-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathAGD.json
60 lines (60 loc) · 3.31 KB
/
AGD.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
{
"id": 3443,
"project_name": "AGD",
"title": "AGD",
"description": "<p><strong>Quick Summary</strong></p><p>On March 27, 2023, the team behind the AGD Token token executed a rug pull, resulting in a loss of funds worth $50K USD.</p><p><br></p><p><strong>Details of the Exploit</strong></p><p>The attack on the AGD <span style='color: rgb(65, 65, 65); font-family: \"Open Sans\", sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;'>Token</span> token involved the token contract deployer manipulating the liquidity pool by removing liquidity from the pair contract and selling a large quantity of tokens on the market. This resulted in a rapid drop in the token's price by approximately 90%. The deployer took advantage of their ability to manipulate the liquidity pool and market to execute a rug pull, effectively stealing funds from investors. The exploit highlights the importance of careful token contract design and the need for investors to perform due diligence before investing in new projects.</p><p><br></p><p><strong>Block Data Reference</strong></p><p>Deployer:</p><p>https://bscscan.com/address/0xaab38a9f6a1d9042673b78c27520b720ad960e96</p><p>Example TX of removing liquidity:</p><p>https://bscscan.com/tx/0xb6c2f0eb40fc3de8c0eb854f8670030ac5c2db4d87d96d2f696f7ecaf630153f</p><p><br></p>",
"name_categories": "Token",
"token_name": "AGD",
"proof_archive_link": null,
"technical_issue": null,
"token_address": "0x6d04B585eC4b3fE27d5356ca270fD6bd43d0Af47",
"token_addresses": [
{
"address": "0x6d04B585eC4b3fE27d5356ca270fD6bd43d0Af47",
"url": "https://bscscan.com/address/0x6d04B585eC4b3fE27d5356ca270fD6bd43d0Af47",
"network": {
"id": 56,
"icon_link": "safe/files/network/involved/bsc.svg"
}
}
],
"logo_link": "safe/files/scamDatabase/logo/642d74e84eb20.png",
"date": "2023-3-27",
"scam_updates": [],
"proof_link": "https://twitter.com/certikalert/status/1640401118072037376?s=46&t=DefKAWsE5N91p9nzDiwo6A",
"website_link": null,
"webarchive_link": null,
"twitter_link": null,
"telegram_link": null,
"our_post_link": null,
"funds_lost": 50000,
"funds_returned": 0,
"funds_by_chains": [],
"funds_recovered": null,
"active": 1,
"git_hub": null,
"git_hub_contract_link": null,
"discord": null,
"bug_bounty_program_link": null,
"bug_bounty_program_company": null,
"audit_code_conf": 0,
"is_verified_source_code": 0,
"is_public_team": 0,
"scam_type": {
"id": 10,
"type": "Rugpull"
},
"network": {},
"scamNetworks": [
{
"networks_id": 56,
"scam_database_id": 3443,
"networks": {
"id": 56,
"name": "Binance",
"icon_link": "safe/files/network/bsc.png"
}
}
],
"auditedBy": []
}