JIGSAW Token Logo

JIGSAW Token

ALERT: honeypot scam

About JIGSAW

Listings

Token 2 years
white paper

Jigsaw is completely decentralized and all decisions are made by a community poll. This gives our developers a better idea of how to move forward with Jigsaw. We are apart of the Ghostface ecosystem, so our development team hold no tokens.

Jigsaw was created with the sole purpose of investors being able to collect $BNB while holding $JIGSAW.

Social

Laser Scorebeta Last Audit: 30 November 2021

report
Token seems to be a scam (type: honeypot scam).

Utils.addLiquidity(address,address,uint256,uint256) (#539-556) sends eth to arbitrary user
Dangerous calls:
- pancakeRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner,block.timestamp + 360) (#548-555)
Ensure that an arbitrary user cannot withdraw unauthorized funds.

Additional information: link

Reentrancy in JIGSAW._transfer(address,address,uint256,uint256) (#917-944):
External calls:
- swapAndLiquify(from,to) (#932)
- pancakeRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner,block.timestamp + 360) (#548-555)
- pancakeRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#509-515)
- Utils.swapTokensForEth(address(pancakeRouter),tokenAmountToBeSwapped) (#1140)
- Utils.addLiquidity(address(pancakeRouter),owner(),otherPiece,bnbToBeAddedToLiquidity) (#1153)
External calls sending eth:
- swapAndLiquify(from,to) (#932)
- pancakeRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner,block.timestamp + 360) (#548-555)
State variables written after the call(s):
- _tokenTransfer(from,to,amount,takeFee) (#943)
- _rOwned[address(this)] = _rOwned[address(this)].add(rLiquidity) (#873)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#972)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#981)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#973)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#791)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#992)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#983)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#993)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#793)
- _tokenTransfer(from,to,amount,takeFee) (#943)
- _rTotal = _rTotal.sub(rFee) (#828)
- _tokenTransfer(from,to,amount,takeFee) (#943)
- _tOwned[address(this)] = _tOwned[address(this)].add(tLiquidity) (#875)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#790)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#991)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#982)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#792)
Apply the check-effects-interactions pattern.

Additional information: link


Unable to verify that contract auditor is trusted: Certik, Quantstamp, Hacken, Solidity, Paladinsec, Openzeppelin, Verichains

JIGSAW.claimBNBReward() (#1053-1075) contains a tautology or contradiction:
- require(bool,string)(balanceOf(msg.sender) >= 0,Error: must own JIGSAW to claim reward) (#1055)
Fix the incorrect comparison by changing the value type or the comparison.

Additional information: link


Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.

JIGSAW.rewardThreshold (#1017) should be constant
Add the constant attributes to state variables that never change.

Additional information: link

changethreshHoldTopUpRate(uint256) should be declared external:
- JIGSAW.changethreshHoldTopUpRate(uint256) (#1182-1185)
Use the external attribute for functions never called from the contract.

Additional information: link

JIGSAW.swapAndLiquify(address,address) (#1110-1157) performs a multiplication on the result of a division:
-tokensExtra = otherPiece.mul(ghostPercentageOfLiquidity().div(10 ** 2)) (#1148)
Consider ordering multiplication before division.

Additional information: link

Reentrancy in JIGSAW.claimBNBReward() (#1053-1075):
External calls:
- Utils.swapETHForTokens(address(pancakeRouter),address(0x000000000000000000000000000000000000dEaD),reward.div(5)) (#1061-1065)
State variables written after the call(s):
- nextAvailableClaimDate[msg.sender] = block.timestamp + getRewardCycleBlock() (#1070)
Apply the check-effects-interactions pattern.

Additional information: link

Utils.addLiquidity(address,address,uint256,uint256) (#539-556) ignores return value by pancakeRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner,block.timestamp + 360) (#548-555)
Ensure that all the return values of the function calls are used.

Additional information: link

JIGSAW.calculateBNBReward(address).totalSupply (#1032-1035) shadows:
- JIGSAW.totalSupply() (#682-684) (function)
- IBEP20.totalSupply() (#6) (function)
Rename the local variables that shadow another component.

Additional information: link

Ownable.setGhostAddress(address) (#184-188) should emit an event for:
- _ghostFace = ghostAddress (#187)
Emit an event for critical parameter changes.

Additional information: link

JIGSAW.changethreshHoldTopUpRate(uint256) (#1182-1185) should emit an event for:
- threshHoldTopUpRate = _newrate (#1184)
Emit an event for critical parameter changes.

Additional information: link

Ownable.setGhostAddress(address).ghostAddress (#184) lacks a zero-check on :
- _ghostFace = ghostAddress (#187)
Check that the address is not zero.

Additional information: link

Reentrancy in JIGSAW.transferFrom(address,address,uint256) (#705-709):
External calls:
- _transfer(sender,recipient,amount,0) (#706)
- pancakeRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner,block.timestamp + 360) (#548-555)
- pancakeRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#509-515)
- Utils.swapTokensForEth(address(pancakeRouter),tokenAmountToBeSwapped) (#1140)
- Utils.addLiquidity(address(pancakeRouter),owner(),otherPiece,bnbToBeAddedToLiquidity) (#1153)
External calls sending eth:
- _transfer(sender,recipient,amount,0) (#706)
- pancakeRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner,block.timestamp + 360) (#548-555)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,BEP20: transfer amount exceeds allowance)) (#707)
- _allowances[owner][spender] = amount (#913)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in JIGSAW.transferFrom(address,address,uint256) (#705-709):
External calls:
- _transfer(sender,recipient,amount,0) (#706)
- pancakeRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner,block.timestamp + 360) (#548-555)
- pancakeRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#509-515)
- Utils.swapTokensForEth(address(pancakeRouter),tokenAmountToBeSwapped) (#1140)
- Utils.addLiquidity(address(pancakeRouter),owner(),otherPiece,bnbToBeAddedToLiquidity) (#1153)
External calls sending eth:
- _transfer(sender,recipient,amount,0) (#706)
- pancakeRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner,block.timestamp + 360) (#548-555)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#914)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,BEP20: transfer amount exceeds allowance)) (#707)
Apply the check-effects-interactions pattern.

Additional information: link

JIGSAW.ensureMaxTxAmount(address,address,uint256,uint256) (#1089-1103) uses timestamp for comparisons
Dangerous comparisons:
- value < disruptiveCoverageFee && block.timestamp >= disruptiveTransferEnabledFrom (#1099)
Avoid relying on block.timestamp.

Additional information: link

Address._functionCallWithValue(address,bytes,uint256,string) (#122-143) uses assembly
- INLINE ASM (#135-138)
Do not use evm assembly.

Additional information: link

JIGSAW.ensureMaxTxAmount(address,address,uint256,uint256) (#1089-1103) compares to a boolean constant:
-_isExcludedFromMaxTx[from] == false && _isExcludedFromMaxTx[to] == false (#1096-1097)
Remove the equality to the boolean constant.

Additional information: link

Context._msgData() (#80-83) is never used and should be removed
Remove unused functions.

Additional information: link

JIGSAW.minTokenNumberToSell (#1021) is set pre-construction with a non-constant function or state variable:
- _tTotal.mul(1).div(10000).div(10)
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.

Additional information: link

Pragma version>=0.6.8 (#590) allows old versions
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in JIGSAW.claimBNBReward() (#1053-1075):
- (sent) = address(msg.sender).call{value: reward}() (#1073)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Variable JIGSAW._liquidityFee (#1014) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

Redundant expression "this (#81)" inContext (#75-84)
Remove redundant statements if they congest code but offer no value.

Additional information: link

Variable JIGSAW._getValues(uint256).rTransferAmount (#834) is too similar to JIGSAW._transferFromExcluded(address,address,uint256).tTransferAmount (#990)
Prevent variables from having similar names.

Additional information: link

JIGSAW.slitherConstructorVariables() (#594-1187) uses literals with too many digits:
- _tTotal = 1000000000 * 10 ** 6 * 10 ** 9 (#609)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

Holders:


Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.


Token is deployed only at one blockchain


Token has only one trading pair


Unable to find PancakeSwap trading pair to compute liquidity.


Unable to find PancakeSwap trading pair to compute volume.


Unable to find PancakeSwap trading pair to compute number of swaps.


Twitter account link seems to be invalid


Unable to find Blog account (Reddit or Medium)


Unable to find Youtube account


Unable to find Discord account


BscScan page for the token does not contain additional info: website, socials, description, etc.

Additional information: link


Unable to find token on CoinMarketCap

Additional information: link


Unable to find token on CoinHunt

Additional information: link


Unable to find code repository for the project


Young tokens have high risks of scam / price dump / death


Young tokens have high risks of scam / price dump / death


Token has no active CoinMarketCap listing / rank


Token has a considerable age, but social accounts / website are missing or have few users


Token has a considerable age, but average PancakeSwap 30d trading volume is low


Young tokens have high risks of price dump / death


Token has relatively low CoinGecko rank

Price for JIGSAW