What is DeFido?
DeFido was built on the Binance Smart Chain as a meme cryptocurrency. More specifically, it is a hyper-deflationary sub coin with a smart sharing system built into the ecosystem, so each investor receives more DeFido in their wallet just for holding.
There is a redistribution transfer for every buy/sell, 8% commission fee is charged and distributed, 4% to holders and the other 4% is added to the marketing wallet for project development.
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
DeFido.sendETHToMarketing(uint256) (contracts/DeFido.sol#332-335) sends eth to arbitrary user
Dangerous calls:
- marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in DeFido._transfer(address,address,uint256) (contracts/DeFido.sol#267-320):
External calls:
- swapTokens(contractTokenBalance) (contracts/DeFido.sol#305)
- marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (contracts/DeFido.sol#346-352)
External calls sending eth:
- swapTokens(contractTokenBalance) (contracts/DeFido.sol#305)
- marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
State variables written after the call(s):
- _tokenTransfer(from,to,amount,takeFee) (contracts/DeFido.sol#319)
- _rOwned[address(this)] = _rOwned[address(this)].add(rLiquidity) (contracts/DeFido.sol#563)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (contracts/DeFido.sol#406)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (contracts/DeFido.sol#426)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (contracts/DeFido.sol#448)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (contracts/DeFido.sol#469)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (contracts/DeFido.sol#407)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (contracts/DeFido.sol#428)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (contracts/DeFido.sol#449)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (contracts/DeFido.sol#471)
- _tokenTransfer(from,to,amount,takeFee) (contracts/DeFido.sol#319)
- _rTotal = _rTotal.sub(rFee) (contracts/DeFido.sol#478)
- _tokenTransfer(from,to,amount,takeFee) (contracts/DeFido.sol#319)
- _tOwned[address(this)] = _tOwned[address(this)].add(tLiquidity) (contracts/DeFido.sol#565)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (contracts/DeFido.sol#468)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (contracts/DeFido.sol#447)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (contracts/DeFido.sol#427)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (contracts/DeFido.sol#470)
Apply the check-effects-interactions pattern.
Additional information: link
DeFido._transfer(address,address,uint256) (contracts/DeFido.sol#267-320) uses a dangerous strict equality:
- block.timestamp == launchTime (contracts/DeFido.sol#287)
Don't use strict equality to determine if an account has enough Ether or tokens.
Additional information: link
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
DeFido.sendETHToMarketing(uint256) (contracts/DeFido.sol#332-335) ignores return value by marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
Ensure that the return value of a low-level call is checked or logged.
Additional information: link
DeFido.emergencyWithdraw() (contracts/DeFido.sol#659-661) ignores return value by address(owner()).send(address(this).balance) (contracts/DeFido.sol#660)
Ensure that the return value of send is checked or logged.
Additional information: link
DeFido.addLiquidity(uint256,uint256) (contracts/DeFido.sol#357-370) ignores return value by uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/DeFido.sol#362-369)
Ensure that all the return values of the function calls are used.
Additional information: link
DeFido._approve(address,address,uint256).owner (contracts/DeFido.sol#256) shadows:
- Ownable.owner() (@openzeppelin/contracts/access/Ownable.sol#34-36) (function)
Rename the local variables that shadow another component.
Additional information: link
DeFido.setFeeRate(uint256) (contracts/DeFido.sol#651-653) should emit an event for:
- _feeRate = rate (contracts/DeFido.sol#652)
Emit an event for critical parameter changes.
Additional information: link
DeFido.setMarketingAddress(address)._marketingAddress (contracts/DeFido.sol#615) lacks a zero-check on :
- marketingAddress = address(_marketingAddress) (contracts/DeFido.sol#616)
Check that the address is not zero.
Additional information: link
Reentrancy in DeFido.transferFrom(address,address,uint256) (contracts/DeFido.sol#146-161):
External calls:
- _transfer(sender,recipient,amount) (contracts/DeFido.sol#151)
- marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (contracts/DeFido.sol#346-352)
External calls sending eth:
- _transfer(sender,recipient,amount) (contracts/DeFido.sol#151)
- marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (contracts/DeFido.sol#152-159)
- _allowances[owner][spender] = amount (contracts/DeFido.sol#263)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in DeFido.transferFrom(address,address,uint256) (contracts/DeFido.sol#146-161):
External calls:
- _transfer(sender,recipient,amount) (contracts/DeFido.sol#151)
- marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (contracts/DeFido.sol#346-352)
External calls sending eth:
- _transfer(sender,recipient,amount) (contracts/DeFido.sol#151)
- marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
Event emitted after the call(s):
- Approval(owner,spender,amount) (contracts/DeFido.sol#264)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (contracts/DeFido.sol#152-159)
Apply the check-effects-interactions pattern.
Additional information: link
DeFido._transfer(address,address,uint256) (contracts/DeFido.sol#267-320) uses timestamp for comparisons
Dangerous comparisons:
- block.timestamp == launchTime (contracts/DeFido.sol#287)
Avoid relying on block.timestamp.
Additional information: link
Address._verifyCallResult(bool,bytes,string) (@openzeppelin/contracts/utils/Address.sol#189-209) uses assembly
- INLINE ASM (@openzeppelin/contracts/utils/Address.sol#201-204)
Do not use evm assembly.
Additional information: link
Different versions of Solidity is used:
- Version used: ['>=0.5.0', '>=0.6.2', '^0.8.0', '^0.8.4']
- ^0.8.0 (@openzeppelin/contracts/access/Ownable.sol#3)
- ^0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/Address.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/Context.sol#3)
- ^0.8.0 (@openzeppelin/contracts/utils/math/SafeMath.sol#3)
- >=0.5.0 (@uniswap/v2-core/contracts/interfaces/IUniswapV2Factory.sol#1)
- >=0.5.0 (@uniswap/v2-core/contracts/interfaces/IUniswapV2Pair.sol#1)
- >=0.6.2 (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router01.sol#1)
- >=0.6.2 (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router02.sol#1)
- ^0.8.4 (contracts/DeFido.sol#2)
Use one Solidity version.
Additional information: link
SafeMath.trySub(uint256,uint256) (@openzeppelin/contracts/utils/math/SafeMath.sol#34-39) is never used and should be removed
Remove unused functions.
Additional information: link
DeFido._previousLiquidityFee (contracts/DeFido.sol#43) is set pre-construction with a non-constant function or state variable:
- _liquidityFee
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
solc-0.8.4 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in DeFido.sendETHToMarketing(uint256) (contracts/DeFido.sol#332-335):
- marketingAddress.call{value: amount}() (contracts/DeFido.sol#334)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Variable DeFido._feeRate (contracts/DeFido.sol#45) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Variable DeFido.reflectionFromToken(uint256,bool).rTransferAmount (contracts/DeFido.sol#222) is too similar to DeFido._getValues(uint256).tTransferAmount (contracts/DeFido.sol#494)
Prevent variables from having similar names.
Additional information: link
DeFido.slitherConstructorVariables() (contracts/DeFido.sol#12-662) uses literals with too many digits:
- _tTotal = 128000000 * 10 ** 9 (contracts/DeFido.sol#31)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
DeFido.deadAddress (contracts/DeFido.sol#18-19) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
excludeFromReward(address) should be declared external:
- DeFido.excludeFromReward(address) (contracts/DeFido.sol#233-240)
Use the external attribute for functions never called from the contract.
Additional information: link
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Unable to find token/project description on the website or on BscScan, CoinMarketCap
Unable to find token contract audit
Unable to verify token contract address on the website
Unable to find audit link on the website
Unable to find whitepaper link on the website
Unable to find Telegram link on the website
Unable to find Twitter link on the website
Unable to find token on CoinHunt
Additional information: link
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinMarketCap rank
Twitter account link seems to be invalid
Unable to find Youtube account
Unable to find Discord account