{"id":485964,"date":"2022-03-15T21:00:52","date_gmt":"2022-03-15T21:00:52","guid":{"rendered":"https:\/\/uniquehot.com\/?p=485964"},"modified":"2022-03-15T08:16:12","modified_gmt":"2022-03-15T08:16:12","slug":"this-rugged-ftm-based-protocol-sends-a-warning-about-defi-projects","status":"publish","type":"post","link":"https:\/\/uniquehot.com\/news\/defi\/this-rugged-ftm-based-protocol-sends-a-warning-about-defi-projects\/","title":{"rendered":"This Rugged FTM-Based Protocol Sends A Warning About DeFi Projects"},"content":{"rendered":"

The safety of the DeFi and especially the FTM ecosystem is shaking as “Tomb Fork” projects seem to be the perfect place for scams to thrive. Even after some investigation, what might look like a safer project can still turn out to be a fraud.<\/p>\n

Recently, PulseDAO got rugged. Allegedly, their own dev turned against the and KYC might not be enough to hold this person accountable.<\/p>\n

Tomb Forks And Rug Pulls<\/h2>\n

As per Chainalysis data<\/a>, in 2021 DeFi rug pulls took over $2.8 billion worth of crypto and accounted for 37% of all cryptocurrency scam revenue in the year, versus just 1% in 2020.<\/p>\n

\"\" A risky model called Tomb Fork, often FTM-based, has become perfect for rug pulls and many investors keep falling in.<\/p>\n

Pulse<\/a> was a project that allowed users to “create their own prediction markets about anything.” They launched a token model with the promise of rewarding “all participants fairly, while also making the network resilient.”<\/span><\/p>\n

PulseDAO was a Tomb Fork. Based on Tomb Finance, Tomb forks are algorithmic stablecoin projects that peg their token to another coin, originally FTM.<\/p>\n

In the case of Tomb Finance, they intend<\/a> to “create a mirrored, liquid asset that can be moved around and traded without restrictions.”\u00a0<\/span><\/p>\n

The PulseDAO Rug<\/h2>\n

The rug was confirmed<\/a> by Rugdoc.io, who had previously warned that the project had a risk of governance mishandling and they needed their contracts to be subjected to a full audit with a reputable auditor. They highlighted the following risk vectors:<\/p>\n