AlvareNet is creating an ecosystem of Dapps making it easier and more secure to navigate in the crypto sphere. The primary product will be the creation of a P2P platform to secure payments of goods and services using crypto as payment, since it is something that is missing in the cryptocurrency space right now.
AlvareNet.emergencyWithdraw(uint256,address) (contracts/token.sol#816-820) ignores return value by token.transfer(msg.sender,_amount) (contracts/token.sol#819)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.
Additional information: link
Unable to verify that contract auditor is trusted: Certik, Quantstamp, Hacken, Solidity, Paladinsec, Openzeppelin, Verichains
Reentrancy in AlvareNet._transfer(address,address,uint256) (contracts/token.sol#605-659):
External calls:
- (newTaxFee,newOtherFee,newTakeFee) = IProxyContract(proxycontract).preTransfer(from,to,amount,takeFee) (contracts/token.sol#634)
- IProxyContract(proxycontract).postTransfer(from,to,amount,takeFee) (contracts/token.sol#653)
State variables written after the call(s):
- _inTransfer = false (contracts/token.sol#655)
Apply the check-effects-interactions pattern.
Additional information: link
AccessControlEnumerable._setupRole(bytes32,address) (@openzeppelin/contracts/access/AccessControlEnumerable.sol#75-78) ignores return value by _roleMembers[role].add(account) (@openzeppelin/contracts/access/AccessControlEnumerable.sol#77)
Ensure that all the return values of the function calls are used.
Additional information: link
AlvareNet.setproxyContract(address).contractaddress (contracts/token.sol#247) lacks a zero-check on :
- proxycontract = contractaddress (contracts/token.sol#250)
Check that the address is not zero.
Additional information: link
Reentrancy in AlvareNet.transferFrom(address,address,uint256) (contracts/token.sol#173-188):
External calls:
- _transfer(sender,recipient,amount) (contracts/token.sol#178)
- (newTaxFee,newOtherFee,newTakeFee) = IProxyContract(proxycontract).preTransfer(from,to,amount,takeFee) (contracts/token.sol#634)
- IProxyContract(proxycontract).postTransfer(from,to,amount,takeFee) (contracts/token.sol#653)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (contracts/token.sol#179-186)
- _allowances[owner][spender] = amount (contracts/token.sol#591)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in AlvareNet.transferFrom(address,address,uint256) (contracts/token.sol#173-188):
External calls:
- _transfer(sender,recipient,amount) (contracts/token.sol#178)
- (newTaxFee,newOtherFee,newTakeFee) = IProxyContract(proxycontract).preTransfer(from,to,amount,takeFee) (contracts/token.sol#634)
- IProxyContract(proxycontract).postTransfer(from,to,amount,takeFee) (contracts/token.sol#653)
Event emitted after the call(s):
- Approval(owner,spender,amount) (contracts/token.sol#592)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (contracts/token.sol#179-186)
Apply the check-effects-interactions pattern.
Additional information: link
EnumerableSet.values(EnumerableSet.UintSet) (@openzeppelin/contracts/utils/structs/EnumerableSet.sol#346-355) uses assembly
- INLINE ASM (@openzeppelin/contracts/utils/structs/EnumerableSet.sol#350-352)
Do not use evm assembly.
Additional information: link
Different versions of Solidity is used:
- Version used: ['0.8.4', '^0.8.0']
- ^0.8.0 (@openzeppelin/contracts/access/AccessControl.sol#3)
- ^0.8.0 (@openzeppelin/contracts/access/AccessControlEnumerable.sol#3)
- ^0.8.0 (@openzeppelin/contracts/access/IAccessControl.sol#3)
- ^0.8.0 (@openzeppelin/contracts/access/IAccessControlEnumerable.sol#3)
- ^0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/Address.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/Context.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/Strings.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/introspection/ERC165.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/introspection/IERC165.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/math/SafeMath.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/structs/EnumerableSet.sol#3)
- ^0.8.0 (contracts/interfaces/proxyinterface.sol#3)
- 0.8.4 (contracts/token.sol#3)
Use one Solidity version.
Additional information: link
Strings.toString(uint256) (@openzeppelin/contracts/utils/Strings.sol#14-34) is never used and should be removed
Remove unused functions.
Additional information: link
AlvareNet._previousOtherFee (contracts/token.sol#55) is set pre-construction with a non-constant function or state variable:
- otherFee
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
solc-0.8.4 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in Address.functionDelegateCall(address,bytes,string) (@openzeppelin/contracts/utils/Address.sol#178-187):
- (success,returndata) = target.delegatecall(data) (@openzeppelin/contracts/utils/Address.sol#185)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Constant AlvareNet.maxFeeTotal (contracts/token.sol#57) is not in UPPER_CASE_WITH_UNDERSCORES
Follow the Solidity naming convention.
Additional information: link
Variable AlvareNet.reflectionFromToken(uint256,bool).rTransferAmount (contracts/token.sol#301) is too similar to AlvareNet._transferStandard(address,address,uint256).tTransferAmount (contracts/token.sol#710)
Prevent variables from having similar names.
Additional information: link
AlvareNet.slitherConstructorConstantVariables() (contracts/token.sol#12-822) uses literals with too many digits:
- _tTotal = 1000000000000000 * 10 ** 9 (contracts/token.sol#38)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
emergencyWithdraw(uint256,address) should be declared external:
- AlvareNet.emergencyWithdraw(uint256,address) (contracts/token.sol#816-820)
Use the external attribute for functions never called from the contract.
Additional information: link
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute volume.
Unable to find PancakeSwap trading pair to compute number of swaps.
Young tokens have high risks of price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Token has no active CoinMarketCap listing / rank
Token has relatively low CoinGecko rank
Twitter account link seems to be invalid
Unable to find Blog account (Reddit or Medium)
Unable to find Youtube account
Unable to find Discord account