CURE Token is the first deflationary crypto token built around doing good. By design, this community powered token has exponential price growth benefits for both holders and charities.
CURE Token, which was developed as a platform to support childhood cancer awareness and research successfully launches the next iteration of the project. This new version took off like a rocket, seeing over a 2 million dollar market cap in the first few hours after launch. New enhancements include a safer contract, better features for potential investors, and a sustainable foundation for exponential growth.
Jacob Beckley, the founder, long-time philanthropist, and innovator said, “CURE Token will change the world, CURE will become the household name alongside Bitcoin, Ethereum, and the like, known as the Token for Good.” Since 2016, Jacob Beckley, has initiated several fundraisers and initiatives around childhood cancer awareness and research. He and his foundation have raised over one million dollars toward the fight against childhood cancer. CURE Token is the latest initiative in his quest to change the world.
CURE is much bigger than one cause. While today CURE is designed to support childhood cancer, in the near future, it will extend its global reach to support all foundations and charities supporting other childhood diseases. The future from that point is extension beyond childhood diseases and cancer to other catastrophic and life threatening diseases.
Reentrancy in CURE._transfer(address,address,uint256) (#642-680):
External calls:
- swapTokens(contractTokenBalance) (#660)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#706-712)
- buyBackTokens(balance.div(100)) (#668)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#724-729)
External calls sending eth:
- swapTokens(contractTokenBalance) (#660)
- recipient.transfer(amount) (#936)
- buyBackTokens(balance.div(100)) (#668)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#724-729)
State variables written after the call(s):
- _tokenTransfer(from,to,amount,takeFee) (#679)
- _liquidityFee = _previousLiquidityFee (#882)
- _liquidityFee = 0 (#877)
- _tokenTransfer(from,to,amount,takeFee) (#679)
- _rOwned[address(this)] = _rOwned[address(this)].add(rLiquidity) (#853)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#769)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#778)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#770)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#789)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#799)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#780)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#790)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#801)
- _tokenTransfer(from,to,amount,takeFee) (#679)
- _rTotal = _rTotal.sub(rFee) (#808)
- _tokenTransfer(from,to,amount,takeFee) (#679)
- _tOwned[address(this)] = _tOwned[address(this)].add(tLiquidity) (#855)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#798)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#788)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#779)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#800)
- buyBackTokens(balance.div(100)) (#668)
- inSwapAndLiquify = true (#496)
- inSwapAndLiquify = false (#498)
Apply the check-effects-interactions pattern.
Additional information: link
Unable to verify that contract auditor is trusted: Certik, Quantstamp, Hacken, Solidity, Paladinsec, Openzeppelin, Verichains
Redundant expression "this (#32)" inContext (#26-35)
Remove redundant statements if they congest code but offer no value.
Additional information: link
CURE.swapTokens(uint256) (#682-689) performs a multiplication on the result of a division:
-transferToAddressETH(marketingAddress,transferredBalance.div(_liquidityFee).mul(marketingDivisor)) (#688)
Consider ordering multiplication before division.
Additional information: link
CURE.addLiquidity(uint256,uint256) (#734-747) ignores return value by uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#739-746)
Ensure that all the return values of the function calls are used.
Additional information: link
CURE._approve(address,address,uint256).owner (#634) shadows:
- Ownable.owner() (#177-179) (function)
Rename the local variables that shadow another component.
Additional information: link
CURE.setBuybackUpperLimit(uint256) (#917-919) should emit an event for:
- buyBackUpperLimit = buyBackLimit * 10 ** 12 (#918)
Emit an event for critical parameter changes.
Additional information: link
CURE.setMarketingAddress(address)._marketingAddress (#921) lacks a zero-check on :
- marketingAddress = address(_marketingAddress) (#922)
Check that the address is not zero.
Additional information: link
Reentrancy in CURE.transferFrom(address,address,uint256) (#552-556):
External calls:
- _transfer(sender,recipient,amount) (#553)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#724-729)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#706-712)
External calls sending eth:
- _transfer(sender,recipient,amount) (#553)
- recipient.transfer(amount) (#936)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#724-729)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#554)
- _allowances[owner][spender] = amount (#638)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in CURE.transferFrom(address,address,uint256) (#552-556):
External calls:
- _transfer(sender,recipient,amount) (#553)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#724-729)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#706-712)
External calls sending eth:
- _transfer(sender,recipient,amount) (#553)
- recipient.transfer(amount) (#936)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#724-729)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#639)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#554)
Apply the check-effects-interactions pattern.
Additional information: link
Ownable.unlock() (#212-217) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(block.timestamp > _lockTime,Contract is locked until 7 days) (#214)
Avoid relying on block.timestamp.
Additional information: link
Address._functionCallWithValue(address,bytes,uint256,string) (#144-161) uses assembly
- INLINE ASM (#153-156)
Do not use evm assembly.
Additional information: link
SafeMath.mod(uint256,uint256,string) (#99-102) is never used and should be removed
Remove unused functions.
Additional information: link
CURE._previousLiquidityFee (#460) is set pre-construction with a non-constant function or state variable:
- _liquidityFee
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
solc-0.8.7 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in Address._functionCallWithValue(address,bytes,uint256,string) (#144-161):
- (success,returndata) = target.call{value: weiValue}(data) (#147)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Variable CURE._maxTxAmount (#464) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Reentrancy in CURE.transferFrom(address,address,uint256) (#552-556):
External calls:
- _transfer(sender,recipient,amount) (#553)
- recipient.transfer(amount) (#936)
External calls sending eth:
- _transfer(sender,recipient,amount) (#553)
- recipient.transfer(amount) (#936)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#724-729)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#554)
- _allowances[owner][spender] = amount (#638)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#639)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#554)
Apply the check-effects-interactions pattern.
Additional information: link
Variable CURE._getValues(uint256).rTransferAmount (#814) is too similar to CURE._transferFromExcluded(address,address,uint256).tTransferAmount (#787)
Prevent variables from having similar names.
Additional information: link
CURE.slitherConstructorVariables() (#430-947) uses literals with too many digits:
- deadAddress = 0x000000000000000000000000000000000000dEaD (#435)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
CURE.deadAddress (#435) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
setBuyBackEnabled(bool) should be declared external:
- CURE.setBuyBackEnabled(bool) (#930-933)
Use the external attribute for functions never called from the contract.
Additional information: link
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinGecko rank
Twitter account link seems to be invalid