Brand abuse takedowns
Comprehensive surveillance detects any attempt to deceive users by exploiting 1inch’s identity - then takes proactive measures to intervene.
Cutting-edge DeFi security. Institutional-grade data protection. The most-audited smart contracts in the industry.

From scam protection to brand abuse takedowns - we work constantly to shield you from attacks.
Stay informedWith ISO27001 and SOC2 certification, our products and practices meet the highest standards of compliance.
Visit our Trust CentreSecurity analysts investigate high-risk activity across chains, connect addresses and flows, and feed verified findings into warnings, blocks, and incident response
1inch absorbs reputable sanctions and risk blocklists. Updates sync near-real time across all layers and supported chains.
Open-source intelligence and trusted threat signals help pre-flag malicious infrastructure and abuse patterns.
Behavioral analytics highlight suspicious sequences. Risky actions trigger warnings or extra checks before a transaction is signed.
Interactions are screened against internal research and external intelligence. High-confidence hits trigger immediate protective controls, followed by a defined human review to minimize false positives.
All interactions are protected by layered controls: real-time screening (geofencing, VPN detection, device integrity), on-chain analytics and threat profiles, with manual overrides when needed.
We deploy layered strategies to detect and block addresses connected to illicit activity.

Comprehensive surveillance detects any attempt to deceive users by exploiting 1inch’s identity - then takes proactive measures to intervene.
1inch infrastructure actively detects and prevents malicious activity, with continuous reviews to ensure ongoing safety.
Transaction scanning. Transactions processed via 1inch applications are scanned to detect fraudulent activity, and the user is alerted automatically.
Domain scanning. When a 1inch user connects to a third-party application, a domain scan is activated, and the user is warned of any potential threat.
Malicious token detection. Token and wallet addresses are checked. Scam tokens masquerading as legitimate ones are instantly detected and flagged to the user.
Every trade runs through built-in checks to prevent losses from slippage, front-running or malicious routing.
Send transactions straight to validators - making sandwich attacks impossible.
Swap orders are handled directly by solvers, not made public on the blockchain.
1inch complies with the highest data security standards.
Up-to-date knowledge is key to effective DeFi security.
When you connect a wallet through a 1inch interface, 1inch performs domain scanning to check whether the connected app's domain is known to be malicious or has been flagged for phishing or scams. Simultaneously, transaction scanning runs in the background: any transaction you initiate via 1inch is automatically checked against fraud/scam signatures or suspicious behavior before you sign it. If something looks dangerous, you're warned or the action is blocked.
1inch maintains layers of screening: token contract and wallet addresses are compared against blocklists, known malicious tokens, and scam-token patterns. There's behavior monitoring (which detects abnormal transaction patterns), automated validation of token metadata, plus live alerts for suspicious token contract addresses. If a token or address appears fraudulent, 1inch flags it or warns the user.
The 1inch Rabbithole is a feature that solves the problem of sandwich attacks by sending swap transactions directly to validators and avoiding putting them into the mempool where sandwich bots can attack them.
No. 1inch smart contracts are non-upgradable by design. That means there are no privileged admin keys that can change core logic after deployment. This reduces risks of internal compromise or misuse, and increases trust, because once deployed the contract's behavior is fixed and auditable.
1inch uses a combination of automated risk management screening, behavior and transaction-pattern analysis, and integration of multiple public and private blocklists. High-risk addresses (hacked, stolen, sanctioned, etc.) are blocked, but 1inch also uses progressive filtering—warnings first, then stricter blocking—before blocking so legitimate users are less likely to be affected. Users receive explicit warnings of risk before transactions.
Generally no, your funds are not held by 1inch and are not centrally custodied. Aggregations are routed through your own wallet interacting with external DEXes or smart contracts. If one liquidity pool or protocol in the network is compromised, only funds that have been approved/used in that compromised contract are potentially affected. Because 1inch smart contracts are non-upgradable and audited, and token approvals are limited, the risk is further reduced.