Documentation Index
Fetch the complete documentation index at: https://docs.webacy.com/llms.txt
Use this file to discover all available pages before exploring further.
Overview
A honeypot is a malicious token designed to allow purchases but prevent or severely restrict sales. Once investors buy in, they find themselves unable to sell, leaving their funds trapped.How Honeypots Work
- Token Launch: Scammer deploys a token with hidden restrictions
- Marketing: Token is promoted on social media and trading channels
- Buy Phase: Victims purchase the token without issues
- Trap Activated: When victims try to sell, transactions fail or incur extreme fees
- Exit: Scammer drains liquidity, leaving holders with worthless tokens
Types of Honeypots
Blacklist Honeypots
- Specific addresses are blocked from selling
- Often whitelist only the deployer or insiders
Fee-Based Honeypots
- Normal buy fees but extreme sell fees (90-100%)
- May start with low fees that increase over time
Balance Manipulation
- Contract manipulates displayed balance
- Actual transferable balance is zero or minimal
Cooldown Honeypots
- Extreme cooldown periods between transactions
- Users can buy but must wait impossibly long to sell
Detection Indicators
| Tag | Severity | Description |
|---|---|---|
honeypot | Critical | Token identified as a honeypot |
cant_sell_all | High | Unable to sell full token balance |
high_sell_tax | High | Excessive sell tax detected |
modifiable_tax | Medium | Tax can be changed by owner |
blacklist | Medium | Contract includes blacklist functionality |
API Example
Red Flags
- No sells in transaction history - Only buy transactions visible
- Failed sell transactions - Multiple reverted sell attempts on-chain
- Unusual contract code - Hidden functions or obfuscated logic
- Locked liquidity claims - But liquidity can still be removed
- Anonymous team - No verifiable team information
Protection Strategies
- Test with small amounts - Try selling a tiny amount before investing more
- Check transaction history - Look for successful sells by other wallets
- Use token scanners - Run the contract through security analyzers
- Verify contract code - Check if contract is verified and readable
- Research the project - Look for red flags in community and marketing
Related Concepts
- Tax Tokens - Tokens with excessive transaction fees
- Rug Pulls - Liquidity removal scams
- Fake Tokens - Impersonator tokens
