![](https://www.coindesk.com/resizer/YtlOPwyoZd0U2v9m-_MqCp9iFkM=/1200x628/cloudfront-us-east-1.images.arcpublishing.com/coindesk/LBLERGDH7BG6XJ345XTEUWGZAA.jpeg)
Here’s how it works: Users submit their URLs or files to PolySwarm to check for malicious code that could be embedded within such files. An automated engine then runs a search against several other “safe” codes, following which the user-submitted file is either deemed malicious or safe. Transactions for this service are done via nectar tokens, which are additionally rewarded to software partners and customers using PolySwarm.