DeFi lets you lend, borrow, swap, and earn yield without a bank or exchange in the middle. That's the upside. The downside: there's also no customer support to call when something goes wrong.
Most DeFi losses aren't from sophisticated hacks. They come from mundane mistakes — signing a bad transaction, leaving unlimited approvals on a forgotten protocol, or connecting to a phishing site that looked like the real thing.
This guide covers the seven most common ways people lose money in DeFi and what to do about each one.
1. Unlimited token approvals
When you use a DEX or lending protocol for the first time, it asks you to "approve" token spending. Most protocols request unlimited approval by default, meaning the contract can move as many tokens as it wants from your wallet, forever.
That's fine while you trust the protocol. It's a problem if the protocol gets exploited, or if you accidentally approved a malicious contract.
What to do:
- Set custom approval amounts instead of unlimited when your wallet offers the option
- Periodically revoke old approvals using Revoke.cash or your wallet's built-in approval manager
- Use our Security Checklist to audit your current approvals
2. Phishing dApps and fake frontends
Attackers clone real protocol websites and buy Google or X ads to push them to the top of search results. The fake site looks identical to the real one, but the smart contract it connects to is designed to drain your wallet the moment you sign a transaction.
How to spot them:
- Bookmark the real URLs for protocols you use regularly
- Check the URL carefully — look for character substitutions (rn instead of m, 0 instead of o)
- If a "connect wallet" popup appears immediately without you clicking anything, close the tab
- Use our Risk Scanner to check suspicious URLs before connecting
3. Wallet drainer signatures
Some attacks don't need token approvals at all. They use a technique called "permit" or "eth_sign" to get you to sign a message that authorizes token transfers. The signature looks harmless — it doesn't trigger a gas fee or a transaction confirmation — but it gives the attacker permission to move your tokens.
Red flags:
- Any request to sign a message on a site you didn't intentionally visit
- Signatures that include hex data you can't read
- Sites that claim you need to "verify your wallet" or "prove ownership"
- Use our Signature Decoder to understand what you're actually signing
4. Rug pulls and abandoned projects
A rug pull happens when the team behind a protocol drains the liquidity or mints unlimited tokens, crashing the price. Some are outright scams from day one. Others start legitimate but the team gives up and disappears with whatever value remains.
Warning signs:
- Anonymous team with no verifiable track record
- Audits missing or from unknown auditing firms
- Token locked in single-holder wallets with short unlock periods
- Promises of extremely high yield (100%+ APY) with no clear source of revenue
- No active development on GitHub for months
5. Bridge exploits
Cross-chain bridges are the most attacked category in DeFi. They hold large pools of locked tokens and use complex multi-signature or validator systems that create security surface area.
How to reduce bridge risk:
- Use established bridges (official L2 bridges, Stargate, Across) over newer ones
- Bridge smaller amounts first as a test
- Avoid bridges offering unusually high incentives — they may be compensating for risk
- Use our Gas Fee Estimator to compare cross-chain costs before bridging
6. Impermanent loss in liquidity pools
Providing liquidity sounds like free money until the token prices diverge. If one token in your pair goes up significantly while the other doesn't, you would have been better off just holding both tokens. This loss isn't a scam — it's a structural feature of how automated market makers work.
Before providing liquidity:
- Understand that impermanent loss is permanent if you withdraw while prices are diverged
- Concentrated liquidity positions (Uniswap V3 style) amplify both gains and losses
- Start with stablecoin pairs (USDC/USDT) if you want to learn LP mechanics with less risk
- Make sure trading fees and incentive rewards actually outweigh the impermanent loss
7. Transaction simulation failures
When you submit a transaction, your wallet simulates it before broadcasting. If the simulation fails or shows unexpected results, that's your last line of defense. Some wallets show clear warnings; others just display a generic error.
Best practices:
- Always read transaction simulation results before confirming
- If your wallet says "this transaction may fail," don't force it through
- Use Transaction Preview to understand what a transaction will do before you sign it
- If a dApp is asking you to skip simulation or use a custom RPC, that's a red flag
The habits that actually matter
Tools and checklists help, but the real defense is developing good instincts:
- Slow down. Most DeFi losses happen when people rush. Take 30 seconds to read what you're signing.
- Use a separate wallet for experiments. Keep your main holdings in one wallet, and use a different one for new protocols and claim sites.
- Verify before you trust. Check that URLs match, that contracts are verified on the block explorer, and that the protocol has been audited.
- Keep approvals minimal. Revoke what you don't actively use.
Related tools
- Risk Scanner — check URLs and contracts before connecting
- Security Checklist — audit your wallet setup
- Signature Decoder — understand what you're signing
- Transaction Preview — simulate transactions before confirming
- Wallet Setup Builder — create a multi-wallet safety architecture
Some links on this page are affiliate links. We may earn a commission at no extra cost to you if you sign up or make a purchase through these links. This does not influence our editorial evaluations. Learn more