Apr 8, 2026
Apr 8, 2026
Apr 8, 2026
Apr 8, 2026
Apr 8, 2026
Apr 8, 2026
Apr 8, 2026
Apr 8, 2026
Definition
An attack that abuses the token approval mechanism. When you approve a DeFi contract to spend your tokens, a malicious or compromised contract can drain your entire approved balance. This is why infinite approvals are dangerous and why you should regularly revoke unused token approvals.
Related Terms
When you approve a smart contract to spend unlimited amounts of a token from your wallet.
Self-executing code stored on a blockchain that runs when conditions are met.
A social engineering attack where scammers create fake websites, emails, or messages that look legitimate to steal your credentials or trick you into signing malicious transactions.
A DEX aggregator that splits trades across multiple decentralized exchanges to find the best overall price.
One of the biggest lending and borrowing protocols in DeFi.
A cross-chain bridge that uses an optimistic verification system and a network of relayers to move tokens between chains quickly.
Get daily crypto analysis delivered to your inbox. No spam, unsubscribe anytime.