Skip to content

๐Ÿ“ List of known exploits that abuse token approvals

License

Notifications You must be signed in to change notification settings

RevokeCash/approval-exploit-list

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

84 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Crypto Token Approval Exploit List

approval-exploit-list contains a list of known crypto exploits that abuse token approvals in order to steal funds from users.

Check if you are affected by these exploits

Revoke.cash offers a tool to check if you are affected by any of these exploits. You can find it here.

Contributing

To submit a new exploit to the database, you can create a new GitHub issue by using the "Report Exploit" template or click on the button below. Please make sure to be as complete as possible when filling out the template. We will then verify the information and add it to the list.


โ€ƒReport new Exploit
โ€ƒ

Useful Sources

To create the initial list of exploits, we used sources from several companies. The most important ones are listed below:

About

๐Ÿ“ List of known exploits that abuse token approvals

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published