Blow up is here to blow you up!
BlowUP is the first rebase token to include USDT as a rewards Hold $BLOW and receive $USDT directly to your BEP-20 wallet as a reward for holding.
Rebase included, but what is Rebase?
Rebase is an increase or decrease in the total supply of a given token across all holding pools and all wallets. This is done in order to adjust the token price, without affecting the value of anyone's share of coins. This can be beneficial as the chart will always look healthy regardless of dips and we can be on the top gainer's parts of websites due to the illusion of a rise in price floor so is a brilliant marketing tool in itself.
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
BLOWUP.swapBack() (#721-769) sends eth to arbitrary user
Dangerous calls:
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#752)
- (tmpSuccess,None) = address(devFeeReceiver).call{gas: 30000,value: amountBNBDev}() (#753)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in BLOWUP._transferFrom(address,address,uint256) (#575-624):
External calls:
- swapBack() (#603)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#734-740)
- distributor.deposit{value: amountBNBReflection}() (#751)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#752)
- (tmpSuccess,None) = address(devFeeReceiver).call{gas: 30000,value: amountBNBDev}() (#753)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#759-766)
External calls sending eth:
- swapBack() (#603)
- distributor.deposit{value: amountBNBReflection}() (#751)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#752)
- (tmpSuccess,None) = address(devFeeReceiver).call{gas: 30000,value: amountBNBDev}() (#753)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#759-766)
State variables written after the call(s):
- _rBalance[sender] = _rBalance[sender].sub(rAmount,Insufficient Balance) (#606)
- _rBalance[recipient] = _rBalance[recipient].add(amountReceived) (#609)
- amountReceived = takeFee(sender,rAmount,(recipient == pair)) (#608)
- _rBalance[address(this)] = _rBalance[address(this)].add(feeAmount) (#658)
Apply the check-effects-interactions pattern.
Additional information: link
DividendDistributor.distributeDividend(address) (#334-345) ignores return value by RWRD.transfer(shareholder,amount) (#340)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.
Additional information: link
Too many vulnerabilities (Unchecked transfer, Reentrancy vulnerability, etc.). High risk of a scam. DYOR & manual audit are advised.
BLOWUP.swapBack().tmpSuccess (#752) is written in both
(tmpSuccess,None) = address(devFeeReceiver).call{gas: 30000,value: amountBNBDev}() (#753)
tmpSuccess = false (#756)
Fix or remove the writes.
Additional information: link
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Contract ticker ($BLOW) contains non-alphanumeric characters.
Not a direct threat, but may indicate unreliable intentions of developer. Non-alphanumeric chars (,.;!#*&") are extremely rare among low risk tokens.
rescueToken(address,uint256) should be declared external:
- BLOWUP.rescueToken(address,uint256) (#866-868)
Use the external attribute for functions never called from the contract.
Additional information: link
BLOWUP.slitherConstructorVariables() (#378-956) performs a multiplication on the result of a division:
-_maxWalletToken = rSupply.div(100).mul(2) (#458)
Consider ordering multiplication before division.
Additional information: link
Reentrancy in DividendDistributor.setShare(address,uint256) (#267-281):
External calls:
- distributeDividend(shareholder) (#269)
- RWRD.transfer(shareholder,amount) (#340)
State variables written after the call(s):
- shares[shareholder].amount = amount (#279)
- shares[shareholder].totalExcluded = getCumulativeDividends(shares[shareholder].amount) (#280)
Apply the check-effects-interactions pattern.
Additional information: link
BLOWUP.manage_blacklist(address[],bool).i (#710) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.
Additional information: link
BLOWUP.swapBack() (#721-769) ignores return value by router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#759-766)
Ensure that all the return values of the function calls are used.
Additional information: link
BLOWUP.setMaster(address) (#836-838) should emit an event for:
- master = _master (#837)
Emit an event for critical parameter changes.
Additional information: link
BLOWUP.setMaxTxPercent_base1000(uint256) (#898-900) should emit an event for:
- _maxTxAmount = rSupply.div(1000).mul(maxTXPercentage_base1000) (#899)
Emit an event for critical parameter changes.
Additional information: link
BLOWUP.setMaster(address)._master (#836) lacks a zero-check on :
- master = _master (#837)
Check that the address is not zero.
Additional information: link
BLOWUP.multiTransfer_fixed(address,address[],uint256) (#932-951) has external calls inside a loop: distributor.setShare(addresses[i],balanceOf(addresses[i])) (#943)
Favor pull over push strategy for external calls.
Additional information: link
Reentrancy in DividendDistributor.setShare(address,uint256) (#267-281):
External calls:
- distributeDividend(shareholder) (#269)
- RWRD.transfer(shareholder,amount) (#340)
State variables written after the call(s):
- addShareholder(shareholder) (#273)
- shareholderIndexes[shareholder] = shareholders.length (#367)
- removeShareholder(shareholder) (#275)
- shareholderIndexes[shareholders[shareholders.length - 1]] = shareholderIndexes[shareholder] (#373)
- addShareholder(shareholder) (#273)
- shareholders.push(shareholder) (#368)
- removeShareholder(shareholder) (#275)
- shareholders[shareholderIndexes[shareholder]] = shareholders[shareholders.length - 1] (#372)
- shareholders.pop() (#374)
- totalShares = totalShares.sub(shares[shareholder].amount).add(amount) (#278)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in BLOWUP.swapBack() (#721-769):
External calls:
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#734-740)
- distributor.deposit{value: amountBNBReflection}() (#751)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#752)
- (tmpSuccess,None) = address(devFeeReceiver).call{gas: 30000,value: amountBNBDev}() (#753)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#759-766)
External calls sending eth:
- distributor.deposit{value: amountBNBReflection}() (#751)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#752)
- (tmpSuccess,None) = address(devFeeReceiver).call{gas: 30000,value: amountBNBDev}() (#753)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#759-766)
Event emitted after the call(s):
- AutoLiquify(amountBNBLiquidity,amountToLiquify.div(rate)) (#767)
Apply the check-effects-interactions pattern.
Additional information: link
BLOWUP._transferFrom(address,address,uint256) (#575-624) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(cooldownTimer[recipient] < block.timestamp,buy Cooldown exists) (#591)
Avoid relying on block.timestamp.
Additional information: link
DividendDistributor.process(uint256) (#303-327) has costly operations inside a loop:
- currentIndex ++ (#324)
Use a local variable to hold the loop computation result.
Additional information: link
SafeMathInt.sub(int256,int256) (#71-75) is never used and should be removed
Remove unused functions.
Additional information: link
BLOWUP.totalFee (#404) is set pre-construction with a non-constant function or state variable:
- marketingFee + reflectionFee + liquidityFee + devFee
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
Pragma version^0.7.4 (#15) allows old versions
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in BLOWUP.swapBack() (#721-769):
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#752)
- (tmpSuccess,None) = address(devFeeReceiver).call{gas: 30000,value: amountBNBDev}() (#753)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Variable BLOWUP._maxWalletToken (#458) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Variable IDEXRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#164) is too similar to IDEXRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#165)
Prevent variables from having similar names.
Additional information: link
BLOWUP.slitherConstructorVariables() (#378-956) uses literals with too many digits:
- distributorGas = 500000 (#429)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
SafeMathInt.MAX_INT256 (#55) is never used in SafeMathInt (#53-87)
Remove unused state variables.
Additional information: link
DividendDistributor.dividendsPerShareAccuracyFactor (#237) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute volume.
Unable to find PancakeSwap trading pair to compute number of swaps.
Unable to crawl data from the website
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Token was delisted (assigned to inactive / untracked listing) from CoinMarketCap
Additional information: link
Unable to find token contract audit
Unable to verify token contract address on the website
Unable to find audit link on the website
Unable to find whitepaper link on the website
Unable to find Telegram link on the website
Unable to find Twitter link on the website
Young tokens have high risks of price dump / death
Young tokens have high risks of scam / price dump / death
Token has no active CoinMarketCap listing / rank
Token has relatively low CoinGecko rank
Twitter account link seems to be invalid
Unable to find Youtube account
Unable to find Discord account