
Bait-and-switch refers to a deceptive or manipulative tactic where an attractive opportunity is used to lure you in, but the actual transaction target or terms are quietly swapped before confirmation. This scheme is prevalent in crypto trading, NFT minting, and key phases of airdrop participation.
On-chain, bait-and-switch typically takes two forms: First, the “contract address” is swapped. The contract address uniquely identifies an on-chain asset or application, much like a barcode for products—if the address changes, it is no longer the same asset. Second, “signatures and approvals” are altered or expanded. A signature confirms an action with your wallet; an approval allows a contract to access your assets. If the scope is broadened, your assets may be at risk of being moved without your consent.
Bait-and-switch is widespread in Web3 due to irreversible transactions, anonymous identities, complex processes, and significant information asymmetry. Attackers often create urgency and FOMO (“limited-time offers”) to pressure users.
On-chain operations involve numerous details, such as switching networks, verifying contracts, setting slippage, and approving spending limits—factors that make it easy for newcomers to overlook critical confirmations. Social media amplifies these risks: group chats or announcements can be edited in minutes, rapidly spreading bait-and-switch attacks. According to 2024 security reports from Chainalysis and SlowMist, social engineering scams remain prominent, with fake airdrops and malicious contract links among the most frequent methods.
Common bait-and-switch tactics include swapping contract addresses, manipulating price or slippage settings, replacing redirect links, and editing group announcements at the last moment.
A typical example: In a token presale group, the pinned “official contract address” is replaced with a fake one right before launch. As members rush to buy, funds are funneled to a counterfeit token controlled by attackers. Similarly, websites may switch the target token’s contract after you connect your wallet. Malicious frontends can request “unlimited approval” in signature pop-ups, granting contracts perpetual access to your assets.
In decentralized trading, bait-and-switch usually involves substituting a token’s contract address or altering transaction parameters.
On DEXs (decentralized exchanges), attackers often share “one-click swap” links. Although the token name appears familiar, the underlying contract address has been swapped. Some interfaces set slippage extremely high or expand wallet approval to unlimited, exposing your assets to risk with a single action.
Step 1: Before accessing any trading page, independently verify the contract address on a block explorer and ensure it matches the official source.
Step 2: Before signing in your wallet, expand details to review the “destination address,” “function name,” and “approval amount.” If the amount is excessive or the method unclear, exit immediately.
Step 3: Use wallets or tools that support transaction simulation to preview the swap and confirm there are no discrepancies in the asset or amount being transferred.
Bait-and-switch in NFTs frequently occurs during free mints, high-demand launches, or fast-paced secondary market trades.
For example, an NFT project’s minting page might be swapped with a fake site just before launch so you mint from a counterfeit contract instead of the official one. Alternatively, after connecting your wallet, the site may swap out the contract call so you’re approving access rather than minting. For collections with unlocked metadata, attackers may use similar visuals and names to trick users into buying fake collections on secondary markets.
Step 1: Only use links from official Twitter accounts, Discord servers, or websites. Always verify the contract address and collection ID.
Step 2: In your wallet’s pop-up window, confirm that the method being called is “mint” rather than “approve” or other approval-related actions.
Step 3: Prioritize participating in open and verifiable contracts. Check source code verification and holder distribution on block explorers.
The key to identifying and avoiding bait-and-switch is “independent verification, minimal approvals, and taking your time.”
Step 1: Independently verify contract addresses. Do not just click buttons in chats or on web pages—copy the address into a block explorer and compare it with official sources.
Step 2: Review signature details. In your wallet’s pop-up, click “view details” to confirm the “to address,” “function name,” and “approval amount.” For requests for unlimited approval, change it to a limited amount or reject outright.
Step 3: Use transaction simulation and risk management tools. Simulate transactions where possible; after completing transactions, periodically use approval revocation tools to check for and revoke unnecessary permissions.
Step 4: Only use official channels. Access projects via their official website, verified social media channels, and official announcements; avoid private messages and short-link redirects.
Step 5: Slow down. When participating in hyped launches or airdrops, take at least a few extra seconds to double-check details—sacrificing speed could save your principal investment.
Bait-and-switch specifically targets the moment you are about to confirm a transaction by changing its target or terms—this focus sets it apart from other scams.
Compared with a “rug pull,” where project teams drain liquidity or stop delivering on promises after attracting funds (usually later in the process), bait-and-switch occurs as soon as you click or sign. Unlike a “honeypot,” which prevents you from selling at the smart contract level, bait-and-switch tricks you into buying fake assets or over-approving permissions. In contrast to a sandwich attack—which profits from price slippage—bait-and-switch directly swaps transaction targets or parameters.
On Gate’s platform, prevention hinges on using only official entry points and order confirmation pages—not third-party links or unofficial channels.
Step 1: When participating in new token launches, always use Gate’s Startup page and official announcements—never third-party shared links. Verify token symbols and contract details against official disclosures.
Step 2: For deposits and withdrawals, only operate via your account page. Double-check your personal deposit address; never click short links from customer support chats or group messages. Gate’s order confirmation page will show transaction targets and amounts—review each detail before submitting.
Step 3: For NFT activities, access only via Gate’s official NFT section. Avoid privately sent mint links; always inspect signature details and reject suspicious approval requests.
Step 4: Conduct regular security checks. Enable account security alerts, use strong passwords with two-factor authentication; for on-chain assets, use hardware wallets and regularly revoke unnecessary approvals.
At its core, bait-and-switch means “lure first, then swap”—it most often occurs during contract address verification or signature approval steps. The best defense is independent verification, granting minimal permissions, sticking to official channels, and taking an extra moment before confirming actions. In DEX and NFT scenarios, develop habits of checking contract addresses and signature details, using transaction simulations and approval revocations; for Gate activities, rely on official entry points and order confirmations while avoiding unofficial channels or private links. Every transaction involving funds carries risks—putting verification first can greatly reduce potential losses.
Unfortunately, it is very difficult to recover assets lost to bait-and-switch scams. Due to the irreversible nature of blockchain transactions, once funds are sent to a scammer’s wallet they are permanently out of your control. You should immediately report to Gate customer support and preserve all transaction records for law enforcement—but recovery chances are low. Prevention is essential.
This could indicate your wallet’s private key or seed phrase has been compromised—or you are currently under a bait-and-switch attack. Scammers often use cloned addresses or impersonate official sources to send malicious links, tricking you into thinking an interaction is safe. Immediately check for malware on your device, change passwords, enable two-factor authentication on Gate and other platforms, and transfer remaining funds to a new wallet right away.
Before swapping on platforms like Gate or Uniswap, always copy the official token contract address and compare it character-by-character with what appears in the input field—do not rely on just the first or last few digits. Also check if the token name matches exactly (scammers often use similar-looking characters). Visit the official website to verify contract authenticity. If uncertain about any token, check its trading pair and liquidity size on Gate; smaller liquidity typically means higher risk.
Not all are scams—but they do carry high risk. Legitimate project airdrops are usually announced in advance via official channels; bait-and-switch schemes often masquerade as “lucky giveaways” to entice you into clicking malicious links or authorizing your wallet. To assess legitimacy: research the project’s status and popularity on Gate first; only participate after confirming through official sources. Never grant unknown contracts any permissions. Be wary of urgent “claim now” promotions—they are frequently scam bait.
Trading on regulated platforms like Gate is significantly safer. Gate conducts risk reviews for listed tokens, offers legal backing and official support, and holds user assets in custody. When swapping directly from self-custody wallets, you interact with smart contracts yourself—bearing all risks of bait-and-switches, fake tokens, slippage traps, etc. Beginners are advised to trade via Gate first; only consider self-custody swaps after thoroughly understanding smart contract risks.


