Impossible Finance Token Logo

IF [Impossible Finance] Token

About IF

Listings

Token 3 years
CoinMarketCap 3 years
white paper

The first two Impossible Finance products revolve around yield & autonomous community creation. Versus TradFi’s low yields, defi yield protocols have been a killer app, but impermanent loss still looms large. Instead, focusing on low-IL asset pools such as EUR and JPY stablecoins, where central banks have negative interest rates, or non-dividend yielding synthetics (hint: high growth stocks don’t have dividends) like synthetic TSLA, we propose the first wave of “Impossible Yield” products powered by our stablecoin swap, StableXswap. Taking a page out of Aave & Synthetix’ playbook, this also encourages us to integrate many synthetic assets, lending protocols, and cross-chain solutions to aggregate liquidity. This yield generated from stable EUR, JPY, or TSLA pools is unbeatable by TradFi, at least until the ECB changes policies, the Japanese population pyramid inverts, or Elon Musk changes his website’s FAQ.

In early 2021, we saw Wall Street Bets clash with Robinhood & hedge funds, putting emphasis on addressing retail users’ needs without sacrificing user autonomy. Beyond avoiding business models that actively harm users (i.e. selling flow to frontrunners, or hiding spreads to mask fees), why would you ever accept dividendless holdings when defi can give you yield? That’s Impossible Finance: we’re hellbent on providing better financial instruments for the world.

The second release of Impossible Finance products tackle crypto’s best killer app: fundraising. In the wake of 2017 ICO scams, Vitalik posited DAICOs, (DAO + ICOs), where project teams could raise smart- contract vested funds, provided they achieve certain milestones. Governors determined whether the team was still building, or else refund investors. However, 2018 lacked robust governance and voting portals (i.e.snapshot.page), let alone real products to invest in. Today, we propose the launch of self-sustaining- initial-dex-offerings, or SSIDOs. With the power of yield from our AMMs and partner protocols, a team that raises $10M with a $2M burn rate can be self-sustaining with just 20% APY, creating a new raise once, build forever model. The Andre’s of the world can find capital & liquidity and no longer need to rely on cexes and rent-seeking private investment funds to pay the bills. Meanwhile, vesting stable LP tokens from the fundraise stay within our AMM, which creates sticky TVL. Teams that raise via this system get automatically transparent banking, while traders get access to steady liquidity, anti-rugpull peace of mind. Our mission at Impossible Finance will be to continue finding win-wins for traders, investors, projects, and protocols alike.

Social

Laser Scorebeta Last Audit: 4 February 2022

report
Token seems to be (relatively) fine. It still become a scam, but probability is moderate.

Anti-Scam

Links


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

Address.isContract(address) (#75-81) uses assembly
- INLINE ASM (#79)
ImpossibleFinance.constructor(string,string,uint8,address,address) (#278-306) uses assembly
- INLINE ASM (#298)
Do not use evm assembly.

Additional information: link

SafeERC20.safeApprove(IERC20,address,uint256) (#95-100) is never used and should be removed
Remove unused functions.

Additional information: link

Pragma version0.8.2 (#3) allows old versions
solc-0.8.2 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

ImpossibleFinance.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#319-322) ignores return value by IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#320)
Ensure that all the return values of the function calls are used.

Additional information: link

ImpossibleFinance.initVault(address)._vault (#183) lacks a zero-check on :
- vault = _vault (#185)
- pendingVault = _vault (#186)
ImpossibleFinance.setMinter(address)._auth (#193) lacks a zero-check on :
- pendingMinter = _auth (#194)
ImpossibleFinance.setVault(address)._vault (#198) lacks a zero-check on :
- pendingVault = _vault (#199)
ImpossibleFinance.constructor(string,string,uint8,address,address)._underlying (#278) lacks a zero-check on :
- underlying = _underlying (#282)
ImpossibleFinance.constructor(string,string,uint8,address,address)._vault (#278) lacks a zero-check on :
- vault = _vault (#293)
- pendingVault = _vault (#294)
Check that the address is not zero.

Additional information: link

Reentrancy in ImpossibleFinance.deposit() (#324-328):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),_amount) (#326)
State variables written after the call(s):
- _deposit(_amount,msg.sender) (#327)
- _totalSupply += amount (#384)
- _deposit(_amount,msg.sender) (#327)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.deposit(uint256) (#330-333):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#331)
State variables written after the call(s):
- _deposit(amount,msg.sender) (#332)
- _totalSupply += amount (#384)
- _deposit(amount,msg.sender) (#332)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.deposit(uint256,address) (#335-338):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#336)
State variables written after the call(s):
- _deposit(amount,to) (#337)
- _totalSupply += amount (#384)
- _deposit(amount,to) (#337)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.depositWithPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#313-317):
External calls:
- IERC20(underlying).permit(target,address(this),value,deadline,v,r,s) (#314)
- IERC20(underlying).safeTransferFrom(target,address(this),value) (#315)
State variables written after the call(s):
- _deposit(value,to) (#316)
- _totalSupply += amount (#384)
- _deposit(value,to) (#316)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#319-322):
External calls:
- IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#320)
State variables written after the call(s):
- _deposit(value,to) (#321)
- _totalSupply += amount (#384)
- _deposit(value,to) (#321)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.staxMigrate(uint256) (#579-584):
External calls:
- require(bool,string)(staxContract.transferFrom(msg.sender,address(this),amount),IF V1: STAX contract transferFrom failed) (#582)
State variables written after the call(s):
- _mint(msg.sender,amount) (#583)
- _totalSupply += amount (#384)
- _mint(msg.sender,amount) (#583)
- balanceOf[account] += amount (#385)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in ImpossibleFinance.deposit() (#324-328):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),_amount) (#326)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(_amount,msg.sender) (#327)
Reentrancy in ImpossibleFinance.deposit(uint256) (#330-333):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#331)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(amount,msg.sender) (#332)
Reentrancy in ImpossibleFinance.deposit(uint256,address) (#335-338):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#336)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(amount,to) (#337)
Reentrancy in ImpossibleFinance.depositWithPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#313-317):
External calls:
- IERC20(underlying).permit(target,address(this),value,deadline,v,r,s) (#314)
- IERC20(underlying).safeTransferFrom(target,address(this),value) (#315)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(value,to) (#316)
Reentrancy in ImpossibleFinance.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#319-322):
External calls:
- IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#320)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(value,to) (#321)
Reentrancy in ImpossibleFinance.staxMigrate(uint256) (#579-584):
External calls:
- require(bool,string)(staxContract.transferFrom(msg.sender,address(this),amount),IF V1: STAX contract transferFrom failed) (#582)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _mint(msg.sender,amount) (#583)
Apply the check-effects-interactions pattern.

Additional information: link

ImpossibleFinance.mpc() (#172-177) uses timestamp for comparisons
Dangerous comparisons:
- block.timestamp >= delayVault (#173)
ImpossibleFinance.applyVault() (#203-206) uses timestamp for comparisons
Dangerous comparisons:
- require(bool)(block.timestamp >= delayVault) (#204)
ImpossibleFinance.applyMinter() (#208-212) uses timestamp for comparisons
Dangerous comparisons:
- require(bool)(block.timestamp >= delayMinter) (#209)
ImpossibleFinance.permit(address,address,uint256,uint256,uint8,bytes32,bytes32) (#441-458) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(block.timestamp <= deadline,AnyswapV3ERC20: Expired permit) (#442)
ImpossibleFinance.transferWithPermit(address,address,uint256,uint256,uint8,bytes32,bytes32) (#460-484) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(block.timestamp <= deadline,AnyswapV3ERC20: Expired permit) (#461)
Avoid relying on block.timestamp.

Additional information: link

Low level call in SafeERC20.callOptionalReturn(IERC20,bytes) (#101-112):
- (success,returndata) = address(token).call(data) (#105)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Parameter ImpossibleFinance.initVault(address)._vault (#183) is not in mixedCase
Parameter ImpossibleFinance.setMinter(address)._auth (#193) is not in mixedCase
Parameter ImpossibleFinance.setVault(address)._vault (#198) is not in mixedCase
Parameter ImpossibleFinance.revokeMinter(address)._auth (#215) is not in mixedCase
Function ImpossibleFinance.Swapin(bytes32,address,uint256) (#251-255) is not in mixedCase
Function ImpossibleFinance.Swapout(uint256,address) (#257-263) is not in mixedCase
Variable ImpossibleFinance.DOMAIN_SEPARATOR (#125) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

ImpossibleFinance.delay (#138) should be constant
ImpossibleFinance.delayDelay (#155) should be constant
ImpossibleFinance.pendingDelay (#154) should be constant
Add the constant attributes to state variables that never change.

Additional information: link

owner() should be declared external:
- ImpossibleFinance.owner() (#168-170)
changeMPCOwner(address) should be declared external:
- ImpossibleFinance.changeMPCOwner(address) (#232-238)
Swapin(bytes32,address,uint256) should be declared external:
- ImpossibleFinance.Swapin(bytes32,address,uint256) (#251-255)
Swapout(uint256,address) should be declared external:
- ImpossibleFinance.Swapout(uint256,address) (#257-263)
Use the external attribute for functions never called from the contract.

Additional information: link

Holders:


Unable to find PancakeSwap trading pair to compute liquidity.


Unable to find PancakeSwap trading pair to compute number of swaps.


Last post in Twitter was more than 30 days ago


Unable to find Youtube account


BscScan page for the token does not contain additional info: website, socials, description, etc.

Additional information: link


Unable to find token contract audit


Unable to verify token contract address on the website


Unable to find audit link on the website


Unable to find whitepaper link on the website


Unable to find token on CoinHunt

Additional information: link


Young tokens have high risks of scam / price dump / death


Young tokens have high risks of price dump / death

Price for IF

News for IF