diff --git a/examples/save_and_load_private_key_file.py b/examples/save_and_load_private_key_file.py
index 35844159807ab7dca91ccfa0268bd6e4fc7a3232..19fe369845af564d6cea712043b5583d4fa94b21 100644
--- a/examples/save_and_load_private_key_file.py
+++ b/examples/save_and_load_private_key_file.py
@@ -1,6 +1,7 @@
 from duniterpy.key import SigningKey
 import getpass
 import os
+import sys
 
 if "XDG_CONFIG_HOME" in os.environ:
     home_path = os.environ["XDG_CONFIG_HOME"]
@@ -35,7 +36,7 @@ signer = SigningKey.from_credentials(salt, password)
 # check public key
 if signer.pubkey != pubkey:
     print("Bad credentials!")
-    exit(1)
+    sys.exit(1)
 
 # save private keys in a file (json format)
 signer.save_private_key(PRIVATE_KEYS_FILE_PATH)
@@ -49,4 +50,4 @@ loaded_signer = SigningKey.from_private_key(PRIVATE_KEYS_FILE_PATH)  # type: Sig
 # check public key from file
 print("Public key %s loaded from file %s" % (pubkey, PRIVATE_KEYS_FILE_PATH))
 
-exit(0)
+sys.exit(0)
diff --git a/examples/save_and_load_private_key_file_ewif.py b/examples/save_and_load_private_key_file_ewif.py
index 563bd1ce8976f60ac38b4fb742107eb436e61e09..55307829818125ad02483765468110f5a393483e 100644
--- a/examples/save_and_load_private_key_file_ewif.py
+++ b/examples/save_and_load_private_key_file_ewif.py
@@ -1,6 +1,7 @@
 from duniterpy.key import SigningKey
 import getpass
 import os
+import sys
 
 if "XDG_CONFIG_HOME" in os.environ:
     home_path = os.environ["XDG_CONFIG_HOME"]
@@ -35,7 +36,7 @@ signer = SigningKey.from_credentials(salt, password)
 # check public key
 if signer.pubkey != pubkey:
     print("Bad credentials!")
-    exit(1)
+    sys.exit(1)
 
 # prompt hidden user entry
 ewif_password = getpass.getpass("Enter an encryption password: ")
@@ -62,7 +63,7 @@ try:
 
 except IOError as error:
     print(error)
-    exit(1)
+    sys.exit(1)
 
 
-exit(0)
+sys.exit(0)
diff --git a/examples/save_and_load_private_key_file_pubsec.py b/examples/save_and_load_private_key_file_pubsec.py
index b63998d1340cd9cc401bc8a9e9a945c6bf5e5d2a..082f491a5263cfcb972bdca7890dbd85f0a3110c 100644
--- a/examples/save_and_load_private_key_file_pubsec.py
+++ b/examples/save_and_load_private_key_file_pubsec.py
@@ -1,6 +1,7 @@
 from duniterpy.key import SigningKey
 import getpass
 import os
+import sys
 
 if "XDG_CONFIG_HOME" in os.environ:
     home_path = os.environ["XDG_CONFIG_HOME"]
@@ -35,7 +36,7 @@ signer = SigningKey.from_credentials(salt, password)
 # check public key
 if signer.pubkey != pubkey:
     print("Bad credentials!")
-    exit(1)
+    sys.exit(1)
 
 # save private key in a file (PubSec v1 format)
 signer.save_pubsec_file(PRIVATE_KEY_FILE_PATH)
@@ -57,7 +58,7 @@ try:
 
 except IOError as error:
     print(error)
-    exit(1)
+    sys.exit(1)
 
 
-exit(0)
+sys.exit(0)
diff --git a/examples/save_and_load_private_key_file_wif.py b/examples/save_and_load_private_key_file_wif.py
index afc627b234158e731f18a3222de98473ba2a60e9..6f069398db8fc00c66754a95a3698f467a61de8b 100644
--- a/examples/save_and_load_private_key_file_wif.py
+++ b/examples/save_and_load_private_key_file_wif.py
@@ -1,6 +1,7 @@
 from duniterpy.key import SigningKey
 import getpass
 import os
+import sys
 
 if "XDG_CONFIG_HOME" in os.environ:
     home_path = os.environ["XDG_CONFIG_HOME"]
@@ -35,7 +36,7 @@ signer = SigningKey.from_credentials(salt, password)
 # check public key
 if signer.pubkey != pubkey:
     print("Bad credentials!")
-    exit(1)
+    sys.exit(1)
 
 # save private key in a file (WIF v1 format)
 signer.save_wif_file(PRIVATE_KEY_FILE_PATH)
@@ -57,7 +58,7 @@ try:
 
 except IOError as error:
     print(error)
-    exit(1)
+    sys.exit(1)
 
 
-exit(0)
+sys.exit(0)
diff --git a/examples/save_revoke_document.py b/examples/save_revoke_document.py
index 2406da7561a705f3c01d73483544f62aafb3c0e2..ffac355d5d84e269539e49113fbe29cce13ad5a9 100644
--- a/examples/save_revoke_document.py
+++ b/examples/save_revoke_document.py
@@ -1,6 +1,7 @@
 import asyncio
 import getpass
 import os
+import sys
 from typing import Optional
 
 import duniterpy.api.bma as bma
@@ -123,7 +124,7 @@ async def main():
     # check public key
     if signer.pubkey != pubkey:
         print("Bad credentials!")
-        exit(0)
+        sys.exit(0)
 
     # capture current block to get currency name
     current_block = await client(bma.blockchain.current)
@@ -134,7 +135,7 @@ async def main():
         print("Identity not found for pubkey {0}".format(pubkey))
         # Close client aiohttp session
         await client.close()
-        exit(1)
+        sys.exit(1)
 
     # get the revoke document
     revocation_signed_raw_document = get_signed_raw_revocation_document(
diff --git a/examples/send_certification.py b/examples/send_certification.py
index a8af221d434dc97056e8962ab130ec997e202c65..1b103c47d7e4146c34b400dfee83c2aec3a71c95 100644
--- a/examples/send_certification.py
+++ b/examples/send_certification.py
@@ -1,3 +1,4 @@
+import sys
 import asyncio
 import getpass
 from typing import Optional
@@ -114,7 +115,7 @@ async def main():
         print("Identity not found for pubkey {0}".format(pubkey_to))
         # Close client aiohttp session
         await client.close()
-        exit(1)
+        sys.exit(1)
 
     # send the Certification document to the node
     certification = get_certification_document(current_block, identity, pubkey_from)
diff --git a/examples/send_transaction.py b/examples/send_transaction.py
index f52309f3d0de7e3b4d805cdafc824bf32686d705..fc34e869cd55a5604e527182e2881df8b3b638c5 100644
--- a/examples/send_transaction.py
+++ b/examples/send_transaction.py
@@ -1,3 +1,4 @@
+import sys
 import asyncio
 import getpass
 
@@ -120,7 +121,7 @@ async def main():
 
     if len(response["sources"]) == 0:
         print("no sources found for account %s" % pubkey_to)
-        exit(1)
+        sys.exit(1)
 
     # get the first source
     source = response["sources"][0]