Spotting Potential Exit Scams and Rug Pulls in Crypto
A forensic approach to crypto risk: compare what project teams promise with what the on-chain data shows. This article uses a Declared vs Actual lens to reveal warning signs early so you can protect capital and stay data-driven.
- What is a rug pull and an exit scam?
- Red flags before you invest
- On-chain checks you can perform
- What to do if you suspect a scam
What is a rug pull and an exit scam?
A rug pull happens when a project raises funds and then suddenly withdraws liquidity or vanishes. An exit scam covers similar deception, often with staged promises and a post-funding exit. The key metric is the Declared vs Actual execution: what was promised publicly versus what the on-chain data shows. This disciplined verification helps distinguish legitimate pivots from deliberate fraud. For additional context on audits and risk signals, see analyzing Cyberscope audits.
Red flags before you invest
Pay attention to verifiability, transparency, and timing. Common indicators include:
- Anonymous or unverifiable teams.
- No published or inconsistent audits.
- Unrealistic returns or sudden liquidity changes.
- Backdated roadmaps or delayed updates.
External definitions help calibrate risk. See rug pull definitions for a concise baseline.
On-chain checks you can perform
On-chain signals reveal what the project actually does. Check token distribution, vesting schedules, and liquidity lock times. Look for abnormal transfers and coordinated actions by large holders. For governance context, see governance token signals and anonymous teams due diligence, which highlight how transparency aligns with on-chain behavior. community signals can also corroborate findings.
What to do if you suspect a scam
If suspicious activity is detected, pause new investments, alert the community, and request verifiable documents. If a project refuses to publish audits or refuses to disclose key token metrics, consider exiting and reporting to platform safety teams. Strengthen your defenses with external guidance from rug pull definitions and general security best practices.