REKT AUTOPSY
ALL CASES|Scan Wallet →
CASE FILE #24
Rug PullEthereumDEX

Tomatos

September 24, 2020

CAUSE OF DEATH

Unlimited smart contract approval granted attackers unrestricted wallet access.

TOTAL LOST
$286K
CHAIN
Ethereum
TYPE
Rug Pull
📄

FORENSIC REPORT

TIME OF DEATH

Time of Death: September 24, 2020. The specimen, identified as Project Tomatos on Ethereum mainnet, was pronounced dead on arrival when attacker-controlled smart contracts initiated mass fund extraction across multiple stablecoin and LP token holdings. The victim pool included pre-sale participants and liquidity providers, their combined loss totaling $286,136 USD. Social media channels went dark immediately post-mortem—a classic necrological pattern in this species of rug pull.

CAUSE OF DEATH ANALYSIS

Cause of Death Analysis: The autopsy reveals the primary pathogenic mechanism: unlimited malicious approval in the smart contract code. This architectural defect functioned as an open door, granting the attacker carte blanche to withdraw DAI, TrueUSD, USDC, USDT, UNI tokens, and USDC-Tomatoes LP shares directly from user wallets without further authorization. The attacker executed systematic drains across eight separate Tornado mixer deposits—a post-mortem behavior indicating premeditation and cash-out intent. This specimen exhibits textbook Class-A rug pull morphology: promise, extract, obfuscate, vanish.

CONTRIBUTING FACTORS

Contributing Factors: The pre-sale structure presented a critical vulnerability that should have triggered warning signs in any competent security review. Users deposited ETH expecting tokenized returns; they received nothing but the knowledge they'd been harvested. The fact that withdrawal functions existed without corresponding issuance mechanisms suggests the contract was designed as a trap from genesis. No audit trail, no code verification, no community vetting—just an approval statement and hope.

VICTIM IMPACT

Victim Impact: The specimens show characteristic trauma patterns consistent with total capital loss. Pre-sale investors lost both principal and expected token allocation. Liquidity providers lost their staked assets. The distribution of stolen funds across eight Tornado mixer transactions indicates sophisticated fund laundering, effectively vaporizing any chain-based recovery pathway. Six distinct token types compromised. Eight mixing transactions initiated. Zero recovery.

PATHOLOGIST'S NOTE

Pathologist's Note: In my twenty years examining rekt specimens, the Tomatos case exemplifies what we call 'the malicious approval trifecta'—built-in theft, social media blackout, and mixer dispersal all present at time of death. The pre-sale mechanism was particularly elegant in its cruelty: collect ETH first, drain wallets second, deny tokens forever. Users didn't lose to market volatility or liquidity crunches—they lost to someone else's shopping list. The specimen's social media going dark simultaneously with the drain suggests these developers weren't even trying to maintain the fiction. They knew what they'd built. They built it anyway. Next case.

"Tomatos withered on the vine. Malicious approvals drained $286K across six token types while devs ghosted. The pre-sale ETH victims never saw their tokens—just the dev walking away clean."

Share on 𝕏
Were you holding this? Get your wallet autopsy →

Data from De.Fi REKT Database