Infinity Trust Token Logo

INF [Infinity Trust] Token

About INF

Listings

Token 2 years
white paper

$INF - DeFi 3.0 #AutoStaking with All-time Highest Fixed APY 2,183,288.56% combined with the #MoveToEarn app makes it Perfect.Infinity is the standard health mobile app that integrates blockchain and cryptocurrency. Besides, Infinity is a SocialFi, everyone can share their goal, give challenges as well as health contests. Besides, they use the system to collect and analyze your health data to give advice on your lifestyle.

Social

Laser Scorebeta Last Audit: 5 May 2022

report
Token is either risky or in presale. For presale 30+ is a fine score.

InfinityFinance.swapBack() (InfinityFinance.sol#329-367) sends eth to arbitrary user
Dangerous calls:
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(treasuryFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#355-360)
- (success,None) = address(riskControlFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(riskControlFundFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#361-366)
Ensure that an arbitrary user cannot withdraw unauthorized funds.

Additional information: link

Reentrancy in InfinityFinance._transferFrom(address,address,uint256) (InfinityFinance.sol#203-247):
External calls:
- rebase() (InfinityFinance.sol#223)
- pairContract.sync() (InfinityFinance.sol#163)
- addLiquidity() (InfinityFinance.sol#226)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (InfinityFinance.sol#306-312)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (InfinityFinance.sol#317-324)
- swapBack() (InfinityFinance.sol#229)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (InfinityFinance.sol#343-349)
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(treasuryFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#355-360)
- (success,None) = address(riskControlFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(riskControlFundFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#361-366)
External calls sending eth:
- addLiquidity() (InfinityFinance.sol#226)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (InfinityFinance.sol#317-324)
- swapBack() (InfinityFinance.sol#229)
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(treasuryFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#355-360)
- (success,None) = address(riskControlFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(riskControlFundFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#361-366)
State variables written after the call(s):
- _gonBalances[sender] = _gonBalances[sender].sub(gonAmount) (InfinityFinance.sol#233)
- _gonBalances[recipient] = _gonBalances[recipient].add(gonAmountReceived) (InfinityFinance.sol#237-239)
- gonAmountReceived = takeFee(sender,recipient,gonAmount) (InfinityFinance.sol#234-236)
- _gonBalances[firePit] = _gonBalances[firePit].add(gonAmount.mul(firePitFee).div(feeDenominator)) (InfinityFinance.sol#268-270)
- _gonBalances[address(this)] = _gonBalances[address(this)].add(gonAmount.mul(_treasuryFee.add(_riskControlFundFee)).div(feeDenominator)) (InfinityFinance.sol#271-275)
- _gonBalances[autoLiquidityReceiver] = _gonBalances[autoLiquidityReceiver].add(gonAmount.mul(_liquidityFee).div(feeDenominator)) (InfinityFinance.sol#277-279)
- swapBack() (InfinityFinance.sol#229)
- inSwap = true (InfinityFinance.sol#58)
- inSwap = false (InfinityFinance.sol#60)
Apply the check-effects-interactions pattern.

Additional information: link

InfinityFinance._name (InfinityFinance.sol#17) shadows:
- ERC20Detailed._name (ERC20Detailed.sol#8)
InfinityFinance._symbol (InfinityFinance.sol#18) shadows:
- ERC20Detailed._symbol (ERC20Detailed.sol#9)
InfinityFinance._decimals (InfinityFinance.sol#19) shadows:
- ERC20Detailed._decimals (ERC20Detailed.sol#10)
Remove the state variable shadowing.

Additional information: link

ERC20Detailed.cleanPhishingToken(address) (ERC20Detailed.sol#43-48) ignores return value by IERC20(_token).transfer(msg.sender,IERC20(_token).balanceOf(address(this))) (ERC20Detailed.sol#44-47)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.

Additional information: link


Too many vulnerabilities (Unchecked transfer, Reentrancy vulnerability, etc.). High risk of a scam. DYOR & manual audit are advised.


Contract ownership is not renounced (belongs to a wallet)

InfinityFinance.isAntiWhaleEnded() (InfinityFinance.sol#95-100) uses a dangerous strict equality:
- antiWhaleStart == 0 (InfinityFinance.sol#96)
Don't use strict equality to determine if an account has enough Ether or tokens.

Additional information: link

InfinityFinance.swapBack().success (InfinityFinance.sol#355) is written in both
(success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(treasuryFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#355-360)
(success,None) = address(riskControlFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(riskControlFundFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#361-366)
Fix or remove the writes.

Additional information: link


Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.

InfinityFinance.rebase() (InfinityFinance.sol#136-166) performs a multiplication on the result of a division:
-times = deltaTime.div(360) (InfinityFinance.sol#141)
-epoch = times.mul(6) (InfinityFinance.sol#142)
InfinityFinance.rebase() (InfinityFinance.sol#136-166) performs a multiplication on the result of a division:
-times = deltaTime.div(360) (InfinityFinance.sol#141)
-_lastRebasedTime = _lastRebasedTime.add(times.mul(360)) (InfinityFinance.sol#161)
InfinityFinance.getLiquidityBacking(uint256) (InfinityFinance.sol#519-527) performs a multiplication on the result of a division:
-liquidityBalance = _gonBalances[pair].div(_gonsPerFragment) (InfinityFinance.sol#524)
-accuracy.mul(liquidityBalance.mul(2)).div(getCirculatingSupply()) (InfinityFinance.sol#525-526)
Consider ordering multiplication before division.

Additional information: link

InfinityFinance.addLiquidity() (InfinityFinance.sol#285-327) ignores return value by router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (InfinityFinance.sol#317-324)
Ensure that all the return values of the function calls are used.

Additional information: link

ERC20Detailed.setTrashBin(address).newTrashBin (ERC20Detailed.sol#38) lacks a zero-check on :
- _trashBin = newTrashBin (ERC20Detailed.sol#39)
InfinityFinance.setFeeReceivers(address,address,address)._autoLiquidityReceiver (InfinityFinance.sol#510) lacks a zero-check on :
- autoLiquidityReceiver = _autoLiquidityReceiver (InfinityFinance.sol#514)
InfinityFinance.setFeeReceivers(address,address,address)._treasuryReceiver (InfinityFinance.sol#511) lacks a zero-check on :
- treasuryReceiver = _treasuryReceiver (InfinityFinance.sol#515)
InfinityFinance.setFeeReceivers(address,address,address)._riskControlFundReceiver (InfinityFinance.sol#512) lacks a zero-check on :
- riskControlFundReceiver = _riskControlFundReceiver (InfinityFinance.sol#516)
InfinityFinance.setPairAddress(address)._pairAddress (InfinityFinance.sol#537) lacks a zero-check on :
- pairAddress = _pairAddress (InfinityFinance.sol#538)
Check that the address is not zero.

Additional information: link

Reentrancy in InfinityFinance.addLiquidity() (InfinityFinance.sol#285-327):
External calls:
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (InfinityFinance.sol#306-312)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (InfinityFinance.sol#317-324)
External calls sending eth:
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (InfinityFinance.sol#317-324)
State variables written after the call(s):
- _lastAddLiquidityTime = block.timestamp (InfinityFinance.sol#326)
Reentrancy in InfinityFinance.constructor() (InfinityFinance.sol#104-134):
External calls:
- pair = IPancakeSwapFactory(router.factory()).createPair(router.WETH(),address(this)) (InfinityFinance.sol#109-112)
State variables written after the call(s):
- _allowedFragments[address(this)][address(router)] = ~ uint256(0) (InfinityFinance.sol#118)
- _autoAddLiquidity = true (InfinityFinance.sol#128)
- _autoRebase = true (InfinityFinance.sol#127)
- _gonBalances[treasuryReceiver] = TOTAL_GONS (InfinityFinance.sol#123)
- _gonsPerFragment = TOTAL_GONS.div(_totalSupply) (InfinityFinance.sol#124)
- _initRebaseStartTime = block.timestamp (InfinityFinance.sol#125)
- _isFeeExempt[treasuryReceiver] = true (InfinityFinance.sol#129)
- _isFeeExempt[address(this)] = true (InfinityFinance.sol#130)
- _lastRebasedTime = block.timestamp (InfinityFinance.sol#126)
- _transferOwnership(treasuryReceiver) (InfinityFinance.sol#132)
- _owner = newOwner (Ownable.sol#45)
- _totalSupply = INITIAL_FRAGMENTS_SUPPLY (InfinityFinance.sol#122)
- autoLiquidityReceiver = 0x99B7501357c1274EBE4ebF18F30239F89D38c0bB (InfinityFinance.sol#114)
- pairAddress = pair (InfinityFinance.sol#119)
- pairContract = IPancakeSwapPair(pair) (InfinityFinance.sol#120)
- riskControlFundReceiver = 0xf4A89c419388C108bF7ec9B6FC6c6eAf30DDBb06 (InfinityFinance.sol#116)
- treasuryReceiver = 0x9CBF9fd973F9D6Df2bF66742a7B6c26CaEa143C8 (InfinityFinance.sol#115)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in InfinityFinance._transferFrom(address,address,uint256) (InfinityFinance.sol#203-247):
External calls:
- rebase() (InfinityFinance.sol#223)
- pairContract.sync() (InfinityFinance.sol#163)
- addLiquidity() (InfinityFinance.sol#226)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (InfinityFinance.sol#306-312)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (InfinityFinance.sol#317-324)
- swapBack() (InfinityFinance.sol#229)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (InfinityFinance.sol#343-349)
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(treasuryFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#355-360)
- (success,None) = address(riskControlFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(riskControlFundFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#361-366)
External calls sending eth:
- addLiquidity() (InfinityFinance.sol#226)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (InfinityFinance.sol#317-324)
- swapBack() (InfinityFinance.sol#229)
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(treasuryFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#355-360)
- (success,None) = address(riskControlFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(riskControlFundFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#361-366)
Event emitted after the call(s):
- Transfer(sender,address(this),feeAmount.div(_gonsPerFragment)) (InfinityFinance.sol#281)
- gonAmountReceived = takeFee(sender,recipient,gonAmount) (InfinityFinance.sol#234-236)
- Transfer(sender,recipient,gonAmountReceived.div(_gonsPerFragment)) (InfinityFinance.sol#241-245)
Reentrancy in InfinityFinance.constructor() (InfinityFinance.sol#104-134):
External calls:
- pair = IPancakeSwapFactory(router.factory()).createPair(router.WETH(),address(this)) (InfinityFinance.sol#109-112)
Event emitted after the call(s):
- OwnershipTransferred(_owner,newOwner) (Ownable.sol#44)
- _transferOwnership(treasuryReceiver) (InfinityFinance.sol#132)
- Transfer(address(0x0),treasuryReceiver,_totalSupply) (InfinityFinance.sol#133)
Reentrancy in InfinityFinance.rebase() (InfinityFinance.sol#136-166):
External calls:
- pairContract.sync() (InfinityFinance.sol#163)
Event emitted after the call(s):
- LogRebase(epoch,_totalSupply) (InfinityFinance.sol#165)
Apply the check-effects-interactions pattern.

Additional information: link

InfinityFinance.isAntiWhaleEnded() (InfinityFinance.sol#95-100) uses timestamp for comparisons
Dangerous comparisons:
- antiWhaleStart == 0 (InfinityFinance.sol#96)
- block.timestamp > antiWhaleStart.add(antiWhaleDuration) (InfinityFinance.sol#99)
InfinityFinance.rebase() (InfinityFinance.sol#136-166) uses timestamp for comparisons
Dangerous comparisons:
- deltaTimeFromInit < (31536000) (InfinityFinance.sol#144)
- deltaTimeFromInit >= (7 * 31536000) (InfinityFinance.sol#146)
- deltaTimeFromInit >= (2 * 31536000) (InfinityFinance.sol#148)
- i < times (InfinityFinance.sol#154)
InfinityFinance._transferFrom(address,address,uint256) (InfinityFinance.sol#203-247) uses timestamp for comparisons
Dangerous comparisons:
- ! isAntiWhaleEnded() && ! (addLPaddress[sender] || addLPaddress[recipient]) (InfinityFinance.sol#211-212)
InfinityFinance.shouldRebase() (InfinityFinance.sol#397-404) uses timestamp for comparisons
Dangerous comparisons:
- _autoRebase && (_totalSupply < MAX_SUPPLY) && msg.sender != pair && ! inSwap && block.timestamp >= (_lastRebasedTime + 360) (InfinityFinance.sol#398-403)
InfinityFinance.shouldAddLiquidity() (InfinityFinance.sol#406-412) uses timestamp for comparisons
Dangerous comparisons:
- _autoAddLiquidity && ! inSwap && msg.sender != pair && block.timestamp >= (_lastAddLiquidityTime + 172800) (InfinityFinance.sol#407-411)
Avoid relying on block.timestamp.

Additional information: link

SafeMath.mod(uint256,uint256) (SafeMath.sol#55-58) is never used and should be removed
Remove unused functions.

Additional information: link

Pragma version^0.8.12 (ERC20Detailed.sol#3) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
Pragma version^0.8.12 (IERC20.sol#4) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
Pragma version^0.8.12 (IPancakeSwapFactory.sol#4) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
Pragma version^0.8.12 (IPancakeSwapPair.sol#4) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
Pragma version^0.8.12 (IPancakeSwapRouter.sol#4) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
Pragma version^0.8.12 (InfinityFinance.sol#4) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
Pragma version^0.8.12 (Ownable.sol#4) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
Pragma version^0.8.12 (SafeMath.sol#4) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
solc-0.8.13 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in InfinityFinance.swapBack() (InfinityFinance.sol#329-367):
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(treasuryFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#355-360)
- (success,None) = address(riskControlFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndIRF.mul(riskControlFundFee).div(treasuryFee.add(riskControlFundFee))}() (InfinityFinance.sol#361-366)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Parameter ERC20Detailed.cleanPhishingToken(address)._token (ERC20Detailed.sol#43) is not in mixedCase
Parameter ERC20Detailed.sweepBNB(uint256)._amount (ERC20Detailed.sol#51) is not in mixedCase
Function IPancakeSwapPair.DOMAIN_SEPARATOR() (IPancakeSwapPair.sol#39) is not in mixedCase
Function IPancakeSwapPair.PERMIT_TYPEHASH() (IPancakeSwapPair.sol#41) is not in mixedCase
Function IPancakeSwapPair.MINIMUM_LIQUIDITY() (IPancakeSwapPair.sol#72) is not in mixedCase
Function IPancakeSwapRouter.WETH() (IPancakeSwapRouter.sol#9) is not in mixedCase
Parameter InfinityFinance.setAddLPAddress(address)._address (InfinityFinance.sol#85) is not in mixedCase
Parameter InfinityFinance.setAntiWhaleAmount(uint256)._amount (InfinityFinance.sol#90) is not in mixedCase
Parameter InfinityFinance.setAutoRebase(bool)._flag (InfinityFinance.sol#418) is not in mixedCase
Parameter InfinityFinance.setAutoAddLiquidity(bool)._flag (InfinityFinance.sol#427) is not in mixedCase
Parameter InfinityFinance.checkFeeExempt(address)._addr (InfinityFinance.sol#490) is not in mixedCase
Parameter InfinityFinance.setFeeReceivers(address,address,address)._autoLiquidityReceiver (InfinityFinance.sol#510) is not in mixedCase
Parameter InfinityFinance.setFeeReceivers(address,address,address)._treasuryReceiver (InfinityFinance.sol#511) is not in mixedCase
Parameter InfinityFinance.setFeeReceivers(address,address,address)._riskControlFundReceiver (InfinityFinance.sol#512) is not in mixedCase
Parameter InfinityFinance.setWhitelist(address)._addr (InfinityFinance.sol#529) is not in mixedCase
Parameter InfinityFinance.removeWhitelist(address)._addr (InfinityFinance.sol#533) is not in mixedCase
Parameter InfinityFinance.setPairAddress(address)._pairAddress (InfinityFinance.sol#537) is not in mixedCase
Parameter InfinityFinance.setLP(address)._address (InfinityFinance.sol#541) is not in mixedCase
Constant InfinityFinance._name (InfinityFinance.sol#17) is not in UPPER_CASE_WITH_UNDERSCORES
Constant InfinityFinance._symbol (InfinityFinance.sol#18) is not in UPPER_CASE_WITH_UNDERSCORES
Constant InfinityFinance._decimals (InfinityFinance.sol#19) is not in UPPER_CASE_WITH_UNDERSCORES
Variable InfinityFinance._isFeeExempt (InfinityFinance.sol#22) is not in mixedCase
Constant InfinityFinance.liquidityFee (InfinityFinance.sol#36) is not in UPPER_CASE_WITH_UNDERSCORES
Constant InfinityFinance.treasuryFee (InfinityFinance.sol#37) is not in UPPER_CASE_WITH_UNDERSCORES
Constant InfinityFinance.riskControlFundFee (InfinityFinance.sol#38) is not in UPPER_CASE_WITH_UNDERSCORES
Constant InfinityFinance.firePitFee (InfinityFinance.sol#39) is not in UPPER_CASE_WITH_UNDERSCORES
Constant InfinityFinance.feeDenominator (InfinityFinance.sol#42) is not in UPPER_CASE_WITH_UNDERSCORES
Constant InfinityFinance.firePit (InfinityFinance.sol#46-47) is not in UPPER_CASE_WITH_UNDERSCORES
Variable InfinityFinance._autoRebase (InfinityFinance.sol#68) is not in mixedCase
Variable InfinityFinance._autoAddLiquidity (InfinityFinance.sol#69) is not in mixedCase
Variable InfinityFinance._initRebaseStartTime (InfinityFinance.sol#70) is not in mixedCase
Variable InfinityFinance._lastRebasedTime (InfinityFinance.sol#71) is not in mixedCase
Variable InfinityFinance._lastAddLiquidityTime (InfinityFinance.sol#72) is not in mixedCase
Variable InfinityFinance._totalSupply (InfinityFinance.sol#73) is not in mixedCase
Constant InfinityFinance.antiWhaleDuration (InfinityFinance.sol#83) is not in UPPER_CASE_WITH_UNDERSCORES
Follow the Solidity naming convention.

Additional information: link

Variable IPancakeSwapRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (IPancakeSwapRouter.sol#14) is too similar to IPancakeSwapRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (IPancakeSwapRouter.sol#15)
Prevent variables from having similar names.

Additional information: link

ERC20Detailed.constructor(string,string,uint8) (ERC20Detailed.sol#14-24) uses literals with too many digits:
- _trashBin = 0x0000000000000000000000000000000000000000 (ERC20Detailed.sol#23)
InfinityFinance.slitherConstructorConstantVariables() (InfinityFinance.sol#12-554) uses literals with too many digits:
- DEAD = 0x000000000000000000000000000000000000dEaD (InfinityFinance.sol#44)
InfinityFinance.slitherConstructorConstantVariables() (InfinityFinance.sol#12-554) uses literals with too many digits:
- ZERO = 0x0000000000000000000000000000000000000000 (InfinityFinance.sol#45)
InfinityFinance.slitherConstructorConstantVariables() (InfinityFinance.sol#12-554) uses literals with too many digits:
- firePit = 0x000000000000000000000000000000000000dEaD (InfinityFinance.sol#46-47)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

InfinityFinance.totalFee (InfinityFinance.sol#40-41) should be constant
Add the constant attributes to state variables that never change.

Additional information: link

name() should be declared external:
- ERC20Detailed.name() (ERC20Detailed.sol#26-28)
symbol() should be declared external:
- ERC20Detailed.symbol() (ERC20Detailed.sol#30-32)
decimals() should be declared external:
- ERC20Detailed.decimals() (ERC20Detailed.sol#34-36)
setTrashBin(address) should be declared external:
- ERC20Detailed.setTrashBin(address) (ERC20Detailed.sol#38-40)
cleanPhishingToken(address) should be declared external:
- ERC20Detailed.cleanPhishingToken(address) (ERC20Detailed.sol#43-48)
sweepBNB(uint256) should be declared external:
- ERC20Detailed.sweepBNB(uint256) (ERC20Detailed.sol#51-55)
setAddLPAddress(address) should be declared external:
- InfinityFinance.setAddLPAddress(address) (InfinityFinance.sol#85-88)
setAntiWhaleAmount(uint256) should be declared external:
- InfinityFinance.setAntiWhaleAmount(uint256) (InfinityFinance.sol#90-93)
owner() should be declared external:
- Ownable.owner() (Ownable.sol#20-22)
renounceOwnership() should be declared external:
- Ownable.renounceOwnership() (Ownable.sol#33-36)
transferOwnership(address) should be declared external:
- Ownable.transferOwnership(address) (Ownable.sol#38-40)
Use the external attribute for functions never called from the contract.

Additional information: link

Holders:


Token seems to be untradeable: there is no PancakeSwap trading pair and no trading volumes. Ignore for presale.


Number of Binance Smart Chain (BSC) token holders is less than 100. Token is either dead or inactive. Ignore for presale.


Telegram account link seems to be invalid


Unable to find Blog account (Reddit or Medium)


Unable to find Youtube account


Twitter account has few posts


BscScan page for the token does not contain additional info: website, socials, description, etc.

Additional information: link


Unable to verify that token and website are owned by the same team (no listings + unable to find contract on website)


Unable to verify token contract address on the website


Unable to find audit link on the website


Unable to find whitepaper link on the website


Unable to find Telegram link on the website


Unable to find Twitter link on the website


Unable to find token on CoinGecko

Additional information: link


Unable to find token on CoinMarketCap

Additional information: link


Unable to find token on CoinHunt

Additional information: link


Unable to find code repository for the project


Young tokens have high risks of scam / price dump / death


Token has no active CoinMarketCap listing / rank


Young tokens have high risks of scam / price dump / death


Young tokens have high risks of scam / price dump / death


Token has no active CoinGecko listing / rank

Price for INF

News for INF