Crypto protocols usually sustain real damage after the exploit occurs, but some tokens are more resilient.