I read some version of the CryptoKitties source code on https://github.com/axiomzen/cryptokitties-bounty
How do I use information only on https://cryptokitties.co, and preferably inside MetaMask, to determine the actual address of the deployed KittyCore contract.
To be clear, some blogger has told be that this is what I am looking for: https://etherscan.io/address/0x06012c8cf97bead5deae237070f9587f8e7a266d#code However anybody could have deployed that. I am looking to determine which one is actually running behind https://cryptokitties.co.