LevelUp is a P2E Blockchain Gaming Platform built for both players and game developers. Game developers get to list their games in our platform and connect their games with our P2E smart contract with ease. LevelUp holders get to enjoy a wide selection of P2E games listed in the platform.
LevelUpGaming.tokenSwap(bool) (#661-721) sends eth to arbitrary user
Dangerous calls:
- (tmpSuccess) = address(developerFeeReceiver).call{gas: 50000,value: amountBNBdeveloper}() (#705)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in LevelUpGaming._transferFrom(address,address,uint256) (#740-770):
External calls:
- tokenSwap(addressIsCheater) (#760)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#679-685)
- (tmpSuccess) = address(developerFeeReceiver).call{gas: 50000,value: amountBNBdeveloper}() (#705)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#711-718)
External calls sending eth:
- tokenSwap(addressIsCheater) (#760)
- (tmpSuccess) = address(developerFeeReceiver).call{gas: 50000,value: amountBNBdeveloper}() (#705)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#711-718)
State variables written after the call(s):
- _balances[sender] = _balances[sender].sub(amount,Insufficient Balance) (#763)
- _balances[recipient] = _balances[recipient].add(amountReceived) (#766)
- amountReceived = takeFee(sender,recipient,amount) (#765)
- _balances[address(this)] = _balances[address(this)].add(swapAmount) (#647)
- _balances[prizePoolHolder] = _balances[prizePoolHolder].add(rewardAmount) (#648)
Apply the check-effects-interactions pattern.
Additional information: link
LevelUpGaming.emergencyWithdraw(uint256,address,address) (#599-603) ignores return value by token.transfer(_receiver,_amount) (#602)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.
Additional information: link
Too many vulnerabilities (Unchecked transfer, Reentrancy vulnerability, etc.). High risk of a scam. DYOR & manual audit are advised.
Unable to verify that contract auditor is trusted: Certik, Quantstamp, Hacken, Solidity, Paladinsec, Openzeppelin, Verichains
LevelUpGaming.tokenSwap(bool).tmpSuccess (#705) is written in both
(tmpSuccess) = address(developerFeeReceiver).call{gas: 50000,value: amountBNBdeveloper}() (#705)
tmpSuccess = false (#707)
Fix or remove the writes.
Additional information: link
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
solc-0.8.9 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in LevelUpGaming.tokenSwap(bool) (#661-721):
- (tmpSuccess) = address(developerFeeReceiver).call{gas: 50000,value: amountBNBdeveloper}() (#705)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Variable LevelUpGaming._isCheater (#337) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
LevelUpGaming.takeFee(address,address,uint256) (#620-653) performs a multiplication on the result of a division:
-_rewardsFee = _rewardsFeeCheater * sellMulti.div(1000) (#638)
Consider ordering multiplication before division.
Additional information: link
LevelUpGaming.tokenSwap(bool).dynamicLiquidityFee (#662) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.
Additional information: link
LevelUpGaming.tokenSwap(bool) (#661-721) ignores return value by router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#711-718)
Ensure that all the return values of the function calls are used.
Additional information: link
LevelUpGaming.setTargetLiquidity(uint256,uint256) (#585-588) should emit an event for:
- targetLiquidity = _target (#586)
- targetLiquidityDenominator = _denominator (#587)
Emit an event for critical parameter changes.
Additional information: link
LevelUpGaming.setRewardsAddress(address)._reward (#594) lacks a zero-check on :
- prizePoolHolder = _reward (#595)
Check that the address is not zero.
Additional information: link
Reentrancy in LevelUpGaming.constructor() (#376-396):
External calls:
- pair = IDEXFactory(router.factory()).createPair(0xbb4CdB9CBd36B01bD1cBaEBF2De08d9173bc095c,address(this)) (#383)
State variables written after the call(s):
- _allowances[address(this)][address(router)] = type()(uint256).max (#384)
- _balances[msg.sender] = _totalSupply (#394)
- autoLiquidityReceiver = 0xe2CA18A50C08B540E737a0Fa73266F638c18286f (#391)
- developerFeeReceiver = 0xe2CA18A50C08B540E737a0Fa73266F638c18286f (#392)
- isFeeExempt[msg.sender] = true (#388)
- isTxLimitExempt[msg.sender] = true (#389)
- prizePoolWallet = new LevelUpPrizePool(address(address(this))) (#386)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in LevelUpGaming.tokenSwap(bool) (#661-721):
External calls:
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#679-685)
- (tmpSuccess) = address(developerFeeReceiver).call{gas: 50000,value: amountBNBdeveloper}() (#705)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#711-718)
External calls sending eth:
- (tmpSuccess) = address(developerFeeReceiver).call{gas: 50000,value: amountBNBdeveloper}() (#705)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#711-718)
Event emitted after the call(s):
- AutoLiquify(amountBNBLiquidity,amountToLiquify) (#719)
Apply the check-effects-interactions pattern.
Additional information: link
LevelUpGaming.claim(uint256,uint256,bytes32[]) (#437-451) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(prizePoolWallet.getClaimCooldownTimer(msg.sender) < block.timestamp,Please wait for cooldown between claims) (#445)
Avoid relying on block.timestamp.
Additional information: link
LevelUpGaming._transferFrom(address,address,uint256) (#740-770) compares to a boolean constant:
-require(bool)(tradingIsEnabled == true || sender == owner || recipient == owner) (#743)
Remove the equality to the boolean constant.
Additional information: link
LevelUpGaming.swapThreshold (#371) is set pre-construction with a non-constant function or state variable:
- _totalSupply * 10 / 10000
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
Reentrancy in LevelUpGaming.clearStuckBalance(uint256) (#457-465):
External calls:
- address(autoLiquidityReceiver).transfer(amountBNB * amountPercentage / 100) (#461)
State variables written after the call(s):
- approve(address(this),amountTokens) (#462)
- _allowances[msg.sender][spender] = amount (#409)
- _basicTransfer(address(this),msg.sender,amountTokens) (#463)
- _balances[sender] = _balances[sender].sub(amount,Insufficient Balance) (#419)
- _balances[recipient] = _balances[recipient].add(amount) (#420)
Event emitted after the call(s):
- Approval(msg.sender,spender,amount) (#410)
- approve(address(this),amountTokens) (#462)
- Transfer(sender,recipient,amount) (#421)
- _basicTransfer(address(this),msg.sender,amountTokens) (#463)
Apply the check-effects-interactions pattern.
Additional information: link
Variable IDEXRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#162) is too similar to IDEXRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#163)
Prevent variables from having similar names.
Additional information: link
LevelUpGaming.slitherConstructorVariables() (#314-784) uses literals with too many digits:
- ZERO = 0x0000000000000000000000000000000000000000 (#318)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
LevelUpPrizePool.blockTimestamp (#214) is never used in LevelUpPrizePool (#206-311)
Remove unused state variables.
Additional information: link
LevelUpPrizePool.minClaimLimit (#213) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
checkIsCheater(address) should be declared external:
- LevelUpGaming.checkIsCheater(address) (#605-607)
Use the external attribute for functions never called from the contract.
Additional information: link
Average 30d PancakeSwap volume is less than $100. Token is either dead or inactive.
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute number of swaps.
Young tokens have high risks of price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinGecko rank
Token has relatively low CoinMarketCap rank
Twitter account link seems to be invalid
Unable to find Discord account