A rug pull happens when developers of a cryptocurrency project, often memecoins, intentionally remove liquidity or abandon the project after attracting investor funds. This tactic leaves buyers with tokens that can no longer be traded or sold, resulting in total losses. In most cases, the developers create hype around the token using social media, memes, or celebrity associations, rapidly increase liquidity and price through early investments, and then exit by draining the pool or dumping their holdings.
These incidents are more common in decentralized platforms where token creation is fast and requires minimal oversight. Pump.fun, for example, has been widely used for launching memecoins in large volumes. While the platform is legitimate, bad actors take advantage of its simplicity to run fast-exit scams. A notable example was reported by Wired, where a teenager launched a token, made over $50,000 in profit, and then sold everything shortly after, leading to backlash from buyers who were left with worthless tokens.
In some cases, the manipulation is more calculated. Developers may lock the liquidity for a short period, allow volume and community hype to build, and then rug as soon as the lock expires. Other times, they retain minting or trading control via smart contract functions, which allows them to alter the token’s rules at any moment without warning. These tactics take advantage of less experienced traders who don’t know how to check contract permissions or track token activity on-chain.
Memecoin rug pulls have also included attention-seeking stunts and misleading launches. Tokens that quickly go viral because of media stories or online events may be created and rugged within hours. The memecoin trading community has documented several incidents where tokens based on trending content—such as livestreamed moments or public figures—were created and then quickly abandoned after attracting large sums.
The risk is worsened by the fact that many of these tokens are not traded on centralized exchanges with compliance controls. Instead, they rely on decentralized liquidity pools with no audits or accountability. Anyone with a basic understanding of token contracts can create and promote a memecoin, and many do so without any intention to develop or maintain the project after the launch.
Low liquidity or sudden changes in liquidity pools are some of the first signs of potential fraud. A token that has only a few hundred or thousand dollars locked can be drained quickly, making it impossible for new buyers to exit. In some cases, even tokens with larger pools are vulnerable if the developer retains control over the funds or if the liquidity was never locked in the first place. Smart contract platforms like Unicrypt or PinkSale allow users to verify whether liquidity is locked and for how long. If no lock exists, or if the lock is set for a very short time, the project is highly suspect.
Another major indicator is the structure of the token holders. If the top wallets control more than 25% of the supply, the price can be easily manipulated. Some developers disguise this concentration by splitting their holdings across multiple wallets. Patterns such as 10–15 wallets each holding between 1% and 2.5% of supply, with similar funding times or behaviors, often indicate a single owner. This setup enables coordinated dumping across many addresses at once, bypassing simple holder scans on platforms like DEXTools.
Anonymous teams also increase the risk. While anonymity is common in crypto, there is a difference between pseudonymous developers with a public track record and new wallets with no prior activity. If a project has no whitepaper, team history, or public communication, there is little accountability if something goes wrong. Traders should always look for verifiable activity such as GitHub commits, public wallet histories, or regular updates from the developers.
Projects that promise guaranteed high returns or use aggressive language to push FOMO (fear of missing out) are often trying to rush users into investing without time to investigate. This is a psychological tactic used in many scams, especially in memecoin groups. Phrases like “next 100x,” “only a few hours left,” or “devs burned all tokens” are common even in tokens that rug within a few hours.
Finally, token contracts that still allow minting or control by the deployer are dangerous. A function like mint()
or setFees()
being active means the developer can change the supply or fee structure at any moment. Tools like TokenSniffer or Etherscan can be used to check these permissions quickly. If the contract is not renounced and these functions are active, the token should be avoided.
The most reliable way to avoid rug pulls is to conduct research before investing. This means checking the token’s smart contract for security risks, confirming that liquidity is locked, and evaluating whether the token’s distribution is fair. Traders should verify contract source code if available and compare it to verified templates used in safe projects. Unusual functions or obfuscated code are red flags.
Whitepapers, developer communications, and a history of engagement with the community also provide useful signals. Even in memecoin projects, which often don’t have long-term roadmaps, a basic explanation of the token’s intent and team transparency is a baseline requirement. Projects without even a minimal explanation should be treated as highly suspicious.
Security tools are available to assist with due diligence. TokenSniffer rates new tokens based on contract analysis, holder concentration, and recent scams. Etherscan allows users to review transfer histories and see which wallets funded the deployer. BullX can track wallet movements from influencers and suspected bad actors. Using these tools together offers a clearer picture than relying on price action alone.
Many experienced memecoin traders also follow a practice of never buying into a token until it has passed basic checks: liquidity lock, renounced contract, active trading volume, and community transparency. If any of these are missing, they skip the token—even if it’s trending—because history has shown that shortcuts usually lead to losses.
Another important practice is to regularly use Revoke.cash to revoke smart contract approvals for meme tokens that you no longer interact with. When you approve a token to access your wallet, it can potentially move funds without your permission. Over time, these approvals accumulate and expose users to unnecessary risks, especially if a project later turns malicious. By revoking unused token approvals, you reduce the attack surface of your wallet and maintain tighter control over asset permissions.
Separate your funds across multiple wallets and use disposable wallets when interacting with new or experimental meme tokens. This limits potential losses in case of a contract exploit or malicious token behavior. For example, keeping the majority of your assets in a cold wallet and only transferring a small amount to a hot or temporary wallet for trading reduces the risk of losing your entire portfolio.
Finally, traders should set a fixed amount for high-risk investments and accept the possibility of loss. Most memecoins will not sustain value, and the goal should be to minimize exposure to scams while identifying rare opportunities with potential.
Highlights
A rug pull happens when developers of a cryptocurrency project, often memecoins, intentionally remove liquidity or abandon the project after attracting investor funds. This tactic leaves buyers with tokens that can no longer be traded or sold, resulting in total losses. In most cases, the developers create hype around the token using social media, memes, or celebrity associations, rapidly increase liquidity and price through early investments, and then exit by draining the pool or dumping their holdings.
These incidents are more common in decentralized platforms where token creation is fast and requires minimal oversight. Pump.fun, for example, has been widely used for launching memecoins in large volumes. While the platform is legitimate, bad actors take advantage of its simplicity to run fast-exit scams. A notable example was reported by Wired, where a teenager launched a token, made over $50,000 in profit, and then sold everything shortly after, leading to backlash from buyers who were left with worthless tokens.
In some cases, the manipulation is more calculated. Developers may lock the liquidity for a short period, allow volume and community hype to build, and then rug as soon as the lock expires. Other times, they retain minting or trading control via smart contract functions, which allows them to alter the token’s rules at any moment without warning. These tactics take advantage of less experienced traders who don’t know how to check contract permissions or track token activity on-chain.
Memecoin rug pulls have also included attention-seeking stunts and misleading launches. Tokens that quickly go viral because of media stories or online events may be created and rugged within hours. The memecoin trading community has documented several incidents where tokens based on trending content—such as livestreamed moments or public figures—were created and then quickly abandoned after attracting large sums.
The risk is worsened by the fact that many of these tokens are not traded on centralized exchanges with compliance controls. Instead, they rely on decentralized liquidity pools with no audits or accountability. Anyone with a basic understanding of token contracts can create and promote a memecoin, and many do so without any intention to develop or maintain the project after the launch.
Low liquidity or sudden changes in liquidity pools are some of the first signs of potential fraud. A token that has only a few hundred or thousand dollars locked can be drained quickly, making it impossible for new buyers to exit. In some cases, even tokens with larger pools are vulnerable if the developer retains control over the funds or if the liquidity was never locked in the first place. Smart contract platforms like Unicrypt or PinkSale allow users to verify whether liquidity is locked and for how long. If no lock exists, or if the lock is set for a very short time, the project is highly suspect.
Another major indicator is the structure of the token holders. If the top wallets control more than 25% of the supply, the price can be easily manipulated. Some developers disguise this concentration by splitting their holdings across multiple wallets. Patterns such as 10–15 wallets each holding between 1% and 2.5% of supply, with similar funding times or behaviors, often indicate a single owner. This setup enables coordinated dumping across many addresses at once, bypassing simple holder scans on platforms like DEXTools.
Anonymous teams also increase the risk. While anonymity is common in crypto, there is a difference between pseudonymous developers with a public track record and new wallets with no prior activity. If a project has no whitepaper, team history, or public communication, there is little accountability if something goes wrong. Traders should always look for verifiable activity such as GitHub commits, public wallet histories, or regular updates from the developers.
Projects that promise guaranteed high returns or use aggressive language to push FOMO (fear of missing out) are often trying to rush users into investing without time to investigate. This is a psychological tactic used in many scams, especially in memecoin groups. Phrases like “next 100x,” “only a few hours left,” or “devs burned all tokens” are common even in tokens that rug within a few hours.
Finally, token contracts that still allow minting or control by the deployer are dangerous. A function like mint()
or setFees()
being active means the developer can change the supply or fee structure at any moment. Tools like TokenSniffer or Etherscan can be used to check these permissions quickly. If the contract is not renounced and these functions are active, the token should be avoided.
The most reliable way to avoid rug pulls is to conduct research before investing. This means checking the token’s smart contract for security risks, confirming that liquidity is locked, and evaluating whether the token’s distribution is fair. Traders should verify contract source code if available and compare it to verified templates used in safe projects. Unusual functions or obfuscated code are red flags.
Whitepapers, developer communications, and a history of engagement with the community also provide useful signals. Even in memecoin projects, which often don’t have long-term roadmaps, a basic explanation of the token’s intent and team transparency is a baseline requirement. Projects without even a minimal explanation should be treated as highly suspicious.
Security tools are available to assist with due diligence. TokenSniffer rates new tokens based on contract analysis, holder concentration, and recent scams. Etherscan allows users to review transfer histories and see which wallets funded the deployer. BullX can track wallet movements from influencers and suspected bad actors. Using these tools together offers a clearer picture than relying on price action alone.
Many experienced memecoin traders also follow a practice of never buying into a token until it has passed basic checks: liquidity lock, renounced contract, active trading volume, and community transparency. If any of these are missing, they skip the token—even if it’s trending—because history has shown that shortcuts usually lead to losses.
Another important practice is to regularly use Revoke.cash to revoke smart contract approvals for meme tokens that you no longer interact with. When you approve a token to access your wallet, it can potentially move funds without your permission. Over time, these approvals accumulate and expose users to unnecessary risks, especially if a project later turns malicious. By revoking unused token approvals, you reduce the attack surface of your wallet and maintain tighter control over asset permissions.
Separate your funds across multiple wallets and use disposable wallets when interacting with new or experimental meme tokens. This limits potential losses in case of a contract exploit or malicious token behavior. For example, keeping the majority of your assets in a cold wallet and only transferring a small amount to a hot or temporary wallet for trading reduces the risk of losing your entire portfolio.
Finally, traders should set a fixed amount for high-risk investments and accept the possibility of loss. Most memecoins will not sustain value, and the goal should be to minimize exposure to scams while identifying rare opportunities with potential.
Highlights