ANTIJEET Token Logo

$ANTIJEET [ANTIJEET] Token

About $ANTIJEET

Listings

Token 19 months
white paper

Antijeet has been designed to try to fix the phenomena of the pump and dumps that we see in 99.99% of cryptocurrency projects due to excessive overselling from investors and the overselling of both presale and private tokens. Both whale and small investors alike are protected by the antijeet mechanism (max sell limits) hardcoded into the smart contract. The moon mission for antijeet is in the code.

Social

Laser Scorebeta Last Audit: 3 May 2022

report
Token has too many issues. Scam probability is high.

Anti-Scam

Links


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

ANTIJEET.contractSwap(uint256) (#639-689) sends eth to arbitrary user
Dangerous calls:
- dexRouter.addLiquidityETH{value: liquidityBalance}(address(this),toLiquify,0,0,DEAD,block.timestamp) (#670-677)
- (success,None) = _taxWallets.marketing.call{gas: 35000,value: marketingBalance}() (#687)
Ensure that an arbitrary user cannot withdraw unauthorized funds.

Additional information: link

Reentrancy in ANTIJEET._transfer(address,address,uint256) (#550-637):
External calls:
- contractSwap(contractTokenBalance) (#612)
- dexRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(swapAmt,0,path,address(this),block.timestamp) (#658-664)
- dexRouter.addLiquidityETH{value: liquidityBalance}(address(this),toLiquify,0,0,DEAD,block.timestamp) (#670-677)
- (success,None) = _taxWallets.marketing.call{gas: 35000,value: marketingBalance}() (#687)
- dexRouter.swapExactETHForTokensSupportingFeeOnTransferTokens{value: buybackAmount}(0,path,DEAD,block.timestamp) (#624-630)
- _finalizeTransfer(from,to,amount,takeFee,buy,sell,other) (#636)
- antiSnipe.checkUser(from,to,amount) (#740-744)
External calls sending eth:
- contractSwap(contractTokenBalance) (#612)
- dexRouter.addLiquidityETH{value: liquidityBalance}(address(this),toLiquify,0,0,DEAD,block.timestamp) (#670-677)
- (success,None) = _taxWallets.marketing.call{gas: 35000,value: marketingBalance}() (#687)
- dexRouter.swapExactETHForTokensSupportingFeeOnTransferTokens{value: buybackAmount}(0,path,DEAD,block.timestamp) (#624-630)
State variables written after the call(s):
- _finalizeTransfer(from,to,amount,takeFee,buy,sell,other) (#636)
- _liquidityHolders[from] = true (#694)
- _finalizeTransfer(from,to,amount,takeFee,buy,sell,other) (#636)
- _tOwned[address(this)] += feeAmount (#771)
- _tOwned[from] -= amount (#751)
- _tOwned[to] += amountReceived (#753)
- _finalizeTransfer(from,to,amount,takeFee,buy,sell,other) (#636)
- contractSwapEnabled = true (#699)
Apply the check-effects-interactions pattern.

Additional information: link


Contract ownership is not renounced (belongs to a wallet)


Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.

Contract ticker ($ANTIJEET) contains non-alphanumeric characters.
Not a direct threat, but may indicate unreliable intentions of developer. Non-alphanumeric chars (,.;!#*&") are extremely rare among low risk tokens.

ANTIJEET.contractSwap(uint256) (#639-689) performs a multiplication on the result of a division:
-toLiquify = ((contractTokenBalance * ratios.liquidity) / ratios.totalSwap) / 2 (#649)
-liquidityBalance = (amtBalance * toLiquify) / swapAmt (#667)
Consider ordering multiplication before division.

Additional information: link

Reentrancy in ANTIJEET.enableTrading() (#704-715):
External calls:
- antiSnipe.setLaunch(lpPair,uint32(block.number),uint64(block.timestamp),_decimals) (#710)
State variables written after the call(s):
- tradingEnabled = true (#711)
Reentrancy in ANTIJEET.transferOwner(address) (#285-299):
External calls:
- _finalizeTransfer(_owner,newOwner,balanceOf(_owner),false,false,false,true) (#292)
- antiSnipe.checkUser(from,to,amount) (#740-744)
State variables written after the call(s):
- _owner = newOwner (#296)
Apply the check-effects-interactions pattern.

Additional information: link

ANTIJEET._finalizeTransfer(address,address,uint256,bool,bool,bool,bool).check (#740) is a local variable never initialized
ANTIJEET._finalizeTransfer(address,address,uint256,bool,bool,bool,bool).checked (#739) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.

Additional information: link

ANTIJEET.contractSwap(uint256) (#639-689) ignores return value by dexRouter.addLiquidityETH{value: liquidityBalance}(address(this),toLiquify,0,0,DEAD,block.timestamp) (#670-677)
ANTIJEET._finalizeTransfer(address,address,uint256,bool,bool,bool,bool) (#730-757) ignores return value by antiSnipe.checkUser(from,to,amount) (#740-744)
Ensure that all the return values of the function calls are used.

Additional information: link

ANTIJEET.setMaxTxPercent(uint256,uint256) (#450-453) should emit an event for:
- _maxTxAmount = (_tTotal * percent) / divisor (#452)
ANTIJEET.setMaxWalletSize(uint256,uint256) (#455-458) should emit an event for:
- _maxWalletSize = (_tTotal * percent) / divisor (#457)
ANTIJEET.setSwapSettings(uint256,uint256,uint256,uint256) (#468-472) should emit an event for:
- swapThreshold = (_tTotal * thresholdPercent) / thresholdDivisor (#469)
- swapAmount = (_tTotal * amountPercent) / amountDivisor (#470)
ANTIJEET.setPriceImpactSwapAmount(uint256) (#474-477) should emit an event for:
- piSwapPercent = priceImpactSwapPercent (#476)
ANTIJEET.setBuybackSettings(uint256,uint256,uint256,uint256) (#489-492) should emit an event for:
- buybackThreshold = thresholdValue * 10 ** thresholdMultiplier (#490)
- buybackAmount = amountValue * 10 ** amountMultiplier (#491)
ANTIJEET.setDailySellPercent(uint256) (#498-501) should emit an event for:
- dailySellPercent = percentInHundreds (#500)
ANTIJEET.setDailySellCooldown(uint256) (#503-506) should emit an event for:
- dailySellCooldown = timeInSeconds (#505)
Emit an event for critical parameter changes.

Additional information: link

ANTIJEET._finalizeTransfer(address,address,uint256,bool,bool,bool,bool) (#730-757) has external calls inside a loop: antiSnipe.checkUser(from,to,amount) (#740-744)
Favor pull over push strategy for external calls.

Additional information: link

Variable 'ANTIJEET._finalizeTransfer(address,address,uint256,bool,bool,bool,bool).check (#740)' in ANTIJEET._finalizeTransfer(address,address,uint256,bool,bool,bool,bool) (#730-757) potentially used before declaration: checked = check (#741)
Move all variable declarations prior to any usage of the variable, and ensure that reaching a variable declaration does not depend on some conditional if it is used unconditionally.

Additional information: link

Reentrancy in ANTIJEET._finalizeTransfer(address,address,uint256,bool,bool,bool,bool) (#730-757):
External calls:
- antiSnipe.checkUser(from,to,amount) (#740-744)
State variables written after the call(s):
- _tOwned[from] -= amount (#751)
- _tOwned[to] += amountReceived (#753)
- amountReceived = takeTaxes(from,buy,sell,amount) (#752)
- _tOwned[address(this)] += feeAmount (#771)
Reentrancy in ANTIJEET.constructor() (#246-276):
External calls:
- lpPair = IFactoryV2(dexRouter.factory()).createPair(dexRouter.WETH(),address(this)) (#266)
State variables written after the call(s):
- _approve(_owner,address(dexRouter),type()(uint256).max) (#269)
- _allowances[sender][spender] = amount (#336)
- _approve(address(this),address(dexRouter),type()(uint256).max) (#270)
- _allowances[sender][spender] = amount (#336)
- _isExcludedFromFees[_owner] = true (#272)
- _isExcludedFromFees[address(this)] = true (#273)
- _isExcludedFromFees[DEAD] = true (#274)
- _liquidityHolders[_owner] = true (#275)
- lpPairs[lpPair] = true (#267)
Reentrancy in ANTIJEET.enableTrading() (#704-715):
External calls:
- antiSnipe.setLaunch(lpPair,uint32(block.number),uint64(block.timestamp),_decimals) (#710)
State variables written after the call(s):
- allowedPresaleExclusion = false (#712)
- swapAmount = (balanceOf(lpPair) * 25) / 10000 (#714)
- swapThreshold = (balanceOf(lpPair) * 10) / 10000 (#713)
Reentrancy in ANTIJEET.setNewRouter(address) (#353-364):
External calls:
- lpPair = IFactoryV2(_newRouter.factory()).createPair(address(this),_newRouter.WETH()) (#357)
State variables written after the call(s):
- _approve(address(this),address(dexRouter),type()(uint256).max) (#363)
- _allowances[sender][spender] = amount (#336)
- dexRouter = _newRouter (#362)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in ANTIJEET._finalizeTransfer(address,address,uint256,bool,bool,bool,bool) (#730-757):
External calls:
- antiSnipe.checkUser(from,to,amount) (#740-744)
Event emitted after the call(s):
- Transfer(from,address(this),feeAmount) (#772)
- amountReceived = takeTaxes(from,buy,sell,amount) (#752)
- Transfer(from,to,amountReceived) (#755)
Reentrancy in ANTIJEET._transfer(address,address,uint256) (#550-637):
External calls:
- contractSwap(contractTokenBalance) (#612)
- dexRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(swapAmt,0,path,address(this),block.timestamp) (#658-664)
- dexRouter.addLiquidityETH{value: liquidityBalance}(address(this),toLiquify,0,0,DEAD,block.timestamp) (#670-677)
- (success,None) = _taxWallets.marketing.call{gas: 35000,value: marketingBalance}() (#687)
- dexRouter.swapExactETHForTokensSupportingFeeOnTransferTokens{value: buybackAmount}(0,path,DEAD,block.timestamp) (#624-630)
- _finalizeTransfer(from,to,amount,takeFee,buy,sell,other) (#636)
- antiSnipe.checkUser(from,to,amount) (#740-744)
External calls sending eth:
- contractSwap(contractTokenBalance) (#612)
- dexRouter.addLiquidityETH{value: liquidityBalance}(address(this),toLiquify,0,0,DEAD,block.timestamp) (#670-677)
- (success,None) = _taxWallets.marketing.call{gas: 35000,value: marketingBalance}() (#687)
- dexRouter.swapExactETHForTokensSupportingFeeOnTransferTokens{value: buybackAmount}(0,path,DEAD,block.timestamp) (#624-630)
Event emitted after the call(s):
- ContractSwapEnabledUpdated(true) (#700)
- _finalizeTransfer(from,to,amount,takeFee,buy,sell,other) (#636)
- Transfer(from,address(this),feeAmount) (#772)
- _finalizeTransfer(from,to,amount,takeFee,buy,sell,other) (#636)
- Transfer(from,to,amountReceived) (#755)
- _finalizeTransfer(from,to,amount,takeFee,buy,sell,other) (#636)
Reentrancy in ANTIJEET.constructor() (#246-276):
External calls:
- lpPair = IFactoryV2(dexRouter.factory()).createPair(dexRouter.WETH(),address(this)) (#266)
Event emitted after the call(s):
- Approval(sender,spender,amount) (#337)
- _approve(_owner,address(dexRouter),type()(uint256).max) (#269)
- Approval(sender,spender,amount) (#337)
- _approve(address(this),address(dexRouter),type()(uint256).max) (#270)
Reentrancy in ANTIJEET.contractSwap(uint256) (#639-689):
External calls:
- dexRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(swapAmt,0,path,address(this),block.timestamp) (#658-664)
- dexRouter.addLiquidityETH{value: liquidityBalance}(address(this),toLiquify,0,0,DEAD,block.timestamp) (#670-677)
External calls sending eth:
- dexRouter.addLiquidityETH{value: liquidityBalance}(address(this),toLiquify,0,0,DEAD,block.timestamp) (#670-677)
Event emitted after the call(s):
- AutoLiquify(liquidityBalance,toLiquify) (#678)
Reentrancy in ANTIJEET.setNewRouter(address) (#353-364):
External calls:
- lpPair = IFactoryV2(_newRouter.factory()).createPair(address(this),_newRouter.WETH()) (#357)
Event emitted after the call(s):
- Approval(sender,spender,amount) (#337)
- _approve(address(this),address(dexRouter),type()(uint256).max) (#363)
Reentrancy in ANTIJEET.transferOwner(address) (#285-299):
External calls:
- _finalizeTransfer(_owner,newOwner,balanceOf(_owner),false,false,false,true) (#292)
- antiSnipe.checkUser(from,to,amount) (#740-744)
Event emitted after the call(s):
- OwnershipTransferred(oldOwner,newOwner) (#297)
Apply the check-effects-interactions pattern.

Additional information: link

ANTIJEET.setLpPair(address,bool) (#366-378) uses timestamp for comparisons
Dangerous comparisons:
- timeSinceLastPair != 0 (#371)
- require(bool,string)(block.timestamp - timeSinceLastPair > 259200,3 Day cooldown.!) (#372)
ANTIJEET.getSecondsToNextSellReset(address) (#513-520) uses timestamp for comparisons
Dangerous comparisons:
- time > block.timestamp (#515)
ANTIJEET._transfer(address,address,uint256) (#550-637) uses timestamp for comparisons
Dangerous comparisons:
- user[from].sellStamp + dailySellCooldown > block.timestamp (#576)
Avoid relying on block.timestamp.

Additional information: link

ANTIJEET.setLpPair(address,bool) (#366-378) compares to a boolean constant:
-enabled == false (#367)
Remove the equality to the boolean constant.

Additional information: link

ANTIJEET._checkLiquidityAdd(address,address) (#691-702) has costly operations inside a loop:
- _hasLiqBeenAdded = true (#695)
ANTIJEET._checkLiquidityAdd(address,address) (#691-702) has costly operations inside a loop:
- antiSnipe = AntiSnipe(address(this)) (#697)
ANTIJEET._checkLiquidityAdd(address,address) (#691-702) has costly operations inside a loop:
- contractSwapEnabled = true (#699)
Use a local variable to hold the loop computation result.

Additional information: link

Pragma version>=0.6.0<0.9.0 (#2) is too complex
solc-0.8.13 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in ANTIJEET.contractSwap(uint256) (#639-689):
- (success,None) = _taxWallets.marketing.call{gas: 35000,value: marketingBalance}() (#687)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Function IRouter01.WETH() (#64) is not in mixedCase
Parameter ANTIJEET.setProtectionSettings(bool,bool)._antiSnipe (#422) is not in mixedCase
Parameter ANTIJEET.setProtectionSettings(bool,bool)._antiBlock (#422) is not in mixedCase
Constant ANTIJEET.startingSupply (#149) is not in UPPER_CASE_WITH_UNDERSCORES
Constant ANTIJEET._name (#151) is not in UPPER_CASE_WITH_UNDERSCORES
Constant ANTIJEET._symbol (#152) is not in UPPER_CASE_WITH_UNDERSCORES
Constant ANTIJEET._decimals (#153) is not in UPPER_CASE_WITH_UNDERSCORES
Constant ANTIJEET._tTotal (#155) is not in UPPER_CASE_WITH_UNDERSCORES
Variable ANTIJEET._taxRates (#170-174) is not in mixedCase
Variable ANTIJEET._ratios (#176-181) is not in mixedCase
Constant ANTIJEET.maxBuyTaxes (#183) is not in UPPER_CASE_WITH_UNDERSCORES
Constant ANTIJEET.maxSellTaxes (#184) is not in UPPER_CASE_WITH_UNDERSCORES
Constant ANTIJEET.maxTransferTaxes (#185) is not in UPPER_CASE_WITH_UNDERSCORES
Constant ANTIJEET.maxRoundtripFee (#186) is not in UPPER_CASE_WITH_UNDERSCORES
Constant ANTIJEET.masterTaxDivisor (#187) is not in UPPER_CASE_WITH_UNDERSCORES
Variable ANTIJEET._taxWallets (#197-199) is not in mixedCase
Variable ANTIJEET._hasLiqBeenAdded (#212) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

Variable IRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#76) is too similar to IRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#77)
Prevent variables from having similar names.

Additional information: link

ANTIJEET.slitherConstructorConstantVariables() (#132-777) uses literals with too many digits:
- DEAD = 0x000000000000000000000000000000000000dEaD (#191)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

transfer(address,uint256) should be declared external:
- ANTIJEET.transfer(address,uint256) (#322-325)
approve(address,uint256) should be declared external:
- ANTIJEET.approve(address,uint256) (#327-330)
approveContractContingency() should be declared external:
- ANTIJEET.approveContractContingency() (#340-343)
setNewRouter(address) should be declared external:
- ANTIJEET.setNewRouter(address) (#353-364)
isBlacklisted(address) should be declared external:
- ANTIJEET.isBlacklisted(address) (#414-416)
getMaxTX() should be declared external:
- ANTIJEET.getMaxTX() (#460-462)
getMaxWallet() should be declared external:
- ANTIJEET.getMaxWallet() (#464-466)
enableTrading() should be declared external:
- ANTIJEET.enableTrading() (#704-715)
Use the external attribute for functions never called from the contract.

Additional information: link

Holders:


Token seems to be untradeable: there is no PancakeSwap trading pair and no trading volumes. Ignore for presale.


Number of Binance Smart Chain (BSC) token holders is less than 100. Token is either dead or inactive. Ignore for presale.


Telegram account link seems to be invalid


Twitter account has few posts


Unable to find Youtube account


Unable to find Discord account


BscScan page for the token does not contain additional info: website, socials, description, etc.

Additional information: link


Unable to find token contract audit


Unable to verify that token and website are owned by the same team (no listings + unable to find contract on website)


Unable to find token on CoinGecko

Additional information: link


Unable to find token on CoinMarketCap

Additional information: link


Unable to find token on CoinHunt

Additional information: link


Unable to find code repository for the project


Unable to verify token contract address on the website


Unable to find audit link on the website


Young tokens have high risks of scam / price dump / death


Young tokens have high risks of scam / price dump / death


Young tokens have high risks of scam / price dump / death


Token has no active CoinGecko listing / rank


Token has no active CoinMarketCap listing / rank

Price for $ANTIJEET

News for $ANTIJEET