Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 952

Rug Pull

What is Rug Pull?

Rug PullAn exit scam in which the developers of a crypto token, NFT collection, or DeFi protocol drain liquidity or treasury funds and disappear, leaving holders with worthless assets.


A rug pull typically begins with aggressive marketing for a new token, yield farm, or NFT mint that promises outsized returns. Once enough liquidity is locked or investor capital is committed, malicious operators remove liquidity from the trading pool, sell their pre-mined supply, drain the treasury, or activate a privileged function such as unlimited minting or pausing transfers. Rug pulls range from hard rugs (instant theft via code backdoors or owner keys) to soft rugs (gradual abandonment after dumping). Mitigations include reading audited code, checking timelocked and renounced ownership, verifying locked liquidity, reviewing token distribution, and using on-chain analytics for honeypot patterns.

Examples

  1. 01

    Squid Game Token (November 2021) blocked sells and developers drained roughly 3 million USD of liquidity.

  2. 02

    AnubisDAO (October 2021) lost about 60 million USD when raised ETH was moved to private wallets.

Frequently asked questions

What is Rug Pull?

An exit scam in which the developers of a crypto token, NFT collection, or DeFi protocol drain liquidity or treasury funds and disappear, leaving holders with worthless assets. It belongs to the Web3 & Blockchain category of cybersecurity.

What does Rug Pull mean?

An exit scam in which the developers of a crypto token, NFT collection, or DeFi protocol drain liquidity or treasury funds and disappear, leaving holders with worthless assets.

How does Rug Pull work?

A rug pull typically begins with aggressive marketing for a new token, yield farm, or NFT mint that promises outsized returns. Once enough liquidity is locked or investor capital is committed, malicious operators remove liquidity from the trading pool, sell their pre-mined supply, drain the treasury, or activate a privileged function such as unlimited minting or pausing transfers. Rug pulls range from hard rugs (instant theft via code backdoors or owner keys) to soft rugs (gradual abandonment after dumping). Mitigations include reading audited code, checking timelocked and renounced ownership, verifying locked liquidity, reviewing token distribution, and using on-chain analytics for honeypot patterns.

How do you defend against Rug Pull?

Defences for Rug Pull typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Rug Pull?

Common alternative names include: Crypto exit scam, DeFi exit scam.

Related terms