Anyone else worried about predatory actors creating liquid network-esque replicas and baiting people into the network, then rugging the users now that the functionary code is out ? 🤔