for "KYS - Keep Yourself Safe"

2
Install Extension

Click "Add to Chrome" and confirm the installation when prompted

3
Pin Extension

Pin the KYS extension to your browser toolbar for easy access

4
Start Using

Visit Twitter and start browsing - KYS will automatically begin tracking

Quick Setup

Basic Configuration

Enable deleted tweet tracking
Configure data retention period

Advanced Options

Custom tracking filters
API key generation
Webhook configuration

System Requirements

Supported Browsers

Chrome90+
Edge90+
Brave1.25+
Opera76+

Minimum Requirements

RAM4GB
Storage100MB
InternetRequired
Twitter AccountOptional

Features Guide

Deleted Tweets Tracking

Automatically captures and archives tweets from crypto influencers before they get deleted. Never lose important crypto intelligence again.

How It Works

Continuously monitors followed accounts in real-time
Saves tweet content, timestamps, and metadata instantly
Detects deletions immediately and preserves archives
Searchable by keyword, date range, or specific accounts

What It Does

Maintains permanent record of token promotions
Archives price predictions and market calls
Preserves controversial statements and announcements
Tracks narrative changes over time

DYOR Edge

Uncover patterns of behavior and credibility
Identify attempts to hide previous statements
Research influencer track record accuracy
Detect market manipulation attempts

Contract Address Tracking

Monitors and logs all cryptocurrency contract addresses mentioned in tweets, especially when they get deleted or edited. Essential for detecting rug pulls and scam tokens.

How It Works

Automatically detects contract addresses in tweets
Monitors profile bio changes and deletions
Maintains database with timestamps and metadata
Tracks deletion patterns across accounts

What It Does

Archives all mentioned contract addresses permanently
Logs when CAs are removed from tweets or bios
Associates CAs with specific influencer accounts
Creates timeline of promotional activities

DYOR Edge

Identify potential rug pulls before they happen
Track which tokens were promoted then abandoned
Analyze suspicious promotional patterns
Research project legitimacy and team behavior

Red Flag Alert

When influencers remove contract addresses from their bio or delete tweets containing them, this often indicates potential issues, failed launches, or exit scams.

First Followers Analysis

Identifies and tracks the very first followers of newly created crypto Twitter accounts. Crucial for detecting insider connections and coordinated networks.

How It Works

Captures first 50-100 followers of new accounts
Analyzes follower profiles for patterns
Creates network maps of connections
Tracks growth patterns over time

What It Does

Identifies potential team members and insiders
Detects coordinated account networks
Maps early supporter connections
Distinguishes organic vs artificial growth

DYOR Edge

Verify project authenticity and team legitimacy
Identify bot networks and fake followers
Discover connected projects and partnerships
Assess project credibility from day one

Profile Changes Tracking

Maintains complete history of profile modifications including username changes, bio updates, profile pictures, and display name alterations.

How It Works

Monitors all profile elements continuously
Creates before/after comparison snapshots
Timestamps every modification precisely
Builds comprehensive change timeline

What It Does

Tracks username and handle changes
Archives bio updates and modifications
Preserves profile picture history
Documents display name evolution

DYOR Edge

Detect rebranding attempts and pivots
Identify attempts to hide past associations
Track focus shifts between different tokens
Research account evolution and credibility

Key Followers Intelligence

Analyzes follower networks to identify the most influential and connected followers. Goes beyond follower count to examine quality and significance.

How It Works

Analyzes follower networks comprehensively
Creates detailed network connection maps
Tracks follow/unfollow patterns over time
Scores follower influence and significance

What It Does

Identifies crypto influencers in follower lists
Highlights whale accounts and major holders
Maps project founders and team connections
Detects industry insider relationships

DYOR Edge

Assess project credibility through connections
Identify shifting alliances and partnerships
Discover potential conflicts and competitions
Research social proof and legitimacy indicators

Intelligence Insight

All features work passively in the background while you browse Twitter normally, building comprehensive intelligence profiles to help you make informed investment decisions.

Safety & Security

Is it Safe?

Chrome Extension Sandbox

KYS runs in Chrome's secure sandbox environment, which isolates the extension from your system and other applications. This means it cannot access your files, other browser tabs, or interfere with anything outside of its designated scope.

Page Analysis Only

The extension only analyzes the Twitter/X page you are currently viewing. It reads publicly available information that's already displayed on your screen and cannot access private data, direct messages, or content from other websites.

Internal API Communication

All data processing happens through our secure internal APIs. The extension simply sends profile information to our servers and receives analysis results back. No sensitive browser data or personal information is transmitted.

Limited Permissions

KYS only requests the minimum permissions needed to function: reading content from Twitter/X pages and communicating with our API servers. It cannot access your browsing history, passwords, or personal files.

Privacy Protection

  • No personal data collection - we only analyze public Twitter profiles

  • No tracking of your browsing habits or personal activity

  • All data requests are encrypted and processed securely

  • You can disable or uninstall the extension at any time

Data Security

What We Access:

  • Public Twitter profile data
  • Publicly visible tweets and interactions
  • Follower/following relationships

What We Don't Access:

  • Private messages or DMs
  • Your personal files or data
  • Other websites or browser tabs

API Reference

Authentication

All API requests require authentication using your API key. Include it in the Authorization header.

Authorization: Bearer your_api_key_here

Getting Your API Key

Generate your API key from the extension settings panel. Click the KYS icon → Settings → API Access.

API Endpoints

GET/api/deleted-tweets

Retrieve archived deleted tweets with optional filtering and pagination.

Parameters

user_idFilter by user ID
limitResults per page (max 100)
sinceISO date filter

Response Fields

idTweet ID
contentTweet text
deleted_atDeletion timestamp
curl -H "Authorization: Bearer YOUR_API_KEY" \ "https://api.kys.app/v1/deleted-tweets?user_id=123&limit=10"

Rate Limits

1,000
Requests/hour
10MB
Max response size
30 days
Data retention

Rate Limit Headers

Check X-RateLimit-Remaining and X-RateLimit-Reset headers in responses to monitor your usage.

Need Help?

Our support team is here to help you get the most out of KYS

Direct Support

Contact our technical support team directly for any issues or questions