EverFight._transferToAddressETH(address,uint256) (#956-958) sends eth to arbitrary user
Dangerous calls:
- recipient.transfer(amount) (#957)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in EverFight._transfer(address,address,uint256) (#786-830):
External calls:
- swapTokens(contractTokenBalance) (#797)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#925-931)
- buyBackTokens(balance.div(100)) (#804)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens.value(amount)(0,path,deadAddress,block.timestamp.add(300)) (#942-947)
External calls sending eth:
- swapTokens(contractTokenBalance) (#797)
- recipient.transfer(amount) (#957)
- buyBackTokens(balance.div(100)) (#804)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens.value(amount)(0,path,deadAddress,block.timestamp.add(300)) (#942-947)
State variables written after the call(s):
- buyBackTokens(balance.div(100)) (#804)
- _balances[account] = _balances[account].sub(amount,BEP20: burn amount exceeds balance) (#1002)
- _transferStandard(sender,recipient,amount) (#809)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#838)
- _balances[recipient] = _balances[recipient].add(amount) (#839)
- _transferStandard(sender,recipient,(amount.div(100)).mul(100 - _liquidityFee)) (#813)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#838)
- _balances[recipient] = _balances[recipient].add(amount) (#839)
- _transferStandard(sender,address(this),(amount.div(100)).mul(_liquidityFee)) (#814)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#838)
- _balances[recipient] = _balances[recipient].add(amount) (#839)
- _transferStandard(sender,recipient,amount) (#816)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#838)
- _balances[recipient] = _balances[recipient].add(amount) (#839)
- _transferStandard(sender,recipient,(amount.div(100)).mul(100 - (_burningFee + _liquidityFee))) (#820)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#838)
- _balances[recipient] = _balances[recipient].add(amount) (#839)
- _transferStandard(sender,address(this),(amount.div(100)).mul(_liquidityFee)) (#821)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#838)
- _balances[recipient] = _balances[recipient].add(amount) (#839)
- _transferStandard(sender,recipient,(amount.div(100)).mul(100 - _burningFee)) (#823)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#838)
- _balances[recipient] = _balances[recipient].add(amount) (#839)
- _burn(sender,(amount.div(100)).mul(_burningFee)) (#825)
- _balances[account] = _balances[account].sub(amount,BEP20: burn amount exceeds balance) (#1002)
- _burn(sender,(amount.div(100)).mul(_burningFee)) (#825)
- _totalSupply = _totalSupply.sub(amount) (#1003)
- buyBackTokens(balance.div(100)) (#804)
- inSwapAndLiquify = true (#524)
- inSwapAndLiquify = false (#526)
Apply the check-effects-interactions pattern.
Additional information: link
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
EverFight.swapTokens(uint256) (#895-902) performs a multiplication on the result of a division:
-_transferToAddressETH(globalRewardAddress,transferredBalance.div(_liquidityFee).mul(_globalRewardDivisor)) (#901)
Consider ordering multiplication before division.
Additional information: link
EverFight.swapETHForTokens(uint256) (#937-951) ignores return value by _totalBurnedBuyBack.add(balanceOf(deadAddress)) (#949)
Ensure that all the return values of the function calls are used.
Additional information: link
EverFight._approve(address,address,uint256).owner (#1020) shadows:
- Ownable.owner() (#215-217) (function)
Rename the local variables that shadow another component.
Additional information: link
EverFight.setBuybackUpperLimit(uint256) (#984-986) should emit an event for:
- buyBackUpperLimit = buyBackLimit * 10 ** 18 (#985)
Emit an event for critical parameter changes.
Additional information: link
EverFight.setGlobalRewardAddress(address).addr (#977) lacks a zero-check on :
- globalRewardAddress = addr (#978)
Check that the address is not zero.
Additional information: link
Reentrancy in EverFight.transferFrom(address,address,uint256) (#652-656):
External calls:
- _transfer(sender,recipient,amount) (#653)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens.value(amount)(0,path,deadAddress,block.timestamp.add(300)) (#942-947)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#925-931)
External calls sending eth:
- _transfer(sender,recipient,amount) (#653)
- recipient.transfer(amount) (#957)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens.value(amount)(0,path,deadAddress,block.timestamp.add(300)) (#942-947)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,BEP20: transfer amount exceeds allowance)) (#654)
- _allowances[owner][spender] = amount (#1024)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in EverFight.transferFrom(address,address,uint256) (#652-656):
External calls:
- _transfer(sender,recipient,amount) (#653)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens.value(amount)(0,path,deadAddress,block.timestamp.add(300)) (#942-947)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#925-931)
External calls sending eth:
- _transfer(sender,recipient,amount) (#653)
- recipient.transfer(amount) (#957)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens.value(amount)(0,path,deadAddress,block.timestamp.add(300)) (#942-947)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#1025)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,BEP20: transfer amount exceeds allowance)) (#654)
Apply the check-effects-interactions pattern.
Additional information: link
SafeMath.mod(uint256,uint256,string) (#180-183) is never used and should be removed
Remove unused functions.
Additional information: link
solc-0.6.2 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Variable EverFight._totalBurnedBuyBack (#490) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Redundant expression "this (#114)" inContext (#104-117)
Remove redundant statements if they congest code but offer no value.
Additional information: link
Reentrancy in EverFight.transferFrom(address,address,uint256) (#652-656):
External calls:
- _transfer(sender,recipient,amount) (#653)
- recipient.transfer(amount) (#957)
External calls sending eth:
- _transfer(sender,recipient,amount) (#653)
- recipient.transfer(amount) (#957)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens.value(amount)(0,path,deadAddress,block.timestamp.add(300)) (#942-947)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,BEP20: transfer amount exceeds allowance)) (#654)
- _allowances[owner][spender] = amount (#1024)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#1025)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,BEP20: transfer amount exceeds allowance)) (#654)
Apply the check-effects-interactions pattern.
Additional information: link
Variable IUniswapV2Router01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#323) is too similar to IUniswapV2Router01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#324)
Prevent variables from having similar names.
Additional information: link
EverFight.slitherConstructorVariables() (#453-1044) uses literals with too many digits:
- deadAddress = 0x000000000000000000000000000000000000dEaD (#483)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
EverFight.deadAddress (#483) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
setGlobalRewardAddress(address) should be declared external:
- EverFight.setGlobalRewardAddress(address) (#977-979)
Use the external attribute for functions never called from the contract.
Additional information: link
Average 30d PancakeSwap volume is less than $100. Token is either dead or inactive.
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute number of swaps.
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Unable to find token on CoinGecko
Additional information: link
Unable to find token contract audit
Unable to verify token contract address on the website
Unable to find audit link on the website
Unable to find whitepaper link on the website
Unable to find Telegram link on the website
Unable to find Twitter link on the website
Unable to find token on CoinHunt
Additional information: link
Unable to find token/project description on the website or on BscScan, CoinHunt, CoinGecko, CoinMarketCap
Young tokens have high risks of scam / price dump / death
Token has no active CoinGecko listing / rank
Young tokens have high risks of price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinMarketCap rank
Twitter account link seems to be invalid
Unable to find Youtube account
Unable to find Discord account