-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathAPPLE.json
60 lines (60 loc) · 3.31 KB
/
APPLE.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
{
"id": 3447,
"project_name": "APPLE",
"title": "APPLE",
"description": "<p><strong>Quick Summary</strong></p><p>On March 19, 2023, the team behind the APPLE Token token executed a rug pull, resulting in a loss of funds worth $30k USD.</p><p><br></p><p><strong>Details of the Exploit</strong></p><p>The attack on the APPLE <span style='color: rgb(65, 65, 65); font-family: \"Open Sans\", sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;'>Token</span> token involved the token contract deployer manipulating the liquidity pool by removing liquidity from the pair contract and selling a large quantity of tokens on the market. This resulted in a rapid drop in the token's price by approximately 90%. The deployer took advantage of their ability to manipulate the liquidity pool and market to execute a rug pull, effectively stealing funds from investors. The exploit highlights the importance of careful token contract design and the need for investors to perform due diligence before investing in new projects.</p><p><br></p><p><strong>Block Data Reference</strong></p><p>Deployer:</p><p>https://bscscan.com/address/0xe4c1eebbed9174c8bbabda030bc94b2c44cd0639</p><p>Example TX of removing liquidity:</p><p>https://bscscan.com/tx/0x54650d533f003aa1eb59a3171fdeda6277c7e23640d9b54e452459052f9b79a8</p>",
"name_categories": "Token",
"token_name": "APPLE",
"proof_archive_link": null,
"technical_issue": null,
"token_address": "0x8F81bbC8Cd2484b252e8288528cf2ec903619369",
"token_addresses": [
{
"address": "0x8F81bbC8Cd2484b252e8288528cf2ec903619369",
"url": "https://bscscan.com/address/0x8F81bbC8Cd2484b252e8288528cf2ec903619369",
"network": {
"id": 56,
"icon_link": "safe/files/network/involved/bsc.svg"
}
}
],
"logo_link": "safe/files/scamDatabase/logo/642d7759bb93b.png",
"date": "2023-3-19",
"scam_updates": [],
"proof_link": "https://twitter.com/certikalert/status/1637436236003438593?s=46&t=DefKAWsE5N91p9nzDiwo6A",
"website_link": null,
"webarchive_link": null,
"twitter_link": null,
"telegram_link": null,
"our_post_link": null,
"funds_lost": 30000,
"funds_returned": 0,
"funds_by_chains": [],
"funds_recovered": null,
"active": 1,
"git_hub": null,
"git_hub_contract_link": null,
"discord": null,
"bug_bounty_program_link": null,
"bug_bounty_program_company": null,
"audit_code_conf": 0,
"is_verified_source_code": 0,
"is_public_team": 0,
"scam_type": {
"id": 10,
"type": "Rugpull"
},
"network": {},
"scamNetworks": [
{
"networks_id": 56,
"scam_database_id": 3447,
"networks": {
"id": 56,
"name": "Binance",
"icon_link": "safe/files/network/bsc.png"
}
}
],
"auditedBy": []
}