You can find every example on this page in the repository’sDocumentation Index
Fetch the complete documentation index at: https://docs.blnkfinance.com/llms.txt
Use this file to discover all available pages before exploring further.
/blnk-watch/examples folder. Use them as starting points, then tweak the thresholds, watchlists, and metadata keys to fit your own transaction payload and risk policy.
Each example below is a full watch script you can drop into your rules directory.
Keep in mind:When a rule depends on extra context such as KYC tier, watchlists, or precomputed time fields, make sure your ingestion flow adds those values to the transaction metadata before Watch evaluates the transaction.
Basic conditions
These examples trigger on a single comparison or a simple list check. They are useful when you want a rule to react to one clear signal without needing historical context.Block black listed accounts
This rule blocks a transaction when the source account appears in a blacklist supplied on the current transaction. It works well when your application already maintains a denylist and passes it into Watch as metadata.BlockBlackListedAccounts.ws
Category BTC check
This rule sends cryptocurrency-tagged activity to review. It is a lightweight pattern for routing a known transaction category into a tighter manual workflow.CategoryBTCCheck.ws
High risk destination country
This rule blocks transactions headed to countries that your system has already marked as high risk. It keeps the country list outside the DSL so you can update it without rewriting the rule.HighRiskDestinationCountry.ws
High value transaction check
This rule reviews any transaction above a fixed value threshold. It is a good baseline control for catching unusually large transactions before you layer on more specific checks.HighValueTransactionCheck.ws
Known fraud entity check
This rule blocks transactions sent to known bad counterparties that are provided on the current transaction. It is useful when your fraud system or case-management tooling already maintains a live list of risky entities.KnownFraudEntityCheck.ws
Sanctioned country check
This rule blocks transactions going to countries that appear on a sanctions list supplied in metadata. It is a direct pattern for policy-driven controls where the list itself changes more often than the rule logic.SanctionedCountryCheck.ws
Suspicious MCC check
This rule reviews transactions whose merchant category code falls inside a known high-risk list. It is useful for fast controls around gambling, quasi-cash, or other categories that deserve extra scrutiny.SuspiciousMCCCheck.ws
Compound conditions
These examples combine multiple checks in one rule. They are helpful when one field on its own is not enough, but a combination of amount, account type, or metadata creates a stronger signal.Block if previous failed
This rule blocks a very large transaction when the previous transaction status for the same flow was already marked as failed. It assumes your upstream system writes the prior status into metadata before the transaction reaches Watch.BlockIfPreviousFailed.ws
Business account personal spending
This rule reviews business-account transactions that land in merchant categories commonly associated with personal spending. It is useful for expense, card, and treasury programs that want to catch obvious policy misuse early.BusinessAccountPersonalSpending.ws
Cross border transaction check
This rule reviews higher-value transactions when the source and destination countries do not match. It is a good example of comparing one metadata field against another value from the current transaction.CrossBorderTransactionCheck.ws
Dormant account activity
This rule reviews transactions from accounts that have been inactive for a long time and suddenly become active again. It is useful for spotting account takeover, mule activity, or stale credentials being reused.DormantAccountActivity.ws
Foreign currency transaction
This rule reviews larger transactions when the transaction currency differs from the account’s base currency. It is a practical pattern for detecting unusual cross-currency behavior without blocking normal low-value activity.ForeignCurrencyTx.ws
Low KYC daily limit
This rule reviews a transaction when a low-tier KYC customer exceeds the per-transaction or daily limit assigned to them. It relies on your application passing the limit into metadata so the threshold can differ by customer.LowKycDailyLimit.ws
Low KYC high risk
This rule reviews lower-KYC customers when they transact in a high-risk merchant category and the amount is material. It is a common pattern for tightening controls on newer or less verified accounts.LowKycHighRisk.ws
Merchant issuer mismatch
This rule reviews card transactions when the merchant country does not match the issuer country. It is a simple geo-mismatch control that can be combined with other travel, device, or authentication signals.MerchantIssuerMismatch.ws
New account first day
This rule reviews larger transactions from very new accounts. It helps catch abuse patterns where bad actors create a fresh account and immediately try to move significant value.NewAccountFirstDay.ws
Self transfer check
This rule reviews large self-transfers by checking whether the source and destination are the same. It is useful for spotting circular movement, layering, or attempts to manipulate downstream controls.SelfTransferCheck.ws
Suspicious description check
This rule reviews high-value transactions when an upstream process has already normalized the free-form description into a suspicious keyword. It is a good fit when you want predictable rule logic without relying on complex text parsing inside the DSL.SuspiciousDescriptionCheck.ws
Aggregate conditions
These examples look at patterns over a rolling window instead of only the current transaction. They are useful for detecting bursts, velocity spikes, repeated amounts, or cumulative exposure that a single transaction would not reveal.Destination high inflow
This rule reviews a destination that has received more than a threshold amount in the last 24 hours. It is a straightforward inflow monitoring pattern for merchants, wallets, or payout endpoints.DestinationHighInflow.ws
High amount velocity source
This rule reviews a source account when its total sent amount in the last hour crosses a threshold. It is useful for spotting rapid-value movement even if each individual transaction looks normal on its own.HighAmountVelocitySource.ws
High frequency destination
This rule reviews repeat traffic to the same destination when the count becomes unusually high. It is helpful for detecting burst payment behavior to one merchant, beneficiary, or wallet.HighFrequencyDestination.ws
Low KYC daily total
This rule reviews a tier-1 customer when their cumulative outbound amount in the last 24 hours crosses a threshold. It is a common companion rule to per-transaction limits because structuring often happens through many smaller transfers.LowKycDailyTotal.ws
Rapid small burst
This rule reviews a source when several small transactions happen in a short period. It is a useful anti-structuring pattern because bad actors often split activity into smaller amounts to avoid single-transaction thresholds.RapidSmallBurst.ws
Repeated identical amount
This rule reviews transactions when the same amount repeats several times within an hour. It is a simple pattern for catching scripted behavior, installment abuse, or naïve structuring attempts.RepeatedIdenticalAmount.ws
Repeated identical amount 2
This rule reviews a source when both the transaction count and the repeated amount count stay elevated across a full week. It is a broader pattern for detecting repeated payment habits that may not look suspicious in a shorter window.RepeatedIdenticalAmount2.ws
Source high outflow
This rule reviews a source account once its total outflow in the last 24 hours becomes unusually high. It works well as a general-purpose velocity control for wallets, current accounts, or card programs.SourceHighOutflow.ws
Time-based conditions
These examples depend on time context that your application has already added to metadata, such as hour of day or day of week. That approach keeps the rules portable while letting you localize time logic upstream when needed.Late night transactions
This rule reviews larger transactions that occur late at night. It is useful for flagging activity that lands outside a customer’s normal operating window without blocking all after-hours traffic.LateNightTransactions.ws
Review Christmas transactions
This rule reviews transactions that occur on Christmas Day. It is a simple seasonal pattern you can adapt for holidays, maintenance windows, or business-specific blackout periods.ReviewChristmasTransactions.ws
Unusual transaction time
This rule reviews large transactions that happen in the early-morning window between 1 AM and 5 AM. It is a good template when you want to tune thresholds based on hours that are uncommon for a customer segment or product line.UnusualTransactionTime.ws
Weekend transaction check
This rule reviews large transactions that occur on a weekend. It is a practical pattern for products where genuine activity is mostly weekday-driven and weekend spikes deserve a closer look.WeekendTransactionCheck.ws