Safety in web3
Featured Articles
Suggerimenti di base sulla sicurezza e la protezione di MetaMask
Ti stai avvicinando per la prima volta alle criptovalute e al web3?
What are MetaMask's official support channels?
Stay safe by knowing MetaMask's official support channels.
Guides
How do I recognize the real MetaMask?
Many websites, emails, and social media profiles imitate MetaMask, attempting to access your accounts and steal your funds. Let's take a look at how you can tell them apart from the real thing.
Using transaction security providers to protect yourself from scams
New security alerts system
Help
'Deceptive site ahead' when trying to connect to a site
This warning message appears when you attempt to connect your wallet to a site that may be a phishing scam. It will look like this:
I received an email claiming to be from MetaMask. Is it legit?
MetaMask will never send you unsolicited emails.
Scammers and Phishers: Rugpulls and airdrop scams
The decentralized web is exploding with economic activity and has the potential for incredible growth. While this attracts a lot of well-deserved attention, there's another thing it attracts: scammers and thieves.
Why am I being warned about sending tokens to a contract?
Learn more about sending tokens to a contract, and why you should avoid it.
Learn
What is a sweeper bot?
Sweeper bots, or "sweepers," are automated scripts that malicious actors deploy to monitor and interact with blockchain transactions. These bots are designed to automatically transfer assets from a compromised account to another address controlled by the attacker. This process, also known as sweeping or scavenging, can happen in the blink of an eye, due to the bot's ability to monitor the mempool or txpool—where pending transactions are stored before being confirmed on the blockchain.
The risks of connecting to an unknown network
You should always think twice before you connect your wallet to a new blockchain network: be deliberate and think this through.
Token safety practices
How to stay safe when interacting with tokens.
What is a malicious token approval?
In our What is a token approval? article, we discussed how token approvals work. Essentially, they are among the most common types of transactions you will encounter, granting a dapp permission to access and move specific tokens from your wallet.
What is a token approval?
Contents
Why does MetaMask Swaps use unlimited token approvals?
Our token approval is given strictly to our Spender contract, which was created to: