Content pfp
Content
@
0 reply
20 recasts
20 reactions

edit pfp
edit
@edit
another day, another honeypot using a farcaster native app's name to trick users. this time it's $COLORS. it even passes honeypot tests. navigating this mess is getting harder. stay safe and avoid this token. 0xd61f5b8c9447aa30f231daeac693142b62d3aebb https://gopluslabs.io/token-security/8453/0xd61f5b8c9447aa30f231daeac693142b62d3aebb https://honeypot.is/base?address=0xd61f5b8c9447aa30f231daeac693142b62d3aebb
4 replies
2 recasts
19 reactions

edit pfp
edit
@edit
1 reply
0 recast
1 reaction

J. Valeska 🦊🎩🫂 pfp
J. Valeska 🦊🎩🫂
@jvaleska.eth
contract has similarities with the farcadeai similar scam launcher the last week
0 reply
0 recast
1 reaction

Tudor 🟣🟡 pfp
Tudor 🟣🟡
@tudorizer
having a clear source of truth for the CA helps, becuase social-proof has limits the latest release of /addresso aims to tackle exactly this
0 reply
0 recast
0 reaction

Juliettemeon 🎩 pfp
Juliettemeon 🎩
@juliettemeon.eth
This is exactly what i was worried about Who’s the creator? Does it have anything to do with jake ?
0 reply
0 recast
0 reaction