By using decentralized finance to completely host, create, and secure web environments, a new form of web infrastructure can be created solving the big metadata problem that dominates modern day internet . A single web3 wallet able to connect to an interface of countless web2 services. Altera Protocol develops technology that hopes to contributes to the ending of a period of insecurity and privacy breach.
External Developers that host and create web applications using the Altera Software Development kit will also be part of the same metadata-free infrastructure created by the protocol. Additionally it uses the proof of stake consensus to finance paid cloud services, e.g. VPN, Domains, Server Hosting, API, Web Storage, and a lot more. Thereby truly creating an internet of blockchains.
The Web2 usage of Web3 is tremendous and to help improve global application the interoperability should improve drastically. By combining DeFi with paid cloud services the project will create a new playing field for software engineers and overall web3 users.
Reentrancy in Altera._transfer(address,address,uint256) (#622-660):
External calls:
- swapTokens(contractTokenBalance) (#640)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#689-695)
- buyBackTokens(balance.div(100)) (#648)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#707-712)
External calls sending eth:
- swapTokens(contractTokenBalance) (#640)
- recipient.transfer(amount) (#939)
- buyBackTokens(balance.div(100)) (#648)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#707-712)
State variables written after the call(s):
- _tokenTransfer(from,to,amount,takeFee) (#659)
- _liquidityFee = _previousLiquidityFee (#865)
- _liquidityFee = 0 (#860)
- _tokenTransfer(from,to,amount,takeFee) (#659)
- _rOwned[address(this)] = _rOwned[address(this)].add(rLiquidity) (#836)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#752)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#761)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#772)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#782)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#753)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#763)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#773)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#784)
- _tokenTransfer(from,to,amount,takeFee) (#659)
- _rTotal = _rTotal.sub(rFee) (#791)
- _tokenTransfer(from,to,amount,takeFee) (#659)
- _tOwned[address(this)] = _tOwned[address(this)].add(tLiquidity) (#838)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#771)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#781)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#762)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#783)
- buyBackTokens(balance.div(100)) (#648)
- inAlteraRefuel = true (#476)
- inAlteraRefuel = false (#478)
Apply the check-effects-interactions pattern.
Additional information: link
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
Altera.swapTokens(uint256) (#662-671) performs a multiplication on the result of a division:
-transferToAddressETH(marketingAddress,transferredBalance.div(_liquidityFee).mul(marketingDivisor)) (#669)
Consider ordering multiplication before division.
Additional information: link
Altera.addLiquidity(uint256,uint256) (#717-730) ignores return value by uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#722-729)
Ensure that all the return values of the function calls are used.
Additional information: link
Altera._approve(address,address,uint256).owner (#614) shadows:
- Ownable.owner() (#157-159) (function)
Rename the local variables that shadow another component.
Additional information: link
Altera.setBuybackUpperLimit(uint256) (#920-922) should emit an event for:
- buyBackUpperLimit = buyBackLimit * 10 ** 17 (#921)
Emit an event for critical parameter changes.
Additional information: link
Altera.setMarketingAddress(address)._marketingAddress (#924) lacks a zero-check on :
- marketingAddress = address(_marketingAddress) (#925)
Check that the address is not zero.
Additional information: link
Reentrancy in Altera.transferFrom(address,address,uint256) (#532-536):
External calls:
- _transfer(sender,recipient,amount) (#533)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#707-712)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#689-695)
External calls sending eth:
- _transfer(sender,recipient,amount) (#533)
- recipient.transfer(amount) (#939)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#707-712)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#534)
- _allowances[owner][spender] = amount (#618)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in Altera.transferFrom(address,address,uint256) (#532-536):
External calls:
- _transfer(sender,recipient,amount) (#533)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#707-712)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#689-695)
External calls sending eth:
- _transfer(sender,recipient,amount) (#533)
- recipient.transfer(amount) (#939)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#707-712)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#619)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#534)
Apply the check-effects-interactions pattern.
Additional information: link
Ownable.unlock() (#192-197) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(block.timestamp > _lockTime,Contract is locked until 7 days) (#194)
Avoid relying on block.timestamp.
Additional information: link
Address._functionCallWithValue(address,bytes,uint256,string) (#124-141) uses assembly
- INLINE ASM (#133-136)
Do not use evm assembly.
Additional information: link
SafeMath.mod(uint256,uint256,string) (#81-84) is never used and should be removed
Remove unused functions.
Additional information: link
Altera._previousLiquidityFee (#440) is set pre-construction with a non-constant function or state variable:
- _liquidityFee
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
solc-0.8.7 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in Address._functionCallWithValue(address,bytes,uint256,string) (#124-141):
- (success,returndata) = target.call{value: weiValue}(data) (#127)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Variable Altera.AlteraRefuelEnabled (#452) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Redundant expression "this (#13)" inContext (#7-16)
Remove redundant statements if they congest code but offer no value.
Additional information: link
Reentrancy in Altera.transferFrom(address,address,uint256) (#532-536):
External calls:
- _transfer(sender,recipient,amount) (#533)
- recipient.transfer(amount) (#939)
External calls sending eth:
- _transfer(sender,recipient,amount) (#533)
- recipient.transfer(amount) (#939)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#707-712)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#534)
- _allowances[owner][spender] = amount (#618)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#619)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#534)
Apply the check-effects-interactions pattern.
Additional information: link
Variable Altera._getRValues(uint256,uint256,uint256,uint256).rTransferAmount (#812) is too similar to Altera._transferFromExcluded(address,address,uint256).tTransferAmount (#770)
Prevent variables from having similar names.
Additional information: link
Altera.slitherConstructorVariables() (#411-949) uses literals with too many digits:
- _tTotal = 5000000 * 10 ** 9 (#427)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
Altera.deadAddress (#416) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
setBuyBackEnabled(bool) should be declared external:
- Altera.setBuyBackEnabled(bool) (#933-937)
Use the external attribute for functions never called from the contract.
Additional information: link
Average 30d PancakeSwap volume is less than $100. Token is either dead or inactive.
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute number of swaps.
Young tokens have high risks of price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinMarketCap rank
Twitter account link seems to be invalid
Unable to find Youtube account
Unable to find Discord account