Rug Pull Types

Definition:

A rug pull is a crypto exit scam in which project developers abandon a project and take investor funds — most commonly by draining liquidity, dumping team token allocations, or deploying contracts designed to prevent investors from selling. The term derives from the phrase “pulling the rug out from under” investors. Rug pulls are the most common form of crypto fraud and account for the majority of scam losses in DeFi annually. They exist on a spectrum from sophisticated hidden-contract fraud to simple liquidity removal and developer token dumps.


The Three Primary Rug Pull Types

Type 1: Hard Rug (Liquidity Removal)

The developer removes liquidity from a trading pool, making the token effectively unsellable and worthless.

How it works: A project launches a token and adds ETH/USDC/BNB liquidity to a DEX (Uniswap, Pancakeswap). Retail buyers purchase the token, increasing the liquidity pool. When the developer decides to exit, they call removeLiquidity() on the LP position they control, draining the ETH/USDC and leaving holders with worthless tokens they can no longer sell.

Prevention: Liquidity lock — LP tokens locked via a third-party locker (Team Finance, Unicrypt, DxLock) cannot be withdrawn. Projects with locked liquidity for 6-12+ months are significantly more trustworthy. Always verify the lock on-chain.

Detection: Check if LP tokens are held by the deployer wallet (bad) or a liquidity locker contract (good). Use tools like Tokensniffer or DEXtools to verify.

Type 2: Soft Rug (Developer Token Dump)

Developers hold large team allocations and dump them on retail buyers gradually or all at once.

How it works: The development team allocates themselves a large percentage of token supply (often 10-50%) at launch, with little or no vesting. As token price rises (driven by marketing hype), the team sells their tokens into retail buying pressure, depressing the price. Unlike a hard rug, slower soft rugs look like “organic selling” and can be difficult to distinguish from a project failure until most of the supply has been dumped. Liquidity may remain in the pool, but the token price crashes to near zero.

Prevention: Transparent tokenomics with long vesting schedules, token unlocks tracked by on-chain tools (Token.Unlocks, Vesting.Team). Avoid tokens where the team holds >10% with short or no vest.

Detection: Trace deployer wallet and known team wallets for selling activity. Tools: Arkham Intelligence, Nansen, Debank.

Type 3: Honeypot

The token contract itself is programmed to allow buying but prevent (or tax heavily) selling, trapping buyer funds.

How it works: A developer deploys a custom ERC-20 contract with hidden or obfuscated code that includes one of:

  • A “blacklist” function that permanently blocks specific addresses from selling (the deployer can silently add any buyer)
  • A transfer restriction that only allows the deployer-approved address to sell
  • A sell fee set at 100% (or near 100%), effectively confiscating all proceeds on sale
  • A pausing mechanism that can freeze all transfers

Buyers purchase the token, believing it to be a normal token. When they try to sell, the transaction either reverts or they receive almost nothing.

Prevention: Always run contract analysis before buying a new token. Never buy tokens with unverified contracts. Use automated scanners.

Detection: Tokensniffer.com, GoPlus Security API, and Honeypot.is all simulate buy-and-sell transactions against the contract and flag restrictions before you transact. DEXtools Pro also shows “buy/sell” tax rates.


Secondary Rug Pull Variants

Slow Rug (Developer Abandonment)

Not technically fraudulent at inception, but the development team gradually stops delivering on roadmap commitments, stops communicating, and eventually abandons the project entirely. Community funds (treasury) are slowly spent or withdrawn. This is legally distinct from a hard rug (no theft occurred — just deception and incompetence), but the financial outcome for holders is similar.

Presale Rug

Developers raise funds in a presale or IDO, then never deploy the token or product. Less common in 2024+ since presale platforms have improved vetting, but still occurs in unvetted Telegram/Discordgroups.

Stealthy Admin Key Rug

More sophisticated rug: the contract appears legitimate, passes automated scanning, but contains an admin function (often disguised with obfuscated naming) that allows the owner to mint unlimited tokens, change fees, or drain the contract later. Requires manual code review to detect.


History

  • 2020 — DeFi Summer produces dozens of yield farming projects that rug. Notable: Yam Finance (soft rug via governance failure), Hotdog (liquidity rug), SushiSwap (near-rug when Chef Nomi dumped $14M dev fund, later returned).
  • 2021 — NFT and memecoin rug season. The Squid Game token ($SQUID) becomes the most famous rug of the year: token could be bought but not sold (honeypot variant). Price went to thousands of dollars before the developers drained $3.4M and disappeared.
  • 2022 — Luna implodes; many Luna ecosystem tokens rug simultaneously. Countless rug pulls in the bear market amid desperate project teams.
  • 2023-2024 — Meme coin season on Solana (Pump.fun) generates hundreds of rug pull tokens daily. Tools like Rugcheck.xyz, Dexscreener’s safety indicators, and Tokensniffer updated to classify them in real time.
  • Ongoing — Immunefi estimates rug pulls cause hundreds of millions in annual losses; they are the single most common scam type in crypto.

Common Misconceptions

“If a token’s contract is verified on Etherscan, it can’t be a honeypot.”

Contract verification simply means the published source code matches the compiled bytecode. A verified contract can still contain malicious functions. Verification makes it easier to detect issues (you can read the code), but does not guarantee safety.

“Rug pulls only happen on small, unknown chains.”

Rug pulls occur on Ethereum, BNB Chain, Solana, and every other chain. High-profile examples exist on every major network. Chain security does not protect against fraudulent token contracts.

“The team doxxed themselves so it can’t be a rug.”

Real identity disclosure reduces rug pull risk modestly, but does not eliminate it. Many doxxed teams have still executed soft rugs by selling token allocations. KYC on launch platforms is stronger but not foolproof.


Defenses

  1. Check LP lock: Verify LP tokens are locked via a reputable locker for 6+ months
  2. Run honeypot scan: Honeypot.is, Tokensniffer, DEXtools safety score before buying
  3. Check contract ownership: If ownership is renounced, admin functions are disabled
  4. Trace team wallets: Are team wallets selling? Use Arkham or Nansen
  5. Read tokenomics: Team allocations >10% with short or no vesting are red flags
  6. Check audit status: Audits from reputable firms (Trail of Bits, Spearbit, Zellic) reduce risk but don’t eliminate it
  7. Limit position size: Never put more than you can afford to lose in unaudited or new projects

Social Media Sentiment

Rug pull detection and avoidance is a major topic on Crypto Twitter/X (+r/cryptomarkets and chain-specific subs). The Squid Game token rug became broadly reported outside crypto, increasing mainstream awareness. Tools like Rugcheck.xyz and Honeypot.is have large user bases among retail traders on Solana and BNB Chain. The phrase “don’t get rugged” is ubiquitous in DeFi communities. During bull markets with high memecoin activity, rug pull warnings and post-mortems generate enormous engagement. Token security has become a competitive category with multiple analytics companies.

Last updated: 2026-04


Related Terms


See Also


Sources