INVERSE Token Logo

INVERSE Token

About INVERSE

Listings

Token 21 months
CoinMarketCap 19 months
white paper

The Inverse Protocol has an automatic staking and compounding feature built into it's Smart Contract and provides the highest fixed APY in the market at around 400,000.00%. Backed by the Safechaintoken team. Liquidity locked for 13,5 years. KYC & Audit by Solidproof. Team tokens are locked. Launching on Pancakeswap + Safechainswap.The team already has a running project with over 600,000$ MC (12,500,000$ ATH) with utility like Staking and Swap. $INVERSE will also be integrated into those products.

Social

Laser Scorebeta Last Audit: 2 September 2022

report
Token is either risky or in presale. For presale 30+ is a fine score.

Reentrancy in INVERSE._transferFrom(address,address,uint256) (#567-606):
External calls:
- rebase() (#579)
- pairContract.sync() (#526)
- addLiquidity() (#583)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#658-664)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#669-676)
- swapBack() (#587)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#695-701)
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(treasuryFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#707-712)
- (success,None) = address(inverseInsuranceFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(inverseInsuranceFundFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#713-718)
External calls sending eth:
- addLiquidity() (#583)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#669-676)
- swapBack() (#587)
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(treasuryFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#707-712)
- (success,None) = address(inverseInsuranceFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(inverseInsuranceFundFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#713-718)
State variables written after the call(s):
- _gonBalances[sender] = _gonBalances[sender].sub(gonAmount) (#591)
- _gonBalances[recipient] = _gonBalances[recipient].add(gonAmountReceived) (#595-597)
- gonAmountReceived = takeFee(sender,recipient,gonAmount) (#592-594)
- _gonBalances[firePit] = _gonBalances[firePit].add(gonAmount.div(feeDenominator).mul(firePitFee)) (#623-625)
- _gonBalances[address(this)] = _gonBalances[address(this)].add(gonAmount.div(feeDenominator).mul(_treasuryFee.add(inverseInsuranceFundFee))) (#626-628)
- _gonBalances[autoLiquidityReceiver] = _gonBalances[autoLiquidityReceiver].add(gonAmount.div(feeDenominator).mul(liquidityFee)) (#629-631)
- swapBack() (#587)
- inSwap = true (#445)
- inSwap = false (#447)
Apply the check-effects-interactions pattern.

Additional information: link


Too many vulnerabilities (Unchecked transfer, Reentrancy vulnerability, etc.). High risk of a scam. DYOR & manual audit are advised.

INVERSE._name (#402) shadows:
- ERC20Detailed._name (#368)
INVERSE._symbol (#403) shadows:
- ERC20Detailed._symbol (#369)
INVERSE._decimals (#404) shadows:
- ERC20Detailed._decimals (#370)
Remove the state variable shadowing.

Additional information: link

INVERSE.swapBack() (#681-719) sends eth to arbitrary user
Dangerous calls:
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(treasuryFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#707-712)
- (success,None) = address(inverseInsuranceFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(inverseInsuranceFundFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#713-718)
Ensure that an arbitrary user cannot withdraw unauthorized funds.

Additional information: link


Contract ownership is not renounced (belongs to a wallet)

INVERSE.swapBack().success (#707) is written in both
(success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(treasuryFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#707-712)
(success,None) = address(inverseInsuranceFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(inverseInsuranceFundFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#713-718)
Fix or remove the writes.

Additional information: link


Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Unable to verify that contract auditor is trusted: Certik, Quantstamp, Hacken, Solidity, Paladinsec, Openzeppelin, Verichains


Not a direct threat, but may indicate unreliable intentions of developer. Widespread names (e.g. Elon, King, Moon, Doge) are common among meme-tokens and scams. The allow to gain free hype and attract unexperienced investors.

INVERSE.rebase() (#498-529) performs a multiplication on the result of a division:
-times = deltaTime.div(900) (#504)
-epoch = times.mul(15) (#505)
INVERSE.rebase() (#498-529) performs a multiplication on the result of a division:
-times = deltaTime.div(900) (#504)
-_lastRebasedTime = _lastRebasedTime.add(times.mul(900)) (#524)
INVERSE.takeFee(address,address,uint256) (#608-635) performs a multiplication on the result of a division:
-feeAmount = gonAmount.div(feeDenominator).mul(_totalFee) (#621)
INVERSE.takeFee(address,address,uint256) (#608-635) performs a multiplication on the result of a division:
-_gonBalances[firePit] = _gonBalances[firePit].add(gonAmount.div(feeDenominator).mul(firePitFee)) (#623-625)
INVERSE.takeFee(address,address,uint256) (#608-635) performs a multiplication on the result of a division:
-_gonBalances[address(this)] = _gonBalances[address(this)].add(gonAmount.div(feeDenominator).mul(_treasuryFee.add(inverseInsuranceFundFee))) (#626-628)
INVERSE.takeFee(address,address,uint256) (#608-635) performs a multiplication on the result of a division:
-_gonBalances[autoLiquidityReceiver] = _gonBalances[autoLiquidityReceiver].add(gonAmount.div(feeDenominator).mul(liquidityFee)) (#629-631)
INVERSE.getLiquidityBacking(uint256) (#873-881) performs a multiplication on the result of a division:
-liquidityBalance = _gonBalances[pair].div(_gonsPerFragment) (#878)
-accuracy.mul(liquidityBalance.mul(2)).div(getCirculatingSupply()) (#879-880)
Consider ordering multiplication before division.

Additional information: link

INVERSE.addLiquidity() (#637-679) ignores return value by router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#669-676)
Ensure that all the return values of the function calls are used.

Additional information: link

INVERSE.setFeeReceivers(address,address,address,address)._autoLiquidityReceiver (#862) lacks a zero-check on :
- autoLiquidityReceiver = _autoLiquidityReceiver (#867)
INVERSE.setFeeReceivers(address,address,address,address)._treasuryReceiver (#863) lacks a zero-check on :
- treasuryReceiver = _treasuryReceiver (#868)
INVERSE.setFeeReceivers(address,address,address,address)._inverseInsuranceFundReceiver (#864) lacks a zero-check on :
- inverseInsuranceFundReceiver = _inverseInsuranceFundReceiver (#869)
INVERSE.setFeeReceivers(address,address,address,address)._firePit (#865) lacks a zero-check on :
- firePit = _firePit (#870)
INVERSE.setPairAddress(address)._pairAddress (#892) lacks a zero-check on :
- pairAddress = _pairAddress (#893)
Check that the address is not zero.

Additional information: link

Reentrancy in INVERSE.addLiquidity() (#637-679):
External calls:
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#658-664)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#669-676)
External calls sending eth:
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#669-676)
State variables written after the call(s):
- _lastAddLiquidityTime = block.timestamp (#678)
Reentrancy in INVERSE.constructor() (#467-496):
External calls:
- pair = IPancakeSwapFactory(router.factory()).createPair(router.WETH(),address(this)) (#470-473)
State variables written after the call(s):
- _allowedFragments[address(this)][address(router)] = uint256(- 1) (#480)
- _autoAddLiquidity = true (#490)
- _autoRebase = true (#489)
- _gonBalances[treasuryReceiver] = TOTAL_GONS (#485)
- _gonsPerFragment = TOTAL_GONS.div(_totalSupply) (#486)
- _initRebaseStartTime = block.timestamp (#487)
- _isFeeExempt[treasuryReceiver] = true (#491)
- _isFeeExempt[address(this)] = true (#492)
- _lastRebasedTime = block.timestamp (#488)
- _transferOwnership(treasuryReceiver) (#494)
- _owner = newOwner (#363)
- _totalSupply = INITIAL_FRAGMENTS_SUPPLY (#484)
- autoLiquidityReceiver = 0x0d56ba13992D8AA242d78841d37cC296cC9FD876 (#475)
- firePit = 0xb830385f909da47b90EdBd4e8C6cDF30171bB308 (#478)
- inverseInsuranceFundReceiver = 0x9383350bC4Cda0b7D94f0B10e215279257E7ceA9 (#477)
- pairAddress = pair (#481)
- pairContract = IPancakeSwapPair(pair) (#482)
- treasuryReceiver = 0x087a967E18Eb39DDFd656fF1294aDC90CDa8f3BC (#476)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in INVERSE._transferFrom(address,address,uint256) (#567-606):
External calls:
- rebase() (#579)
- pairContract.sync() (#526)
- addLiquidity() (#583)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#658-664)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#669-676)
- swapBack() (#587)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#695-701)
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(treasuryFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#707-712)
- (success,None) = address(inverseInsuranceFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(inverseInsuranceFundFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#713-718)
External calls sending eth:
- addLiquidity() (#583)
- router.addLiquidityETH{value: amountETHLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#669-676)
- swapBack() (#587)
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(treasuryFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#707-712)
- (success,None) = address(inverseInsuranceFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(inverseInsuranceFundFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#713-718)
Event emitted after the call(s):
- Transfer(sender,address(this),feeAmount.div(_gonsPerFragment)) (#633)
- gonAmountReceived = takeFee(sender,recipient,gonAmount) (#592-594)
- Transfer(sender,recipient,gonAmountReceived.div(_gonsPerFragment)) (#600-604)
Reentrancy in INVERSE.constructor() (#467-496):
External calls:
- pair = IPancakeSwapFactory(router.factory()).createPair(router.WETH(),address(this)) (#470-473)
Event emitted after the call(s):
- OwnershipTransferred(_owner,newOwner) (#362)
- _transferOwnership(treasuryReceiver) (#494)
- Transfer(address(0x0),treasuryReceiver,_totalSupply) (#495)
Reentrancy in INVERSE.rebase() (#498-529):
External calls:
- pairContract.sync() (#526)
Event emitted after the call(s):
- LogRebase(epoch,_totalSupply) (#528)
Apply the check-effects-interactions pattern.

Additional information: link

INVERSE.rebase() (#498-529) uses timestamp for comparisons
Dangerous comparisons:
- deltaTimeFromInit < (31536000) (#507)
- deltaTimeFromInit >= (31536000) (#509)
- deltaTimeFromInit >= ((15 * 31536000) / 10) (#511)
- deltaTimeFromInit >= (7 * 31536000) (#513)
- i < times (#517)
INVERSE.shouldRebase() (#747-754) uses timestamp for comparisons
Dangerous comparisons:
- _autoRebase && (_totalSupply < MAX_SUPPLY) && msg.sender != pair && ! inSwap && block.timestamp >= (_lastRebasedTime + 900) (#748-753)
INVERSE.shouldAddLiquidity() (#756-762) uses timestamp for comparisons
Dangerous comparisons:
- _autoAddLiquidity && ! inSwap && msg.sender != pair && block.timestamp >= (_lastAddLiquidityTime + 172800) (#757-761)
Avoid relying on block.timestamp.

Additional information: link

SafeMath.mod(uint256,uint256) (#90-93) is never used and should be removed
SafeMathInt.abs(int256) (#35-38) is never used and should be removed
SafeMathInt.add(int256,int256) (#29-33) is never used and should be removed
SafeMathInt.div(int256,int256) (#17-21) is never used and should be removed
SafeMathInt.mul(int256,int256) (#9-15) is never used and should be removed
SafeMathInt.sub(int256,int256) (#23-27) is never used and should be removed
Remove unused functions.

Additional information: link

Pragma version^0.7.4 (#3) allows old versions
solc-0.7.4 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in INVERSE.swapBack() (#681-719):
- (success) = address(treasuryReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(treasuryFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#707-712)
- (success,None) = address(inverseInsuranceFundReceiver).call{gas: 30000,value: amountETHToTreasuryAndSIF.mul(inverseInsuranceFundFee).div(treasuryFee.add(inverseInsuranceFundFee))}() (#713-718)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Function IPancakeSwapPair.DOMAIN_SEPARATOR() (#140) is not in mixedCase
Function IPancakeSwapPair.PERMIT_TYPEHASH() (#141) is not in mixedCase
Function IPancakeSwapPair.MINIMUM_LIQUIDITY() (#158) is not in mixedCase
Function IPancakeSwapRouter.WETH() (#178) is not in mixedCase
Parameter INVERSE.setAutoRebase(bool)._flag (#770) is not in mixedCase
Parameter INVERSE.setAutoAddLiquidity(bool)._flag (#779) is not in mixedCase
Parameter INVERSE.checkFeeExempt(address)._addr (#842) is not in mixedCase
Parameter INVERSE.setFeeReceivers(address,address,address,address)._autoLiquidityReceiver (#862) is not in mixedCase
Parameter INVERSE.setFeeReceivers(address,address,address,address)._treasuryReceiver (#863) is not in mixedCase
Parameter INVERSE.setFeeReceivers(address,address,address,address)._inverseInsuranceFundReceiver (#864) is not in mixedCase
Parameter INVERSE.setFeeReceivers(address,address,address,address)._firePit (#865) is not in mixedCase
Parameter INVERSE.setWhitelist(address)._addr (#883) is not in mixedCase
Parameter INVERSE.setBotBlacklist(address,bool)._botAddress (#887) is not in mixedCase
Parameter INVERSE.setBotBlacklist(address,bool)._flag (#887) is not in mixedCase
Parameter INVERSE.setPairAddress(address)._pairAddress (#892) is not in mixedCase
Parameter INVERSE.setLP(address)._address (#896) is not in mixedCase
Variable INVERSE._name (#402) is not in mixedCase
Variable INVERSE._symbol (#403) is not in mixedCase
Variable INVERSE._decimals (#404) is not in mixedCase
Variable INVERSE._isFeeExempt (#407) is not in mixedCase
Variable INVERSE.DEAD (#432) is not in mixedCase
Variable INVERSE.ZERO (#433) is not in mixedCase
Variable INVERSE._autoRebase (#455) is not in mixedCase
Variable INVERSE._autoAddLiquidity (#456) is not in mixedCase
Variable INVERSE._initRebaseStartTime (#457) is not in mixedCase
Variable INVERSE._lastRebasedTime (#458) is not in mixedCase
Variable INVERSE._lastAddLiquidityTime (#459) is not in mixedCase
Variable INVERSE._totalSupply (#460) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

Variable IPancakeSwapRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#183) is too similar to IPancakeSwapRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#184)
Prevent variables from having similar names.

Additional information: link

INVERSE.slitherConstructorVariables() (#395-916) uses literals with too many digits:
- DEAD = 0x000000000000000000000000000000000000dEaD (#432)
INVERSE.slitherConstructorVariables() (#395-916) uses literals with too many digits:
- ZERO = 0x0000000000000000000000000000000000000000 (#433)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

SafeMathInt.MAX_INT256 (#7) is never used in SafeMathInt (#5-39)
Remove unused state variables.

Additional information: link

INVERSE.DEAD (#432) should be constant
INVERSE.ZERO (#433) should be constant
INVERSE._decimals (#404) should be constant
INVERSE._name (#402) should be constant
INVERSE._symbol (#403) should be constant
INVERSE.feeDenominator (#430) should be constant
INVERSE.firePitFee (#425) should be constant
INVERSE.inverseInsuranceFundFee (#423) should be constant
INVERSE.liquidityFee (#421) should be constant
INVERSE.sellFee (#424) should be constant
INVERSE.swapEnabled (#440) should be constant
INVERSE.treasuryFee (#422) should be constant
Add the constant attributes to state variables that never change.

Additional information: link

owner() should be declared external:
- Ownable.owner() (#338-340)
renounceOwnership() should be declared external:
- Ownable.renounceOwnership() (#351-354)
transferOwnership(address) should be declared external:
- Ownable.transferOwnership(address) (#356-358)
name() should be declared external:
- ERC20Detailed.name() (#382-384)
symbol() should be declared external:
- ERC20Detailed.symbol() (#386-388)
decimals() should be declared external:
- ERC20Detailed.decimals() (#390-392)
getLiquidityBacking(uint256) should be declared external:
- INVERSE.getLiquidityBacking(uint256) (#873-881)
setPairAddress(address) should be declared external:
- INVERSE.setPairAddress(address) (#892-894)
Use the external attribute for functions never called from the contract.

Additional information: link

INVERSE.isContract(address) (#908-912) uses assembly
- INLINE ASM (#910)
Do not use evm assembly.

Additional information: link

INVERSE.rebase().rebaseRate (#501) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.

Additional information: link

INVERSE.totalFee (#426-429) is set pre-construction with a non-constant function or state variable:
- liquidityFee.add(treasuryFee).add(inverseInsuranceFundFee).add(firePitFee)
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.

Additional information: link

Holders:


Average 30d PancakeSwap volume is less than $100. Token is either dead or inactive.

Contract has 14% buy tax and 17% sell tax.
Taxes are suspiciously high (over 10%) and contract ownership is not renounced. Token has a high risk of becoming a honeypot.


Average 30d number of PancakeSwap swaps is low.


Token is deployed only at one blockchain


Average PancakeSwap trading volume, liqudity, number of swaps are low. Token seems to be inactive.


Twitter account seems to be suspended

Additional information: link


Unable to find Youtube account


Unable to find Discord account


BscScan page for the token does not contain additional info: website, socials, description, etc.

Additional information: link


Unable to find token on CoinGecko

Additional information: link


Unable to find KYC or doxxing proof


Unable to find token on CoinHunt

Additional information: link


Unable to find code repository for the project


Token is not listed at Mobula.Finance

Additional information: link


Token has no active CoinGecko listing / rank


Young tokens have high risks of price dump / death


Young tokens have high risks of price dump / death


Token has relatively low CoinMarketCap rank


Young tokens have high risks of price dump / death

Price for INVERSE