Crypto Security Guide

Protect your assets with battle-tested security practices.

Self-custody means self-responsibility. This guide covers wallet safety, scam prevention, and what to do if things go wrong.

Wallet Comparison

Choose the right wallet for your needs. Use a hot wallet for active trading and a cold wallet for long-term storage.

MetaMask

Software (Hot Wallet)

Security: MediumFree

Best for: Beginners and everyday DeFi use

  • Browser extension + mobile app
  • Largest user base and ecosystem support
  • Built-in token swap aggregator
  • Supports custom networks (Arbitrum, etc.)
Visit MetaMask

Rabby

Software (Hot Wallet)

Security: Medium-HighFree

Best for: Active DeFi traders who want transaction previews

  • Transaction simulation before signing
  • Multi-chain support with auto-detection
  • Security risk alerts on suspicious contracts
  • Open source and audited
Visit Rabby

Ledger

Hardware (Cold Wallet)

Security: Very High~$79+

Best for: Long-term storage of significant holdings

  • Private keys never leave the device
  • Supports 5,500+ tokens
  • Bluetooth + USB connectivity
  • Ledger Live companion app
Get Ledger

Trezor

Hardware (Cold Wallet)

Security: Very High~$69+

Best for: Security-conscious users who value open source

  • Fully open-source firmware
  • Private keys stored offline
  • Shamir Backup (split seed phrase)
  • Trezor Suite desktop app
Get Trezor

OKX Wallet

Software (Hot Wallet)

Security: MediumFree

Best for: Multi-chain users who want a built-in DEX

  • Supports 80+ blockchains
  • Built-in DEX aggregator
  • MPC wallet option (keyless)
  • Browser extension + mobile
Visit OKX Wallet

Self-Custody Best Practices

Your Keys, Your Crypto

Self-custody means you control the private keys to your wallet. Unlike a bank or centralized exchange, no one can freeze your account or reverse your transactions. This gives you full sovereignty over your assets, but it also means you are solely responsible for their security. If you lose your keys or seed phrase, no one can recover your funds.

Seed Phrase Security

Your seed phrase (recovery phrase) is the master key to your wallet. Treat it as the most sensitive piece of information you own.

Do

  • Write it down on paper or engrave on metal
  • Store in multiple secure physical locations
  • Consider a fireproof safe or safety deposit box
  • Test recovery before depositing large amounts

Do Not

  • Store digitally (screenshots, notes apps, cloud)
  • Share with anyone, including "support" staff
  • Enter on any website or form
  • Send via email, DM, or messaging apps

Passwords & Two-Factor Authentication

Use a reputable password manager (Bitwarden, 1Password) to generate and store unique, strong passwords for every crypto-related account. Enable two-factor authentication (2FA) everywhere possible.

Prefer authenticator apps (Google Authenticator, Authy) over SMS-based 2FA. SIM-swap attacks can compromise SMS codes. For maximum security, use a hardware security key (YubiKey).

Use Multiple Wallets

Separate your crypto across different wallets based on purpose. This limits exposure if one wallet is compromised.

Hot Wallet

Small amounts for active DeFi trading and daily transactions. Accept some risk for convenience.

Cold Wallet

Majority of holdings stored on a hardware wallet. Rarely connected, maximum security.

Burner Wallet

Disposable wallet for minting NFTs, testing new protocols, or interacting with unverified contracts.

Common DeFi Scams & How to Avoid Them

Knowing the attack vectors is your first line of defense. Here are the most common scams targeting crypto users.

Phishing Websites

Fake clones of popular DEXes, exchanges, or wallet interfaces designed to steal your credentials or prompt malicious transactions.

Red Flags

  • URL is slightly misspelled (e.g., uniiswap.com, hyperliqud.xyz)
  • Promoted through Google ads or social media ads
  • Asks you to enter your seed phrase
  • SSL certificate issues or missing padlock icon

How to Protect Yourself

  • Bookmark official URLs and always navigate from bookmarks
  • Never click links from DMs, emails, or social media ads
  • Double-check the URL before connecting your wallet
  • Use Rabby wallet for phishing site detection

Fake Token Contracts

Scam tokens that mimic real projects with similar names or tickers, designed to drain your wallet when you interact with them.

Red Flags

  • Token appears in your wallet that you never bought
  • Contract address doesn't match official sources
  • Extremely low liquidity or suspicious trading patterns
  • Token name/ticker is slightly different from the real one

How to Protect Yourself

  • Always verify contract addresses from official project sources
  • Use Token Sniffer or similar tools to audit contracts
  • Never interact with tokens you didn't intentionally acquire
  • Check if the contract is verified on the block explorer

Social Engineering

Impersonators on Discord, Telegram, and Twitter who pretend to be support staff, moderators, or project founders to trick you.

Red Flags

  • Someone DMs you first offering 'help' or 'support'
  • Urgency tactics: 'Act now or lose your funds'
  • Asks you to screen share or install remote access software
  • Requests your seed phrase or private key for 'verification'

How to Protect Yourself

  • Official support never DMs first
  • Never share your seed phrase with anyone, ever
  • Disable DMs in crypto Discord servers
  • Verify identities through official channels only

Approval Exploits

Malicious contracts that request unlimited token approvals, allowing them to drain your wallet at any time in the future.

Red Flags

  • Approval request for unlimited or very large token amounts
  • Unverified or new contracts asking for approvals
  • Contracts that request approval for tokens you are not trading
  • Multiple approval requests in a single transaction

How to Protect Yourself

  • Set custom approval limits instead of unlimited
  • Regularly audit and revoke old approvals (revoke.cash)
  • Use Rabby wallet which warns about risky approvals
  • Only approve contracts from well-known, audited protocols

Rug Pulls & Exit Scams

Projects that build hype, attract investment, then disappear with user funds by removing liquidity or exploiting contract backdoors.

Red Flags

  • Anonymous team with no verifiable track record
  • Unrealistic APY promises (1,000%+ returns)
  • No audit or audit from unknown firms
  • Locked liquidity with short timeframes or admin overrides

How to Protect Yourself

  • Research the team and their previous projects
  • Check if liquidity is locked and for how long
  • Read the smart contract audit (if it exists)
  • Start with small amounts and never invest more than you can afford to lose

Verifying Contract Addresses

How to Verify on Block Explorers

Before interacting with any token or contract, verify it using a block explorer. This is one of the most important habits you can develop.

Step 1: Find the Official Contract Address

Get the contract address from the project's official website, official documentation, or verified social media accounts. Never trust addresses shared in DMs, Telegram groups, or random forums.

Step 2: Check on the Block Explorer

Search the contract address on Etherscan (Ethereum), Arbiscan (Arbitrum), or the relevant chain explorer. Look for the verified contract badge, transaction count, and holder distribution.

Step 3: Audit with Token Analysis Tools

Use tools like Token Sniffer to check for honeypot patterns, hidden mint functions, or suspicious contract code. Also check GoPlus Security for automated security analysis.

Warning: If a token appears in your wallet that you did not buy, do not interact with it. Scammers airdrop malicious tokens that can drain your wallet when you try to swap or transfer them.

Secure Browser Setup for Trading

Dedicated Browser Profile

Create a separate browser profile used only for DeFi and crypto. This isolates your wallet extension from other browsing activity, reducing the risk of malicious extensions or cross-site attacks.

Bookmark Official URLs

Bookmark the official URLs for every DeFi protocol you use (Hyperliquid, Uniswap, Aave, etc.). Always navigate to sites via bookmarks rather than searching or clicking links. This prevents phishing via fake search results.

Minimize Extensions

Only install your wallet extension and essential security tools in your DeFi browser profile. Remove ad blockers that inject scripts, social media extensions, and any other non-essential extensions that could interfere with or compromise transactions.

VPN & Network Security

Use a reputable VPN when trading on public or shared networks. Enable your browser's built-in security features (HTTPS-only mode, safe browsing). Avoid doing crypto transactions on public WiFi without a VPN.

What to Do If Your Wallet Is Compromised

Time is critical. If you suspect your wallet has been compromised, act immediately. Every second counts as attackers may be draining your assets.

1

Transfer Remaining Assets Immediately

Send all remaining tokens and assets to a brand-new wallet address that has never been connected to any DApp. Use a different device if possible. Prioritize the highest-value assets first.

2

Revoke Token Approvals

Go to revoke.cash and revoke all token approvals on the compromised wallet. This prevents attackers from using existing approvals to drain tokens you may have missed.

3

Secure Your New Wallet

Generate a completely new seed phrase on a clean device. If you suspect malware, do not use the same computer. Consider using a hardware wallet for the new setup.

4

Document & Report

Save all transaction hashes related to the compromise. Report to local authorities if significant funds were stolen. Report the attacker's address on block explorers and to the relevant protocol teams. File a report with the FBI's IC3 (for US residents) or your country's cybercrime unit.

Security FAQ

Disclosure & Disclaimer

No affiliation

whatishyperliquid.com is not affiliated with, endorsed by, or sponsored by Hyperliquid, HYPE or Hyper Foundation, or any other centralized or decentralized exchange, protocol, or company. Hyperliquid is an independent decentralized exchange protocol.

Educational use only

All content on this website is for educational and entertainment purposes only. Nothing here constitutes financial, investment, trading, accounting, tax, or legal advice.

High-risk warning

Perpetual futures are highly speculative and may result in substantial or total loss of capital. Leverage amplifies gains and losses. Trade only with money you can afford to lose. Always do your own research and consider seeking advice from a qualified professional.

Affiliate disclosure

whatishyperliquid.com may earn a commission if you click a referral link and open or use an account on a third-party platform. This does not change your price and does not influence our educational content or recommendations.

User responsibility

By using this website and any linked platforms, you acknowledge these risks and agree that you trade at your own discretion and responsibility.