Ice Token Logo

ICE Token

About ICE

Listings

Token 3 years
CoinGecko 3 years
CoinMarketCap 3 years
[CoinGecko] alert: As Popsicle Finance https://popsiclefinance.medium.com/exciting-developments-introducing-our-new-path-5e209aa8c69e”>relaunched as WAGMI, ICE or NICE will be migrated to WAGMI. For more information, refer to their official https://docs.popsicle.finance/v/wagmi-1/ice-nice-to-wagmi-token-swap”>documentation.
white paper

A next-gen cross-chain yield enhancement platform focusing on Automated Market-Making (AMM) Liquidity Providers (LP)

Laser Scorebeta Last Audit: 24 February 2024

report
Token seems to be (relatively) fine. It still become a scam, but probability is moderate.

Anti-Scam

Links


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

IceToken._init (#135) is written in both
_init = true (#291)
_init = false (#305)
Fix or remove the writes.

Additional information: link


Contract ownership is not renounced (belongs to a wallet)


Not a direct threat, but may indicate unreliable intentions of developer. Widespread names (e.g. Elon, King, Moon, Doge) are common among meme-tokens and scams. The allow to gain free hype and attract unexperienced investors.

IceToken.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#332-335) ignores return value by IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#333)
Ensure that all the return values of the function calls are used.

Additional information: link

IceToken.setMinter(address)._auth (#196) lacks a zero-check on :
- pendingMinter = _auth (#197)
IceToken.initVault(address)._vault (#186) lacks a zero-check on :
- vault = _vault (#188)
- pendingVault = _vault (#189)
IceToken.constructor(string,string,uint8,address,address)._vault (#281) lacks a zero-check on :
- vault = _vault (#296)
- pendingVault = _vault (#297)
IceToken.setVault(address)._vault (#201) lacks a zero-check on :
- pendingVault = _vault (#202)
IceToken.constructor(string,string,uint8,address,address)._underlying (#281) lacks a zero-check on :
- underlying = _underlying (#285)
Check that the address is not zero.

Additional information: link

Reentrancy in IceToken.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#332-335):
External calls:
- IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#333)
State variables written after the call(s):
- _deposit(value,to) (#334)
- _totalSupply += amount (#398)
- _deposit(value,to) (#334)
- balanceOf[account] += amount (#399)
Reentrancy in IceToken.deposit() (#337-341):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),_amount) (#339)
State variables written after the call(s):
- _deposit(_amount,msg.sender) (#340)
- _totalSupply += amount (#398)
- _deposit(_amount,msg.sender) (#340)
- balanceOf[account] += amount (#399)
Reentrancy in IceToken.deposit(uint256) (#343-346):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#344)
State variables written after the call(s):
- _deposit(amount,msg.sender) (#345)
- _totalSupply += amount (#398)
- _deposit(amount,msg.sender) (#345)
- balanceOf[account] += amount (#399)
Reentrancy in IceToken.depositWithPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#326-330):
External calls:
- IERC20(underlying).permit(target,address(this),value,deadline,v,r,s) (#327)
- IERC20(underlying).safeTransferFrom(target,address(this),value) (#328)
State variables written after the call(s):
- _deposit(value,to) (#329)
- _totalSupply += amount (#398)
- _deposit(value,to) (#329)
- balanceOf[account] += amount (#399)
Reentrancy in IceToken.deposit(uint256,address) (#348-351):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#349)
State variables written after the call(s):
- _deposit(amount,to) (#350)
- _totalSupply += amount (#398)
- _deposit(amount,to) (#350)
- balanceOf[account] += amount (#399)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in IceToken.deposit(uint256) (#343-346):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#344)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#400)
- _deposit(amount,msg.sender) (#345)
Reentrancy in IceToken.deposit() (#337-341):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),_amount) (#339)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#400)
- _deposit(_amount,msg.sender) (#340)
Reentrancy in IceToken.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#332-335):
External calls:
- IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#333)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#400)
- _deposit(value,to) (#334)
Reentrancy in IceToken.deposit(uint256,address) (#348-351):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#349)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#400)
- _deposit(amount,to) (#350)
Reentrancy in IceToken.depositWithPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#326-330):
External calls:
- IERC20(underlying).permit(target,address(this),value,deadline,v,r,s) (#327)
- IERC20(underlying).safeTransferFrom(target,address(this),value) (#328)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#400)
- _deposit(value,to) (#329)
Apply the check-effects-interactions pattern.

Additional information: link

IceToken.permit(address,address,uint256,uint256,uint8,bytes32,bytes32) (#455-472) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(block.timestamp <= deadline,AnyswapV3ERC20: Expired permit) (#456)
IceToken.transferWithPermit(address,address,uint256,uint256,uint8,bytes32,bytes32) (#474-498) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(block.timestamp <= deadline,AnyswapV3ERC20: Expired permit) (#475)
IceToken.mpc() (#175-180) uses timestamp for comparisons
Dangerous comparisons:
- block.timestamp >= delayVault (#176)
IceToken.applyMinter() (#211-215) uses timestamp for comparisons
Dangerous comparisons:
- require(bool)(block.timestamp >= delayMinter) (#212)
IceToken.applyVault() (#206-209) uses timestamp for comparisons
Dangerous comparisons:
- require(bool)(block.timestamp >= delayVault) (#207)
Avoid relying on block.timestamp.

Additional information: link

Address.isContract(address) (#75-81) uses assembly
- INLINE ASM (#79)
IceToken.constructor(string,string,uint8,address,address) (#281-319) uses assembly
- INLINE ASM (#309)
Do not use evm assembly.

Additional information: link

SafeERC20.safeApprove(IERC20,address,uint256) (#95-100) is never used and should be removed
Remove unused functions.

Additional information: link

solc-0.8.3 is not recommended for deployment
Pragma version^0.8.0 (#3) allows old versions
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in SafeERC20.callOptionalReturn(IERC20,bytes) (#101-112):
- (success,returndata) = address(token).call(data) (#105)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Parameter IceToken.setVault(address)._vault (#201) is not in mixedCase
Function IceToken.Swapout(uint256,address) (#260-266) is not in mixedCase
Parameter IceToken.initVault(address)._vault (#186) is not in mixedCase
Variable IceToken.DOMAIN_SEPARATOR (#125) is not in mixedCase
Parameter IceToken.setMinter(address)._auth (#196) is not in mixedCase
Function IceToken.Swapin(bytes32,address,uint256) (#254-258) is not in mixedCase
Parameter IceToken.revokeMinter(address)._auth (#218) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

IceToken.slitherConstructorVariables() (#115-593) uses literals with too many digits:
- maxTotalSupply = 69000000000000000000000000 (#132)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

IceToken.delayDelay (#158) should be constant
IceToken.maxTotalSupply (#132) should be constant
IceToken.pendingDelay (#157) should be constant
IceToken.delay (#141) should be constant
Add the constant attributes to state variables that never change.

Additional information: link

Swapout(uint256,address) should be declared external:
- IceToken.Swapout(uint256,address) (#260-266)
owner() should be declared external:
- IceToken.owner() (#171-173)
changeMPCOwner(address) should be declared external:
- IceToken.changeMPCOwner(address) (#235-241)
Swapin(bytes32,address,uint256) should be declared external:
- IceToken.Swapin(bytes32,address,uint256) (#254-258)
Use the external attribute for functions never called from the contract.

Additional information: link

Holders:


Unable to find PancakeSwap trading pair to compute liquidity.


Unable to find PancakeSwap trading pair to compute number of swaps.


Twitter account link seems to be invalid


Telegram account has relatively few subscribers


Unable to find Youtube account


BscScan page for the token does not contain additional info: website, socials, description, etc.

Additional information: link


Unable to find token contract audit


Unable to find token on CoinHunt

Additional information: link


Token is not listed at Mobula.Finance

Additional information: link


Unable to verify token contract address on the website


Unable to find audit link on the website


Unable to find Telegram link on the website


Token has no active CoinGecko listing / rank


Token has a considerable age, but social accounts / website are missing or have few users

Price for ICE