The Book of Rugs

Part III: The Strategist's Guide to Due Diligence

Part III: The Strategist's Guide to Due Diligence

Knowledge of scams and analysis tools is only valuable when applied through a systematic and disciplined process. This section provides an actionable framework for conducting thorough due diligence on any new cryptocurrency token, transforming information into a strategic defense.

3.1 A Multi-Layered Defense Framework: The "Trust, but Verify" Funnel

No single tool can provide a complete picture of a token's risk profile. An effective due diligence process resembles a funnel, starting with broad, automated checks and progressively moving toward more detailed, manual investigation. Each layer serves to filter out potential threats, saving the most time-consuming analysis for projects that pass the initial screenings.

  • Layer 1: The Quick Scan (The Triage): The process begins with a high-level automated scan. Use a comprehensive, all-in-one scanner like TokenSniffer.com or the scanner from GoPlus Security. Input the token's contract address. If the platform returns a score of zero, explicitly flags the token as a known scam (e.g., "Serial rug pull"), or identifies critical vulnerabilities, the investigation should stop immediately. This initial step is designed to eliminate the most obvious and low-effort scams without wasting further time.23
  • Layer 2: The Specialized Check (The Honeypot Test): If the token passes the initial triage, the next step is to use a specialized tool to confirm it is sellable. Use Honeypot.is to perform its simulated buy-and-sell transaction test.34 A "pass" from this tool provides strong, focused evidence that the contract does not contain a basic honeypot mechanism. This check is crucial because some general scanners might miss novel honeypot techniques that a dedicated simulation can catch.80
  • Layer 3: The Visual Investigation (The Cluster Hunt): With basic code safety preliminarily established, the investigation shifts to holder distribution and potential manipulation. Use Bubblemaps.io to visualize the token's top holders and their connections.68 Look for large, interconnected clusters of wallets that control a significant percentage of the supply. Such clusters can indicate a single entity controlling many wallets to hide their stake, or a group of insiders preparing to dump their tokens on the market. This visual analysis can uncover risks that automated code scanners are not designed to detect.69
  • Layer 4: The Ground Truth (The Manual On-Chain Dive): All automated tools are ultimately interpreting data from the blockchain's primary record. The next layer involves going directly to the source: the relevant Block Explorer (e.g., Etherscan, BscScan, Solscan). Here, manually verify the key data points. Check the "Contract" tab to see if the source code has been verified and is publicly readable. Review the "Holders" tab to confirm the findings from Bubblemaps regarding ownership concentration. Scrutinize the transaction log for suspicious activity, such as airdrops to thousands of wallets from a contract with very low liquidity, which is a common red flag.1
  • Layer 5: The Human Element (The Off-Chain Investigation): The final and arguably most important layer involves assessing the human factors behind the project. Investigate the project's website, whitepaper, and official community channels (Discord, Telegram, X). Are the developers public and do they have a verifiable track record? Or are they anonymous? Is the community engagement genuine, with thoughtful questions and developer responses, or does it consist of bot-like hype and censorship of critical inquiries? A project with strong on-chain metrics but a complete lack of transparency from its team is still a high-risk investment.1

3.2 Table 2: Smart Contract Red Flag Glossary

To effectively use token scanners and block explorers, an investor must understand the meaning behind the technical warnings they provide. This glossary demystifies common red flags.

Red FlagWhat It Means (in Plain English)Associated RiskLevel of ConcernWhere to Verify
Ownership Not RenouncedThe original creator of the contract still has administrative control and can potentially change the contract's rules.Rug Pull, HoneypotHighTokenSniffer, De.Fi Scanner, Block Explorer (Read Contract)
Mint Function EnabledThe contract owner can create an unlimited number of new tokens at any time.Price Inflation, Rug PullHighGoPlus, De.Fi Scanner, Block Explorer (Read Contract)
Proxy ContractThe contract's logic can be upgraded or changed entirely by the owner to a new implementation address.Total Scam, HoneypotHighTokenSniffer, GoPlus, Block Explorer (Read Contract)
Hidden OwnerA mechanism exists that allows an "owner" to control the contract even after ownership appears to be renounced.Rug Pull, HoneypotHighGoPlus Security, Advanced Manual Audit
Mutable MetadataThe token's fundamental properties (like its name, symbol, or associated data) can be changed after launch.Deception, ScamMedium to HighTokenSniffer, Sol Sniffer, RugCheck.xyz
High Sell/Buy Tax (>10%)A large percentage of every transaction is taken as a fee by the contract owner.Honeypot, Fund DrainHighTokenSniffer, De.Fi Scanner, Honeypot.is
Unlocked LiquidityThe funds providing the token's trading liquidity are not secured in a time-locked contract.Rug PullCriticalTokenSniffer, GoPlus, De.Fi, RugCheck.xyz
High Holder ConcentrationA small number of wallets hold a very large percentage of the total token supply.Price Manipulation, Dump RiskHighTokenSniffer, Bubblemaps, Block Explorer (Holders Tab)
Blacklist/Whitelist FunctionThe contract contains code that can specifically block certain wallets from transacting.HoneypotHighGoPlus, De.Fi Scanner, Manual Audit

3.3 Actionable Checklist for Token Evaluation

This checklist condenses the multi-layered framework into a practical, step-by-step guide for pre-investment analysis.

Phase 1: Automated Triage

  • [ ] TokenSniffer/GoPlus Scan: Does the token have a score above 50/100?
  • [ ] TokenSniffer/GoPlus Scan: Are there any critical warnings like "known scam" or "exploit"? (If yes, STOP)
  • [ ] Honeypot.is Check: Is the token confirmed to be sellable? (If no, STOP)

Phase 2: On-Chain Investigation

  • [ ] Block Explorer - Contract: Is the smart contract source code verified?
  • [ ] Block Explorer - Read Contract: Has ownership been renounced? (If no, HIGH RISK)
  • [ ] Block Explorer - Read Contract: Is there a mint function? (If yes, HIGH RISK)
  • [ ] Block Explorer - Liquidity: Are at least 95% of the LP tokens locked for a minimum of 3-6 months or burned? (If no, CRITICAL RISK)
  • [ ] Bubblemaps/Holders Tab: Do the top 10 wallets (excluding exchange and burn addresses) hold less than 20-30% of the supply?
  • [ ] Bubblemaps: Are there large, suspicious clusters of interconnected wallets?

Phase 3: Off-Chain & Human Factor Analysis

  • [ ] Team: Is the development team public with a verifiable track record (e.g., LinkedIn, GitHub)? (If anonymous, HIGH RISK)
  • [ ] Website & Whitepaper: Are the project's website and whitepaper professional, original, and free of plagiarism and grammatical errors?
  • [ ] Community: Is the community (Telegram/Discord) active with genuine discussion, or is it filled with hype and censorship of critical questions?
  • [ ] Audit: Has the project been audited by a reputable firm (e.g., CertiK, Consensys)? Have you located and read the audit report on the auditor's website? Only after a token has passed all relevant checks in this comprehensive process should an investment be considered.