Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Rug Pull

A rug pull is a malicious exit scam in decentralized finance where developers abruptly withdraw all liquidity from a project's pools or abscond with investor funds, rendering the tokens worthless.
Chainscore © 2026
definition
CRYPTO SCAM

What is a Rug Pull?

A rug pull is a type of exit scam in decentralized finance where developers abandon a project and drain its liquidity, leaving investors with worthless assets.

A rug pull is a malicious act in the cryptocurrency and decentralized finance (DeFi) space where developers abruptly abandon a project and withdraw all the invested funds from its liquidity pools. This action causes the project's token value to plummet to near zero, effectively 'pulling the rug' out from under investors. It is a form of exit scam that exploits the permissionless and often anonymous nature of blockchain development. Rug pulls are most prevalent in the creation of new tokens on decentralized exchanges like Uniswap or PancakeSwap, where liquidity can be easily removed by those who control the underlying smart contracts.

There are several common technical mechanisms for executing a rug pull. A hard rug pull involves embedding malicious code, such as a hidden mint function or a modified ownership clause, within the project's smart contract. This gives the developers the ability to mint unlimited tokens or transfer all locked liquidity to their own wallets. A soft rug pull is less technically overt but equally devastating; developers might slowly sell off their large pre-mined token allocations over time, causing a gradual price decline, or they might hype the project to attract investment before disappearing. Both methods rely on a lack of proper code audits and the anonymity of the founding team.

The aftermath of a rug pull leaves investors with tokens that are essentially worthless, as they can no longer be traded due to the absence of liquidity. This starkly contrasts with legitimate market volatility, where price drops are tied to broader economic factors rather than fraudulent withdrawal of capital. High-profile examples include the Squid Game token (SQUID) scam in 2021, where developers implemented code that prevented most holders from selling, and the AnubisDAO incident, where approximately $60 million in Ethereum was drained minutes after the liquidity pool was created. These events highlight the critical risks in unaudited, anonymous crypto projects.

To mitigate the risk of rug pulls, investors and analysts conduct due diligence by reviewing a project's publicly verifiable on-chain data. Key red flags include anonymous teams, unaudited or obfuscated smart contract code, excessive token allocations to developers, and liquidity that is not locked using a trusted, time-released contract. Tools like Etherscan or BscScan allow users to inspect transaction histories, contract ownership, and liquidity lock status. The prevalence of rug pulls has spurred the development of more robust DeFi security practices, including the use of multi-signature wallets for project treasuries and mandatory audits from reputable firms before launch.

etymology
ORIGIN STORY

Etymology

The term 'rug pull' is a vivid piece of crypto-native slang whose origin story is rooted in the physical world and perfectly captures the mechanics of the scam.

The phrase rug pull is a metaphorical term derived from the physical act of yanking a rug out from under someone, causing them to fall. In the context of blockchain and cryptocurrency, it describes a malicious exit scam where developers abruptly abandon a project and withdraw all the invested funds, leaving investors with worthless assets. The imagery powerfully conveys the sudden, unexpected, and devastating nature of the event for those who were 'standing on' the project.

The term gained prominence during the initial coin offering (ICO) boom of 2017-2018 and became ubiquitous with the rise of decentralized finance (DeFi) and non-fungible token (NFT) projects on platforms like Ethereum. Its usage reflects the community's need for a succinct, visceral descriptor for a specific type of fraud that is uniquely enabled by the pseudonymous and permissionless nature of smart contracts. Synonyms like 'exit scam' or 'cash grab' are used, but 'rug pull' has become the definitive jargon.

Etymologically, it belongs to a family of colorful crypto terms that use physical analogies, such as 'whale' for a large holder or 'mining' for proof-of-work. The 'pull' implies a deliberate, orchestrated action by the insiders, distinguishing it from a project that simply fails due to market conditions or poor execution. The term is now formally recognized in regulatory warnings and legal indictments related to cryptocurrency fraud.

key-features
IDENTIFIERS

Key Features of a Rug Pull

A rug pull is a type of exit scam where developers abandon a project and steal investors' funds. These events share common technical and behavioral patterns.

01

Liquidity Removal

The most definitive action. Developers use their privileged access to withdraw all or most of the liquidity pool tokens (e.g., LP tokens from Uniswap), making the project's token impossible to sell and collapsing its price to near zero. This is often executed via the renounceOwnership function if it was never called, or a hidden backdoor.

02

Owner Privileges & Centralization

A high-risk signal is excessive control retained by the deployer. Key functions like minting, pausing trading, changing fees, or upgrading the contract are often controlled by a single owner or multi-sig wallet. The failure to renounce ownership of the contract after launch is a major red flag.

03

Token Minting Function

A malicious contract may include a hidden mint() function that allows the owner to create an unlimited supply of new tokens out of thin air. This dilutes the value held by all other investors and can be sold to drain liquidity, a method known as a soft rug or slow rug pull.

04

Suspicious Token Distribution

Analyzing the token's holder distribution on a block explorer can reveal scams. Red flags include:

  • A single wallet holding a vast majority of the supply.
  • Lack of locked team tokens or vesting schedules.
  • A large portion of supply sent to decentralized exchange (DEX) liquidity pools controlled by the team.
05

Anonymity & Hype-Driven Marketing

Developers are often completely anonymous with no verifiable track record. The project relies heavily on social media hype, influencer shilling, and promises of unrealistic returns (get-rich-quick schemes) to attract capital quickly, rather than demonstrating functional technology or a sustainable product.

06

Withdrawal Trap Mechanisms

Some scams, especially in yield farming or staking pools, implement smart contracts where users deposit funds but cannot withdraw them. The contract logic may contain hidden conditions that always fail, impose impossible fees, or grant the owner sole ability to release funds—which they never do.

how-it-works
DECONSTRUCTING DECEPTION

How a Rug Pull Works

A rug pull is a malicious exit scam where developers abandon a cryptocurrency project and abscond with investors' funds, leaving the token worthless. This guide details the mechanics and common execution patterns.

A rug pull is a type of exit scam in the cryptocurrency and decentralized finance (DeFi) space where the developers of a project abruptly abandon it and withdraw all the invested funds, causing the token's value to plummet to zero. This fraudulent act is analogous to "pulling the rug out" from under investors. It most commonly occurs in decentralized exchanges (DEXs) and projects built on smart contract platforms like Ethereum, where liquidity is provided by users in exchange for governance tokens or a share of trading fees.

The execution typically involves several technical steps. First, developers create a token and a liquidity pool on a DEX like Uniswap or PancakeSwap. They seed the pool with an initial amount of the new token and a paired asset like Ether (ETH). Investors are then lured in through marketing, buying the token and adding more liquidity, which increases the pool's total value locked (TVL). Crucially, the developers retain administrative control, such as ownership of the minting function or the liquidity pool (LP) tokens, which allows them to execute the final heist.

The actual "pull" is executed by exploiting this retained control. In a liquidity pull, the developers use their LP tokens to withdraw all the paired assets (e.g., ETH, BNB) from the pool, draining it and making the token impossible to sell. In a minting attack, they abuse a hidden mint function to create an enormous, worthless supply of the token and dump it on the market. The result is instantaneous: liquidity vanishes, the token price crashes, and the developers disappear with the stolen funds, often transferring them through mixers or cross-chain bridges to obfuscate the trail.

Common red flags for potential rug pulls include anonymous teams, unaudited or obfuscated smart contract code, excessive token allocations to developers, and contracts where the LP tokens are not burned or locked in a verifiable, time-released contract. High-profile historical examples include the Squid Game token (SQUID) and the AnubisDAO incident, which collectively resulted in losses of hundreds of millions of dollars and highlighted the critical need for investor due diligence in a permissionless financial ecosystem.

common-techniques
EXPLOIT MECHANISMS

Common Rug Pull Techniques

A rug pull is a malicious exit scam where developers abandon a project and drain its funds. These are the most prevalent technical and social engineering methods used to execute them.

01

Liquidity Removal

The most direct method where developers withdraw the liquidity pool (LP) tokens from a decentralized exchange (DEX), making the token impossible to sell. This is often preceded by a pump created by hype, after which the developers dump their holdings and remove all liquidity, crashing the price to zero.

  • Mechanism: The deployer calls removeLiquidity() or transfers LP tokens to a wallet they control.
  • Prevention: Look for locked liquidity via a trusted third-party locker (e.g., Unicrypt) and check if LP tokens are burned or sent to a dead address.
02

Hidden Mint Function

A malicious contract includes a mint() function or other privilege that allows the owner to create an unlimited supply of new tokens at will. After attracting investment, the owner mints and dumps massive quantities, instantly devaluing all other holders' tokens.

  • Key Indicator: The contract code is not verified on the block explorer, hiding the function from view.
  • Due Diligence: Always review the verified contract source code on Etherscan or similar explorers. Search for owner-only functions like mint, setMinter, or whitelist.
03

Honeypot Scam

A smart contract is programmed to prevent sells while allowing buys. Investors can purchase the token but cannot sell it, trapping their funds. Variations include blacklisting specific functions for all but the owner or imposing extreme sell taxes (e.g., 99%).

  • How it Works: The transfer or transferFrom function contains logic that reverts transactions from non-whitelisted addresses.
  • Testing: Attempt a test sell with a very small amount on a testnet or after launch to verify sell functionality before committing significant capital.
04

Owner Privileges & Upgradeable Contracts

Contracts with excessive centralized owner privileges pose a critical risk. Owners may have the ability to:

  • Change transaction fees to 100%
  • Pause trading
  • Upgrade the contract to a malicious version
  • Withdraw any ERC-20 tokens sent to the contract

While proxy/upgradeable contracts are legitimate for iterative development, they can be abused if the proxy admin key is not relinquished or placed in a timelock.

05

Soft Rug / Slow Drain

A less abrupt scam where developers slowly extract value over time instead of a single catastrophic event. Techniques include:

  • Siphoning fees: Taking a disproportionate share of transaction or reflection fees.
  • Dumping vesting tokens: Selling allocated "team" or "marketing" tokens on a regular schedule.
  • Rugging the treasury: Gradually draining funds from the project's multi-signature wallet under the guise of "development costs."

This method is designed to avoid sudden panic and can prolong the scam for weeks or months.

06

Social Engineering & Fake Teams

The technical scam is enabled by fraudulent marketing and identity fabrication. Common tactics include:

  • Fake KYC/Doxxing: Using stolen identities or deepfakes for "public" team members.
  • Spoofed Audits: Forging audit reports or paying for a superficial review from a disreputable firm.
  • Pump Groups & Shilling: Coordinating with influencers and Telegram groups to create artificial hype and FOMO (Fear Of Missing Out) before the pull.

The absence of a verifiable, credible team with public LinkedIn/GitHub histories is a major red flag.

security-considerations
RUG PULL

Security Considerations & Red Flags

A rug pull is a type of exit scam where developers abandon a project and withdraw all invested funds, leaving users with worthless assets. This section details common mechanisms and red flags.

01

Liquidity Removal

The most direct form of rug pull, where a developer uses administrative privileges or a hidden backdoor to withdraw all liquidity pool tokens (e.g., LP tokens) from a decentralized exchange. This instantly crashes the token's price to zero, as users can no longer sell. It often involves renouncing ownership of a contract as a false signal of security, only after setting up a malicious function.

02

Token Minting & Supply Manipulation

A developer retains the ability to mint unlimited new tokens via a privileged function in the smart contract. They can then dump these newly created tokens on the market, hyper-inflating the supply and destroying the value of all other holders' assets. This is a soft rug pull that can be executed gradually to avoid immediate detection.

03

Honeypot Scams

A deceptive smart contract is deployed that appears to function normally but contains code that prevents users from selling their tokens. Common mechanisms include blacklisting the seller's address upon a sell attempt or implementing a fee that makes selling economically impossible (e.g., a 100% transfer tax). This traps investor funds while the developer can still sell.

04

Key Red Flags for Investors

Warning signs include:

  • Unaudited Code: No reputable third-party smart contract audit.
  • Centralized Control: Lack of a multisig wallet or timelock for treasury/owner functions.
  • Anonymous Teams: No public, doxxed founders with verifiable reputations.
  • Unrealistic Returns: Promises of guaranteed, outsized yields (APY).
  • Low Liquidity Lock: Liquidity is locked for a very short period or not at all on a service like Unicrypt or Team Finance.
05

The 'Slow Rug'

A more insidious, long-term exit strategy where developers gradually extract value from the project's treasury or revenue streams over time, rather than executing a single dramatic exit. This can involve excessive developer fees, selling vested team tokens ahead of schedule, or failing to deliver on roadmap promises while continuing to collect fees.

06

Related Concepts & Defenses

Understanding related mechanisms is key to defense:

  • Smart Contract Audit: A line-by-line review of code by security experts.
  • Timelock: A delay on privileged functions, giving users time to react.
  • Multisig Wallet: Requires multiple signatures for treasury transactions.
  • Liquidity Lock: Committing LP tokens to a time-locked contract.
  • Renounced Ownership: The developer gives up all control of a contract, a common but not foolproof signal.
examples
HISTORICAL CASE STUDIES

Notable Examples

These high-profile incidents illustrate the various mechanisms and devastating impacts of rug pulls, serving as critical lessons for the DeFi ecosystem.

01

Squid Game Token (SQUID)

A pump-and-dump scheme disguised as a play-to-earn game token inspired by the Netflix series. The project implemented a sell restriction in its smart contract, preventing most investors from selling their tokens. After a massive price surge, the developers executed a hard rug pull, draining the liquidity pool and abandoning the project, causing the token's value to crash to near zero. This case highlighted the dangers of tokens with artificial trading restrictions.

$3.38M
Estimated Rug
02

AnubisDAO

A vampire attack project that raised 8,706 ETH (approx. $60M at the time) in a Liquidity Bootstrapping Pool (LBP) on OlympusDAO's platform. Within 20 hours of the fundraise concluding, the deployer wallet transferred all raised ETH to a new address and vanished. This was a pure exit scam with no product ever developed. The incident exposed risks in the LBP fundraising model and the need for enhanced multisig or timelock controls on treasury funds.

8,706 ETH
Funds Stolen
03

TITAN/IRON Finance

A bank run-induced collapse often categorized as a soft rug pull or economic failure. The IRON stablecoin, partially backed by the TITAN governance token, experienced a death spiral when large holders (whales) massively redeemed IRON for its underlying assets. This crashed TITAN's price, breaking the stablecoin's peg, and caused a panic sell-off that drained liquidity. While not a malicious exit scam, it demonstrated how poorly designed tokenomics can lead to a de facto rug pull.

04

Frosties NFT

One of the first major NFT rug pulls. The developers of the Frosties NFT collection minted out their 8,888 NFTs, promoted the project's roadmap, and then abruptly shut down the website and social channels after the sale, making off with approximately $1.3 million in ETH. The perpetrators were later arrested and charged with wire fraud and money laundering, marking a significant early case of law enforcement action against NFT-based rug pulls.

$1.3M
Funds Stolen
05

Merlin DEX

A DeFi protocol rug pull where the developers behind the Merlin DEX on Polygon and Fantom allegedly exploited their own platform. After attracting liquidity, they used the protocol owner's administrative privileges to mint unlimited MAGE tokens, dumped them on the market, and drained liquidity pools. This case underscored the critical risk of centralized control and unrenounced owner functions in supposedly decentralized applications.

06

Ballot Box Buster (BBB)

A voting manipulation rug pull targeting the BSC Token Hub governance system. The attacker created a malicious token and proposal, then used a flash loan to borrow a massive amount of BNB, temporarily granting them enough voting power to pass their own proposal. The proposal granted them all the tokens from the hub's treasury, which they stole after the vote passed. This exploited a specific vulnerability in on-chain governance mechanics.

COMPARISON MATRIX

Rug Pull vs. Other Scams

A breakdown of key characteristics distinguishing rug pulls from other common cryptocurrency and DeFi scams.

Feature / MechanismRug PullPhishing AttackPonzi SchemeFlash Loan Attack

Primary Target

Project Investors / Liquidity Providers

Individual User Wallets

New Investors

Vulnerable DeFi Protocols

Core Deception

Project Abandonment & Asset Theft

Credential & Key Theft

Unsustainable Yield Promises

Market Manipulation & Arbitrage

Technical Sophistication

Low to Medium (Smart Contract Access)

Low (Social Engineering)

None (Pure Financial Structure)

High (Complex Smart Contract Exploit)

Initial Legitimacy

Often Appears Legitimate

Imitates Legitimate Entity

Appears as Investment Opportunity

N/A (External Attack)

Asset Movement

Liquidity Removal or Minting

Direct Wallet Drain

New Deposits Pay Old Withdrawals

Temporary Loan Exploitation

Time to Execution

Pre-planned, Often Post-Launch

Immediate Upon User Action

Months to Years (Until Collapse)

Within a Single Block (<13 sec)

On-Chain Footprint

Clear (Large Token/ETH Transfers)

Clear (Unauthorized Transactions)

Clear (Circular Payment Patterns)

Clear (Complex TX Bundle)

Prevention Focus

Due Diligence & Contract Audits

Security Hygiene & Verification

Skepticism of Guaranteed Returns

Protocol Security & Audits

RUG PULL

Frequently Asked Questions

A rug pull is a malicious exit scam in the cryptocurrency and decentralized finance (DeFi) space, where developers abandon a project and abscond with investors' funds. This section addresses the most common questions about how these scams work, how to identify them, and the legal and technical mechanisms involved.

A rug pull is a type of exit scam in the cryptocurrency and DeFi space where developers abruptly abandon a project and withdraw all the invested funds, leaving investors with worthless tokens. It is a deliberate act of fraud, distinct from a project's legitimate failure. The term originates from the phrase "pulling the rug out from under" investors.

There are two primary technical methods:

  • Liquidity Rug Pull: Developers remove the liquidity pool tokens, draining the trading pair's reserves on a decentralized exchange (DEX) like Uniswap, which crashes the token's price to zero.
  • Soft Rug Pull / Developer Exit: The team sells off their massive, pre-minted token holdings into the market, causing a price collapse, while the project's smart contracts and liquidity may remain functional.
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Rug Pull: Definition & How It Works in Crypto | ChainScore Glossary