Skip to main content

Token Approval Exploit

Definition

A token approval exploit is a security vulnerability where a malicious actor abuses the approve function of an ERC-20 token to drain funds from a user’s wallet. This often occurs when a user has granted excessive or indefinite spending permissions to a compromised or fraudulent smart contract. The attacker then uses the approved allowance to transfer the user’s tokens to their own address. It represents a significant risk to digital asset holders.