Blog
Security research, technical deep dives, and ecosystem insights from the RugSol team.
Anatomy of a Solana Rug Pull: What Happens On-Chain
A deep dive into the most common rug pull patterns on Solana — from mint authority abuse to coordinated LP removal. We analyze real cases and show what the blockchain reveals.
Read articleHow RugSol Detects Honeypot Tokens
Our honeypot detection works by simulating a sell transaction through Jupiter aggregator. Here's how the technical process works and why some edge cases are harder to catch.
Pump.fun Security: What to Watch For
Pump.fun tokens have a unique lifecycle with bonding curves. We break down the specific risks at each stage — from launch through DEX migration — and how our scanner handles them.
Sniper Bots and Jito Bundles: The Insider Trading Problem
When wallets buy tokens in the same block as deployment, it signals insider activity. We explain how sniper detection works and what Jito bundle analysis reveals about coordinated buys.
Understanding Token Holder Concentration Risk
A single wallet holding 40% of supply is a red flag — but context matters. We explore how RugSol distinguishes between legitimate accumulation and potential dump risks.
RugSol v2.4: Advanced Wallet Clustering
Our latest update introduces linked wallet detection — identifying wallets funded from the same source that appear to be independent holders. Here's how the algorithm works.