AMZE is a utility token for Tourism Sector. AMZE can be utilized in the ecosystem that has been developed with the Amaze World (Upcoming Tourist Attraction cum Facility Centers), Amaze Platform (Crypto based Travel Booking Platform), and associated partners desk worldwide; where users can avail special deals on products and/or services by utilizing AMZE token.
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
AMZEToken._symbol (contracts/AMZEToken.sol#22) shadows:
- ERC20._symbol (contracts/token/ERC20/ERC20.sol#42)
Remove the state variable shadowing.
Additional information: link
AMZEToken.checkTransferLimit() (contracts/AMZEToken.sol#220-231) uses a dangerous strict equality:
- lastTXBlock[_msgSender()] == block.number (contracts/AMZEToken.sol#222)
Don't use strict equality to determine if an account has enough Ether or tokens.
Additional information: link
AMZEToken.releaseLockedTokens(address) (contracts/AMZEToken.sol#245-256) performs a multiplication on the result of a division:
-steps = (timeDiff / uint256(timeLocks[account][i].timeInterval)) (contracts/AMZEToken.sol#248)
-unlockableAmount = (uint256(timeLocks[account][i].tokenRelease) * steps) (contracts/AMZEToken.sol#249)
Consider ordering multiplication before division.
Additional information: link
AMZEToken.releaseLockedTokens(address) (contracts/AMZEToken.sol#245-256) uses timestamp for comparisons
Dangerous comparisons:
- unlockableAmount >= timeLocks[account][i].totalAmount (contracts/AMZEToken.sol#250)
Avoid relying on block.timestamp.
Additional information: link
AMZEToken.checkWhitelist() (contracts/AMZEToken.sol#233-243) compares to a boolean constant:
-isWhitelistEnabled == true (contracts/AMZEToken.sol#234)
Remove the equality to the boolean constant.
Additional information: link
Different versions of Solidity is used:
- Version used: ['0.8.6', '^0.8.0']
- 0.8.6 (contracts/AMZEToken.sol#3)
- 0.8.6 (contracts/access/AccessControl.sol#3)
- ^0.8.0 (contracts/access/IAccessControl.sol#3)
- 0.8.6 (contracts/access/Ownable.sol#3)
- 0.8.6 (contracts/security/Pausable.sol#3)
- 0.8.6 (contracts/token/ERC20/ERC20.sol#3)
- 0.8.6 (contracts/token/ERC20/IERC20.sol#3)
- 0.8.6 (contracts/token/ERC20/extensions/ERC20Snapshot.sol#3)
- 0.8.6 (contracts/token/ERC20/extensions/IERC20Metadata.sol#3)
- 0.8.6 (contracts/utils/Arrays.sol#3)
- 0.8.6 (contracts/utils/Context.sol#3)
- 0.8.6 (contracts/utils/Counters.sol#3)
- 0.8.6 (contracts/utils/Strings.sol#3)
- 0.8.6 (contracts/utils/introspection/ERC165.sol#3)
- 0.8.6 (contracts/utils/introspection/IERC165.sol#3)
- 0.8.6 (contracts/utils/math/Math.sol#3)
Use one Solidity version.
Additional information: link
AMZEToken.removeWhiteList(address[]) (contracts/AMZEToken.sol#163-173) has costly operations inside a loop:
- whiteListCount -- (contracts/AMZEToken.sol#169)
Use a local variable to hold the loop computation result.
Additional information: link
Strings.toString(uint256) (contracts/utils/Strings.sol#14-34) is never used and should be removed
Remove unused functions.
Additional information: link
AMZEToken._initialSupply (contracts/AMZEToken.sol#20) is set pre-construction with a non-constant function or state variable:
- 54000000 * (10 ** uint256(decimals()))
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
solc-0.8.6 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Parameter AMZEToken.transferFrom(address,address,uint256)._value (contracts/AMZEToken.sol#211) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
AMZEToken.slitherConstructorVariables() (contracts/AMZEToken.sol#11-271) uses literals with too many digits:
- _initialSupply = 54000000 * (10 ** uint256(decimals())) (contracts/AMZEToken.sol#20)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
AMZEToken._symbol (contracts/AMZEToken.sol#22) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
totalSupplyAt(uint256) should be declared external:
- ERC20Snapshot.totalSupplyAt(uint256) (contracts/token/ERC20/extensions/ERC20Snapshot.sol#114-118)
Use the external attribute for functions never called from the contract.
Additional information: link
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinGecko rank
Twitter account link seems to be invalid
Unable to find Discord account