approval-exploit-list icon indicating copy to clipboard operation
approval-exploit-list copied to clipboard

πŸ“ List of known exploits that abuse token approvals

Crypto Token Approval Exploit List

approval-exploit-list contains a list of known crypto exploits that abuse token approvals in order to steal funds from users.

Check if you are affected by these exploits

Revoke.cash offers a tool to check if you are affected by any of these exploits. You can find it here.

Contributing

To submit a new exploit to the database, you can create a new GitHub issue by using the "Report Exploit" template or click on the button below. Please make sure to be as complete as possible when filling out the template. We will then verify the information and add it to the list.


 Report new Exploit
 

Useful Sources

To create the initial list of exploits, we used sources from several companies. The most important ones are listed below: