CryptoBattles is a decentralized protocol for gamified liquidity mining.
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
Contract locking ether found:
Contract CryptoBattles (contracts/ERC20/CryptoBattles.sol#8-77) has payable functions:
- CryptoBattles.constructor(string,string,uint256) (contracts/ERC20/CryptoBattles.sol#14-23)
But does not have a function to withdraw the ether
Remove the payable attribute or add a withdraw function.
Additional information: link
CryptoBattles.transferFrom(address,address,uint256).fee (contracts/ERC20/CryptoBattles.sol#52) is a local variable never initialized
CryptoBattles.transfer(address,uint256).fee (contracts/ERC20/CryptoBattles.sol#35) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.
Additional information: link
CryptoBattles.constructor(string,string,uint256).name (contracts/ERC20/CryptoBattles.sol#15) shadows:
- ERC20.name() (@openzeppelin/contracts/token/ERC20/ERC20.sol#61-63) (function)
- IERC20Metadata.name() (@openzeppelin/contracts/token/ERC20/extensions/IERC20Metadata.sol#16) (function)
CryptoBattles.constructor(string,string,uint256).symbol (contracts/ERC20/CryptoBattles.sol#16) shadows:
- ERC20.symbol() (@openzeppelin/contracts/token/ERC20/ERC20.sol#69-71) (function)
- IERC20Metadata.symbol() (@openzeppelin/contracts/token/ERC20/extensions/IERC20Metadata.sol#21) (function)
Rename the local variables that shadow another component.
Additional information: link
CryptoBattles.constructor(string,string,uint256) (contracts/ERC20/CryptoBattles.sol#14-23) uses timestamp for comparisons
Dangerous comparisons:
- require(bool)(_transferCliffPoint >= block.timestamp) (contracts/ERC20/CryptoBattles.sol#21)
Avoid relying on block.timestamp.
Additional information: link
Different versions of Solidity is used:
- Version used: ['^0.8.0', '^0.8.10']
- ^0.8.0 (@openzeppelin/contracts/access/Ownable.sol#3)
- ^0.8.0 (@openzeppelin/contracts/token/ERC20/ERC20.sol#3)
- ^0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#3)
- ^0.8.0 (@openzeppelin/contracts/token/ERC20/extensions/IERC20Metadata.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/Context.sol#3)
- ^0.8.10 (contracts/ERC20/CryptoBattles.sol#3)
Use one Solidity version.
Additional information: link
ERC20._burn(address,uint256) (@openzeppelin/contracts/token/ERC20/ERC20.sol#274-289) has costly operations inside a loop:
- _totalSupply -= amount (@openzeppelin/contracts/token/ERC20/ERC20.sol#284)
Use a local variable to hold the loop computation result.
Additional information: link
Context._msgData() (@openzeppelin/contracts/utils/Context.sol#20-22) is never used and should be removed
Remove unused functions.
Additional information: link
Pragma version^0.8.0 (@openzeppelin/contracts/access/Ownable.sol#3) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/token/ERC20/ERC20.sol#3) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#3) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/token/ERC20/extensions/IERC20Metadata.sol#3) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/utils/Context.sol#3) allows old versions
Pragma version^0.8.10 (contracts/ERC20/CryptoBattles.sol#3) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
solc-0.8.10 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Parameter CryptoBattles.setTransferFee(uint256)._transferFee (contracts/ERC20/CryptoBattles.sol#30) is not in mixedCase
Variable CryptoBattles.BP (contracts/ERC20/CryptoBattles.sol#12) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
CryptoBattles.BP (contracts/ERC20/CryptoBattles.sol#12) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
renounceOwnership() should be declared external:
- Ownable.renounceOwnership() (@openzeppelin/contracts/access/Ownable.sol#53-55)
transferOwnership(address) should be declared external:
- Ownable.transferOwnership(address) (@openzeppelin/contracts/access/Ownable.sol#61-64)
name() should be declared external:
- ERC20.name() (@openzeppelin/contracts/token/ERC20/ERC20.sol#61-63)
symbol() should be declared external:
- ERC20.symbol() (@openzeppelin/contracts/token/ERC20/ERC20.sol#69-71)
decimals() should be declared external:
- ERC20.decimals() (@openzeppelin/contracts/token/ERC20/ERC20.sol#86-88)
totalSupply() should be declared external:
- ERC20.totalSupply() (@openzeppelin/contracts/token/ERC20/ERC20.sol#93-95)
balanceOf(address) should be declared external:
- ERC20.balanceOf(address) (@openzeppelin/contracts/token/ERC20/ERC20.sol#100-102)
allowance(address,address) should be declared external:
- ERC20.allowance(address,address) (@openzeppelin/contracts/token/ERC20/ERC20.sol#120-122)
approve(address,uint256) should be declared external:
- ERC20.approve(address,uint256) (@openzeppelin/contracts/token/ERC20/ERC20.sol#131-134)
increaseAllowance(address,uint256) should be declared external:
- ERC20.increaseAllowance(address,uint256) (@openzeppelin/contracts/token/ERC20/ERC20.sol#177-180)
decreaseAllowance(address,uint256) should be declared external:
- ERC20.decreaseAllowance(address,uint256) (@openzeppelin/contracts/token/ERC20/ERC20.sol#196-204)
setTransferFee(uint256) should be declared external:
- CryptoBattles.setTransferFee(uint256) (contracts/ERC20/CryptoBattles.sol#30-32)
burn(uint256) should be declared external:
- CryptoBattles.burn(uint256) (contracts/ERC20/CryptoBattles.sol#64-66)
Use the external attribute for functions never called from the contract.
Additional information: link
Unable to find token contract audit
Unable to find audit link on the website
Unable to find whitepaper link on the website
Unable to find token on CoinHunt
Additional information: link
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinGecko rank
Unable to find Youtube account