The first two Impossible Finance products revolve around yield & autonomous community creation. Versus TradFi’s low yields, defi yield protocols have been a killer app, but impermanent loss still looms large. Instead, focusing on low-IL asset pools such as EUR and JPY stablecoins, where central banks have negative interest rates, or non-dividend yielding synthetics (hint: high growth stocks don’t have dividends) like synthetic TSLA, we propose the first wave of “Impossible Yield” products powered by our stablecoin swap, StableXswap. Taking a page out of Aave & Synthetix’ playbook, this also encourages us to integrate many synthetic assets, lending protocols, and cross-chain solutions to aggregate liquidity. This yield generated from stable EUR, JPY, or TSLA pools is unbeatable by TradFi, at least until the ECB changes policies, the Japanese population pyramid inverts, or Elon Musk changes his website’s FAQ.
In early 2021, we saw Wall Street Bets clash with Robinhood & hedge funds, putting emphasis on addressing retail users’ needs without sacrificing user autonomy. Beyond avoiding business models that actively harm users (i.e. selling flow to frontrunners, or hiding spreads to mask fees), why would you ever accept dividendless holdings when defi can give you yield? That’s Impossible Finance: we’re hellbent on providing better financial instruments for the world.
The second release of Impossible Finance products tackle crypto’s best killer app: fundraising. In the wake of 2017 ICO scams, Vitalik posited DAICOs, (DAO + ICOs), where project teams could raise smart- contract vested funds, provided they achieve certain milestones. Governors determined whether the team was still building, or else refund investors. However, 2018 lacked robust governance and voting portals (i.e.snapshot.page), let alone real products to invest in. Today, we propose the launch of self-sustaining- initial-dex-offerings, or SSIDOs. With the power of yield from our AMMs and partner protocols, a team that raises $10M with a $2M burn rate can be self-sustaining with just 20% APY, creating a new raise once, build forever model. The Andre’s of the world can find capital & liquidity and no longer need to rely on cexes and rent-seeking private investment funds to pay the bills. Meanwhile, vesting stable LP tokens from the fundraise stay within our AMM, which creates sticky TVL. Teams that raise via this system get automatically transparent banking, while traders get access to steady liquidity, anti-rugpull peace of mind. Our mission at Impossible Finance will be to continue finding win-wins for traders, investors, projects, and protocols alike.
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
Address.isContract(address) (#75-81) uses assembly
- INLINE ASM (#79)
ImpossibleFinance.constructor(string,string,uint8,address,address) (#278-306) uses assembly
- INLINE ASM (#298)
Do not use evm assembly.
Additional information: link
SafeERC20.safeApprove(IERC20,address,uint256) (#95-100) is never used and should be removed
Remove unused functions.
Additional information: link
Pragma version0.8.2 (#3) allows old versions
solc-0.8.2 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
ImpossibleFinance.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#319-322) ignores return value by IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#320)
Ensure that all the return values of the function calls are used.
Additional information: link
ImpossibleFinance.initVault(address)._vault (#183) lacks a zero-check on :
- vault = _vault (#185)
- pendingVault = _vault (#186)
ImpossibleFinance.setMinter(address)._auth (#193) lacks a zero-check on :
- pendingMinter = _auth (#194)
ImpossibleFinance.setVault(address)._vault (#198) lacks a zero-check on :
- pendingVault = _vault (#199)
ImpossibleFinance.constructor(string,string,uint8,address,address)._underlying (#278) lacks a zero-check on :
- underlying = _underlying (#282)
ImpossibleFinance.constructor(string,string,uint8,address,address)._vault (#278) lacks a zero-check on :
- vault = _vault (#293)
- pendingVault = _vault (#294)
Check that the address is not zero.
Additional information: link
Reentrancy in ImpossibleFinance.deposit() (#324-328):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),_amount) (#326)
State variables written after the call(s):
- _deposit(_amount,msg.sender) (#327)
- _totalSupply += amount (#384)
- _deposit(_amount,msg.sender) (#327)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.deposit(uint256) (#330-333):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#331)
State variables written after the call(s):
- _deposit(amount,msg.sender) (#332)
- _totalSupply += amount (#384)
- _deposit(amount,msg.sender) (#332)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.deposit(uint256,address) (#335-338):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#336)
State variables written after the call(s):
- _deposit(amount,to) (#337)
- _totalSupply += amount (#384)
- _deposit(amount,to) (#337)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.depositWithPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#313-317):
External calls:
- IERC20(underlying).permit(target,address(this),value,deadline,v,r,s) (#314)
- IERC20(underlying).safeTransferFrom(target,address(this),value) (#315)
State variables written after the call(s):
- _deposit(value,to) (#316)
- _totalSupply += amount (#384)
- _deposit(value,to) (#316)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#319-322):
External calls:
- IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#320)
State variables written after the call(s):
- _deposit(value,to) (#321)
- _totalSupply += amount (#384)
- _deposit(value,to) (#321)
- balanceOf[account] += amount (#385)
Reentrancy in ImpossibleFinance.staxMigrate(uint256) (#579-584):
External calls:
- require(bool,string)(staxContract.transferFrom(msg.sender,address(this),amount),IF V1: STAX contract transferFrom failed) (#582)
State variables written after the call(s):
- _mint(msg.sender,amount) (#583)
- _totalSupply += amount (#384)
- _mint(msg.sender,amount) (#583)
- balanceOf[account] += amount (#385)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in ImpossibleFinance.deposit() (#324-328):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),_amount) (#326)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(_amount,msg.sender) (#327)
Reentrancy in ImpossibleFinance.deposit(uint256) (#330-333):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#331)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(amount,msg.sender) (#332)
Reentrancy in ImpossibleFinance.deposit(uint256,address) (#335-338):
External calls:
- IERC20(underlying).safeTransferFrom(msg.sender,address(this),amount) (#336)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(amount,to) (#337)
Reentrancy in ImpossibleFinance.depositWithPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#313-317):
External calls:
- IERC20(underlying).permit(target,address(this),value,deadline,v,r,s) (#314)
- IERC20(underlying).safeTransferFrom(target,address(this),value) (#315)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(value,to) (#316)
Reentrancy in ImpossibleFinance.depositWithTransferPermit(address,uint256,uint256,uint8,bytes32,bytes32,address) (#319-322):
External calls:
- IERC20(underlying).transferWithPermit(target,address(this),value,deadline,v,r,s) (#320)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _deposit(value,to) (#321)
Reentrancy in ImpossibleFinance.staxMigrate(uint256) (#579-584):
External calls:
- require(bool,string)(staxContract.transferFrom(msg.sender,address(this),amount),IF V1: STAX contract transferFrom failed) (#582)
Event emitted after the call(s):
- Transfer(address(0),account,amount) (#386)
- _mint(msg.sender,amount) (#583)
Apply the check-effects-interactions pattern.
Additional information: link
ImpossibleFinance.mpc() (#172-177) uses timestamp for comparisons
Dangerous comparisons:
- block.timestamp >= delayVault (#173)
ImpossibleFinance.applyVault() (#203-206) uses timestamp for comparisons
Dangerous comparisons:
- require(bool)(block.timestamp >= delayVault) (#204)
ImpossibleFinance.applyMinter() (#208-212) uses timestamp for comparisons
Dangerous comparisons:
- require(bool)(block.timestamp >= delayMinter) (#209)
ImpossibleFinance.permit(address,address,uint256,uint256,uint8,bytes32,bytes32) (#441-458) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(block.timestamp <= deadline,AnyswapV3ERC20: Expired permit) (#442)
ImpossibleFinance.transferWithPermit(address,address,uint256,uint256,uint8,bytes32,bytes32) (#460-484) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(block.timestamp <= deadline,AnyswapV3ERC20: Expired permit) (#461)
Avoid relying on block.timestamp.
Additional information: link
Low level call in SafeERC20.callOptionalReturn(IERC20,bytes) (#101-112):
- (success,returndata) = address(token).call(data) (#105)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Parameter ImpossibleFinance.initVault(address)._vault (#183) is not in mixedCase
Parameter ImpossibleFinance.setMinter(address)._auth (#193) is not in mixedCase
Parameter ImpossibleFinance.setVault(address)._vault (#198) is not in mixedCase
Parameter ImpossibleFinance.revokeMinter(address)._auth (#215) is not in mixedCase
Function ImpossibleFinance.Swapin(bytes32,address,uint256) (#251-255) is not in mixedCase
Function ImpossibleFinance.Swapout(uint256,address) (#257-263) is not in mixedCase
Variable ImpossibleFinance.DOMAIN_SEPARATOR (#125) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
ImpossibleFinance.delay (#138) should be constant
ImpossibleFinance.delayDelay (#155) should be constant
ImpossibleFinance.pendingDelay (#154) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
owner() should be declared external:
- ImpossibleFinance.owner() (#168-170)
changeMPCOwner(address) should be declared external:
- ImpossibleFinance.changeMPCOwner(address) (#232-238)
Swapin(bytes32,address,uint256) should be declared external:
- ImpossibleFinance.Swapin(bytes32,address,uint256) (#251-255)
Swapout(uint256,address) should be declared external:
- ImpossibleFinance.Swapout(uint256,address) (#257-263)
Use the external attribute for functions never called from the contract.
Additional information: link
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Unable to find token contract audit
Unable to verify token contract address on the website
Unable to find audit link on the website
Unable to find whitepaper link on the website
Unable to find token on CoinHunt
Additional information: link
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Last post in Twitter was more than 30 days ago
Unable to find Youtube account