How to identify malicious tokens, the third idea worth learning from.
We can judge the risk of token by token holders and transaction records. Generally, there are relatively few token holders and tokens with concentrated token holdings will have the risk of running away.
For example: AIT is an obvious honeypot scam, commonly known as "no one can escape".
There are only few token holders. Most addresses cannot be transferred. Only the 0xffa... address can be transferred, and his token comes from the contract deployer address 0x1aa of AIT. The 0xffa... address provides AIT liquidity on pancake, and only 0xffa... can be traded on pancake. Therefore, there is obvious manipulation of transactions.