: Always inspect the config code within SilverBullet before running it. Malicious configs can be scripted to steal your own data or proxies by sending them to a third-party server (a "webhook").

: Launch the runner. The software will execute the logic within the .svb file against your list and categorize the results based on the config's rules. Safety and Security Warning

: Open the config in the built-in editor to see if it requires specific proxies (residential or mobile) or if it needs a specific "Combo" format (e.g., email:password ). Environment Setup :