MetaVerse-M Token Logo

M [MetaVerse-M] Token

About M

Listings

Token 2 months
CoinGecko 11 days
[CoinGecko] alert: The smart-contract owner can mint new tokens, please proceed with caution.

Meta (M) is a decentralized exchange running on Binance Smart Chain. What we built is a perpetual deflationary system, the (M) Token allows a constant price increase with a sufficient burning mechanism. We are not trying to replace the other exchanges but want to add value into the eco-system and create a suitable and sustainable environment for people to yield farm with safe and high returns.

Social

Laser Scorebeta Last Audit: 22 June 2022

report
Token is either risky or in presale. For presale 30+ is a fine score.

Anti-Scam

Links

MasterChef.safeMTransfer(address,uint256) (MasterChef.sol#220-227) ignores return value by m.transfer(_to,mBal) (MasterChef.sol#223)
MasterChef.safeMTransfer(address,uint256) (MasterChef.sol#220-227) ignores return value by m.transfer(_to,_amount) (MasterChef.sol#225)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.

Additional information: link


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

MasterChef.updatePool(uint256) (MasterChef.sol#147-163) uses a dangerous strict equality:
- lpSupply == 0 || pool.allocPoint == 0 (MasterChef.sol#153)
Metaverse._writeCheckpoint(address,uint32,uint256,uint256) (Meta.sol#215-233) uses a dangerous strict equality:
- nCheckpoints > 0 && checkpoints[delegatee][nCheckpoints - 1].fromBlock == blockNumber (Meta.sol#225)
Don't use strict equality to determine if an account has enough Ether or tokens.

Additional information: link

MasterChef.pendingM(uint256,address) (MasterChef.sol#125-136) performs a multiplication on the result of a division:
-mReward = multiplier.mul(mPerBlock).mul(pool.allocPoint).div(totalAllocPoint) (MasterChef.sol#132)
-accMPerShare = accMPerShare.add(mReward.mul(1e12).div(lpSupply)) (MasterChef.sol#133)
MasterChef.updatePool(uint256) (MasterChef.sol#147-163) performs a multiplication on the result of a division:
-mReward = multiplier.mul(mPerBlock).mul(pool.allocPoint).div(totalAllocPoint) (MasterChef.sol#158)
-pool.accMPerShare = pool.accMPerShare.add(mReward.mul(1e12).div(lpSupply)) (MasterChef.sol#161)
Consider ordering multiplication before division.

Additional information: link

Reentrancy in MasterChef.add(uint256,IBEP20,uint16,bool) (MasterChef.sol#92-106):
External calls:
- massUpdatePools() (MasterChef.sol#95)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
State variables written after the call(s):
- poolInfo.push(PoolInfo(_lpToken,_allocPoint,lastRewardBlock,0,_depositFeeBP)) (MasterChef.sol#99-105)
- totalAllocPoint = totalAllocPoint.add(_allocPoint) (MasterChef.sol#98)
Reentrancy in MasterChef.deposit(uint256,uint256) (MasterChef.sol#166-188):
External calls:
- updatePool(_pid) (MasterChef.sol#169)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
- safeMTransfer(msg.sender,pending) (MasterChef.sol#173)
- m.transfer(_to,mBal) (MasterChef.sol#223)
- m.transfer(_to,_amount) (MasterChef.sol#225)
- pool.lpToken.safeTransferFrom(address(msg.sender),address(this),_amount) (MasterChef.sol#177)
- pool.lpToken.safeTransfer(feeAddress,depositFee) (MasterChef.sol#180)
State variables written after the call(s):
- user.amount = user.amount.add(_amount).sub(depositFee) (MasterChef.sol#181)
Reentrancy in MasterChef.deposit(uint256,uint256) (MasterChef.sol#166-188):
External calls:
- updatePool(_pid) (MasterChef.sol#169)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
- safeMTransfer(msg.sender,pending) (MasterChef.sol#173)
- m.transfer(_to,mBal) (MasterChef.sol#223)
- m.transfer(_to,_amount) (MasterChef.sol#225)
- pool.lpToken.safeTransferFrom(address(msg.sender),address(this),_amount) (MasterChef.sol#177)
State variables written after the call(s):
- user.amount = user.amount.add(_amount) (MasterChef.sol#183)
Reentrancy in MasterChef.set(uint256,uint256,uint16,bool) (MasterChef.sol#109-117):
External calls:
- massUpdatePools() (MasterChef.sol#112)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
State variables written after the call(s):
- poolInfo[_pid].allocPoint = _allocPoint (MasterChef.sol#115)
- poolInfo[_pid].depositFeeBP = _depositFeeBP (MasterChef.sol#116)
- totalAllocPoint = totalAllocPoint.sub(poolInfo[_pid].allocPoint).add(_allocPoint) (MasterChef.sol#114)
Reentrancy in MasterChef.updateEmissionRate(uint256) (MasterChef.sol#241-244):
External calls:
- massUpdatePools() (MasterChef.sol#242)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
State variables written after the call(s):
- mPerBlock = _mPerBlock (MasterChef.sol#243)
Reentrancy in MasterChef.updatePool(uint256) (MasterChef.sol#147-163):
External calls:
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
State variables written after the call(s):
- pool.accMPerShare = pool.accMPerShare.add(mReward.mul(1e12).div(lpSupply)) (MasterChef.sol#161)
- pool.lastRewardBlock = block.number (MasterChef.sol#162)
Reentrancy in MasterChef.withdraw(uint256,uint256) (MasterChef.sol#191-206):
External calls:
- updatePool(_pid) (MasterChef.sol#195)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
- safeMTransfer(msg.sender,pending) (MasterChef.sol#198)
- m.transfer(_to,mBal) (MasterChef.sol#223)
- m.transfer(_to,_amount) (MasterChef.sol#225)
State variables written after the call(s):
- user.amount = user.amount.sub(_amount) (MasterChef.sol#201)
Reentrancy in MasterChef.withdraw(uint256,uint256) (MasterChef.sol#191-206):
External calls:
- updatePool(_pid) (MasterChef.sol#195)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
- safeMTransfer(msg.sender,pending) (MasterChef.sol#198)
- m.transfer(_to,mBal) (MasterChef.sol#223)
- m.transfer(_to,_amount) (MasterChef.sol#225)
- pool.lpToken.safeTransfer(address(msg.sender),_amount) (MasterChef.sol#202)
State variables written after the call(s):
- user.rewardDebt = user.amount.mul(pool.accMPerShare).div(1e12) (MasterChef.sol#204)
Apply the check-effects-interactions pattern.

Additional information: link

BEP20.constructor(string,string).name (BEP20.sol#56) shadows:
- BEP20.name() (BEP20.sol#72-74) (function)
- IBEP20.name() (IBEP20.sol#24) (function)
BEP20.constructor(string,string).symbol (BEP20.sol#56) shadows:
- BEP20.symbol() (BEP20.sol#80-82) (function)
- IBEP20.symbol() (IBEP20.sol#19) (function)
BEP20.allowance(address,address).owner (BEP20.sol#121) shadows:
- Ownable.owner() (Ownable.sol#35-37) (function)
BEP20._approve(address,address,uint256).owner (BEP20.sol#280) shadows:
- Ownable.owner() (Ownable.sol#35-37) (function)
Rename the local variables that shadow another component.

Additional information: link

MasterChef.add(uint256,IBEP20,uint16,bool) (MasterChef.sol#92-106) should emit an event for:
- totalAllocPoint = totalAllocPoint.add(_allocPoint) (MasterChef.sol#98)
MasterChef.set(uint256,uint256,uint16,bool) (MasterChef.sol#109-117) should emit an event for:
- totalAllocPoint = totalAllocPoint.sub(poolInfo[_pid].allocPoint).add(_allocPoint) (MasterChef.sol#114)
MasterChef.updateEmissionRate(uint256) (MasterChef.sol#241-244) should emit an event for:
- mPerBlock = _mPerBlock (MasterChef.sol#243)
Emit an event for critical parameter changes.

Additional information: link

MasterChef.constructor(Metaverse,address,address,uint256,uint256)._devaddr (MasterChef.sol#74) lacks a zero-check on :
- devaddr = _devaddr (MasterChef.sol#80)
MasterChef.constructor(Metaverse,address,address,uint256,uint256)._feeAddress (MasterChef.sol#75) lacks a zero-check on :
- feeAddress = _feeAddress (MasterChef.sol#81)
MasterChef.dev(address)._devaddr (MasterChef.sol#230) lacks a zero-check on :
- devaddr = _devaddr (MasterChef.sol#232)
MasterChef.setFeeAddress(address)._feeAddress (MasterChef.sol#235) lacks a zero-check on :
- feeAddress = _feeAddress (MasterChef.sol#237)
Timelock.constructor(address,uint256).admin_ (TimeLock.sol#41) lacks a zero-check on :
- admin = admin_ (TimeLock.sol#45)
Timelock.setPendingAdmin(address).pendingAdmin_ (TimeLock.sol#70) lacks a zero-check on :
- pendingAdmin = pendingAdmin_ (TimeLock.sol#78)
Timelock.executeTransaction(address,uint256,string,bytes,uint256).target (TimeLock.sol#103) lacks a zero-check on :
- (success,returnData) = target.call.value(value)(callData) (TimeLock.sol#122)
Check that the address is not zero.

Additional information: link

MasterChef.updatePool(uint256) (MasterChef.sol#147-163) has external calls inside a loop: lpSupply = pool.lpToken.balanceOf(address(this)) (MasterChef.sol#152)
MasterChef.updatePool(uint256) (MasterChef.sol#147-163) has external calls inside a loop: m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
MasterChef.updatePool(uint256) (MasterChef.sol#147-163) has external calls inside a loop: m.mint(address(this),mReward) (MasterChef.sol#160)
Favor pull over push strategy for external calls.

Additional information: link

Reentrancy in MasterChef.deposit(uint256,uint256) (MasterChef.sol#166-188):
External calls:
- updatePool(_pid) (MasterChef.sol#169)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
- safeMTransfer(msg.sender,pending) (MasterChef.sol#173)
- m.transfer(_to,mBal) (MasterChef.sol#223)
- m.transfer(_to,_amount) (MasterChef.sol#225)
- pool.lpToken.safeTransferFrom(address(msg.sender),address(this),_amount) (MasterChef.sol#177)
- pool.lpToken.safeTransfer(feeAddress,depositFee) (MasterChef.sol#180)
Event emitted after the call(s):
- Deposit(msg.sender,_pid,_amount) (MasterChef.sol#187)
Reentrancy in MasterChef.emergencyWithdraw(uint256) (MasterChef.sol#209-217):
External calls:
- pool.lpToken.safeTransfer(address(msg.sender),amount) (MasterChef.sol#215)
Event emitted after the call(s):
- EmergencyWithdraw(msg.sender,_pid,amount) (MasterChef.sol#216)
Reentrancy in Timelock.executeTransaction(address,uint256,string,bytes,uint256) (TimeLock.sol#103-128):
External calls:
- (success,returnData) = target.call.value(value)(callData) (TimeLock.sol#122)
Event emitted after the call(s):
- ExecuteTransaction(txHash,target,value,signature,data,eta) (TimeLock.sol#125)
Reentrancy in MasterChef.withdraw(uint256,uint256) (MasterChef.sol#191-206):
External calls:
- updatePool(_pid) (MasterChef.sol#195)
- m.mint(devaddr,mReward.div(10)) (MasterChef.sol#159)
- m.mint(address(this),mReward) (MasterChef.sol#160)
- safeMTransfer(msg.sender,pending) (MasterChef.sol#198)
- m.transfer(_to,mBal) (MasterChef.sol#223)
- m.transfer(_to,_amount) (MasterChef.sol#225)
- pool.lpToken.safeTransfer(address(msg.sender),_amount) (MasterChef.sol#202)
Event emitted after the call(s):
- Withdraw(msg.sender,_pid,_amount) (MasterChef.sol#205)
Apply the check-effects-interactions pattern.

Additional information: link

Metaverse.delegateBySig(address,uint256,uint256,uint8,bytes32,bytes32) (Meta.sol#81-122) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(now <= expiry,M::delegateBySig: signature expired) (Meta.sol#120)
Timelock.queueTransaction(address,uint256,string,bytes,uint256) (TimeLock.sol#83-92) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(eta >= getBlockTimestamp().add(delay),Timelock::queueTransaction: Estimated execution block must satisfy delay.) (TimeLock.sol#85)
Timelock.executeTransaction(address,uint256,string,bytes,uint256) (TimeLock.sol#103-128) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(getBlockTimestamp() >= eta,Timelock::executeTransaction: Transaction hasn't surpassed time lock.) (TimeLock.sol#108)
- require(bool,string)(getBlockTimestamp() <= eta.add(GRACE_PERIOD),Timelock::executeTransaction: Transaction is stale.) (TimeLock.sol#109)
Avoid relying on block.timestamp.

Additional information: link

Address.isContract(address) (Address.sol#26-35) uses assembly
- INLINE ASM (Address.sol#33)
Address._verifyCallResult(bool,bytes,string) (Address.sol#171-188) uses assembly
- INLINE ASM (Address.sol#180-183)
Metaverse.getChainId() (Meta.sol#240-244) uses assembly
- INLINE ASM (Meta.sol#242)
Do not use evm assembly.

Additional information: link

Different versions of Solidity is used:
- Version used: ['0.6.12', '>=0.4.0', '>=0.6.0<0.8.0', '>=0.6.2<0.8.0', '>=0.6.4']
- >=0.6.2<0.8.0 (Address.sol#3)
- >=0.4.0 (BEP20.sol#3)
- >=0.6.0<0.8.0 (Context.sol#3)
- >=0.6.4 (IBEP20.sol#3)
- 0.6.12 (MasterChef.sol#3)
- 0.6.12 (Meta.sol#4)
- >=0.6.0<0.8.0 (Ownable.sol#3)
- >=0.6.0<0.8.0 (SafeBEP20.sol#3)
- >=0.6.0<0.8.0 (SafeMath.sol#3)
- 0.6.12 (TimeLock.sol#14)
Use one Solidity version.

Additional information: link

Address.functionCall(address,bytes) (Address.sol#79-81) is never used and should be removed
Address.functionCallWithValue(address,bytes,uint256) (Address.sol#104-106) is never used and should be removed
Address.functionDelegateCall(address,bytes) (Address.sol#153-155) is never used and should be removed
Address.functionDelegateCall(address,bytes,string) (Address.sol#163-169) is never used and should be removed
Address.functionStaticCall(address,bytes) (Address.sol#129-131) is never used and should be removed
Address.functionStaticCall(address,bytes,string) (Address.sol#139-145) is never used and should be removed
Address.sendValue(address,uint256) (Address.sol#53-59) is never used and should be removed
BEP20._burn(address,uint256) (BEP20.sol#259-265) is never used and should be removed
BEP20._burnFrom(address,uint256) (BEP20.sol#294-297) is never used and should be removed
Context._msgData() (Context.sol#20-23) is never used and should be removed
SafeBEP20.safeApprove(IBEP20,address,uint256) (SafeBEP20.sol#37-46) is never used and should be removed
SafeBEP20.safeDecreaseAllowance(IBEP20,address,uint256) (SafeBEP20.sol#53-56) is never used and should be removed
SafeBEP20.safeIncreaseAllowance(IBEP20,address,uint256) (SafeBEP20.sol#48-51) is never used and should be removed
SafeMath.div(uint256,uint256,string) (SafeMath.sol#190-193) is never used and should be removed
SafeMath.mod(uint256,uint256) (SafeMath.sol#152-155) is never used and should be removed
SafeMath.mod(uint256,uint256,string) (SafeMath.sol#210-213) is never used and should be removed
SafeMath.tryAdd(uint256,uint256) (SafeMath.sol#24-28) is never used and should be removed
SafeMath.tryDiv(uint256,uint256) (SafeMath.sol#60-63) is never used and should be removed
SafeMath.tryMod(uint256,uint256) (SafeMath.sol#70-73) is never used and should be removed
SafeMath.tryMul(uint256,uint256) (SafeMath.sol#45-53) is never used and should be removed
SafeMath.trySub(uint256,uint256) (SafeMath.sol#35-38) is never used and should be removed
Remove unused functions.

Additional information: link

Pragma version>=0.6.2<0.8.0 (Address.sol#3) is too complex
Pragma version>=0.4.0 (BEP20.sol#3) allows old versions
Pragma version>=0.6.0<0.8.0 (Context.sol#3) is too complex
Pragma version>=0.6.4 (IBEP20.sol#3) allows old versions
Pragma version>=0.6.0<0.8.0 (Ownable.sol#3) is too complex
Pragma version>=0.6.0<0.8.0 (SafeBEP20.sol#3) is too complex
Pragma version>=0.6.0<0.8.0 (SafeMath.sol#3) is too complex
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in Address.sendValue(address,uint256) (Address.sol#53-59):
- (success) = recipient.call{value: amount}() (Address.sol#57)
Low level call in Address.functionCallWithValue(address,bytes,uint256,string) (Address.sol#114-121):
- (success,returndata) = target.call{value: value}(data) (Address.sol#119)
Low level call in Address.functionStaticCall(address,bytes,string) (Address.sol#139-145):
- (success,returndata) = target.staticcall(data) (Address.sol#143)
Low level call in Address.functionDelegateCall(address,bytes,string) (Address.sol#163-169):
- (success,returndata) = target.delegatecall(data) (Address.sol#167)
Low level call in Timelock.executeTransaction(address,uint256,string,bytes,uint256) (TimeLock.sol#103-128):
- (success,returnData) = target.call.value(value)(callData) (TimeLock.sol#122)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Parameter MasterChef.add(uint256,IBEP20,uint16,bool)._allocPoint (MasterChef.sol#92) is not in mixedCase
Parameter MasterChef.add(uint256,IBEP20,uint16,bool)._lpToken (MasterChef.sol#92) is not in mixedCase
Parameter MasterChef.add(uint256,IBEP20,uint16,bool)._depositFeeBP (MasterChef.sol#92) is not in mixedCase
Parameter MasterChef.add(uint256,IBEP20,uint16,bool)._withUpdate (MasterChef.sol#92) is not in mixedCase
Parameter MasterChef.set(uint256,uint256,uint16,bool)._pid (MasterChef.sol#109) is not in mixedCase
Parameter MasterChef.set(uint256,uint256,uint16,bool)._allocPoint (MasterChef.sol#109) is not in mixedCase
Parameter MasterChef.set(uint256,uint256,uint16,bool)._depositFeeBP (MasterChef.sol#109) is not in mixedCase
Parameter MasterChef.set(uint256,uint256,uint16,bool)._withUpdate (MasterChef.sol#109) is not in mixedCase
Parameter MasterChef.getMultiplier(uint256,uint256)._from (MasterChef.sol#120) is not in mixedCase
Parameter MasterChef.getMultiplier(uint256,uint256)._to (MasterChef.sol#120) is not in mixedCase
Parameter MasterChef.pendingM(uint256,address)._pid (MasterChef.sol#125) is not in mixedCase
Parameter MasterChef.pendingM(uint256,address)._user (MasterChef.sol#125) is not in mixedCase
Parameter MasterChef.updatePool(uint256)._pid (MasterChef.sol#147) is not in mixedCase
Parameter MasterChef.deposit(uint256,uint256)._pid (MasterChef.sol#166) is not in mixedCase
Parameter MasterChef.deposit(uint256,uint256)._amount (MasterChef.sol#166) is not in mixedCase
Parameter MasterChef.withdraw(uint256,uint256)._pid (MasterChef.sol#191) is not in mixedCase
Parameter MasterChef.withdraw(uint256,uint256)._amount (MasterChef.sol#191) is not in mixedCase
Parameter MasterChef.emergencyWithdraw(uint256)._pid (MasterChef.sol#209) is not in mixedCase
Parameter MasterChef.safeMTransfer(address,uint256)._to (MasterChef.sol#220) is not in mixedCase
Parameter MasterChef.safeMTransfer(address,uint256)._amount (MasterChef.sol#220) is not in mixedCase
Parameter MasterChef.dev(address)._devaddr (MasterChef.sol#230) is not in mixedCase
Parameter MasterChef.setFeeAddress(address)._feeAddress (MasterChef.sol#235) is not in mixedCase
Parameter MasterChef.updateEmissionRate(uint256)._mPerBlock (MasterChef.sol#241) is not in mixedCase
Parameter Metaverse.mint(address,uint256)._to (Meta.sol#11) is not in mixedCase
Parameter Metaverse.mint(address,uint256)._amount (Meta.sol#11) is not in mixedCase
Variable Metaverse._delegates (Meta.sol#23) is not in mixedCase
Variable Timelock.admin_initialized (TimeLock.sol#36) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

Redundant expression "this (Context.sol#21)" inContext (Context.sol#15-24)
Remove redundant statements if they congest code but offer no value.

Additional information: link

symbol() should be declared external:
- BEP20.symbol() (BEP20.sol#80-82)
decimals() should be declared external:
- BEP20.decimals() (BEP20.sol#87-89)
totalSupply() should be declared external:
- BEP20.totalSupply() (BEP20.sol#94-96)
transfer(address,uint256) should be declared external:
- BEP20.transfer(address,uint256) (BEP20.sol#113-116)
allowance(address,address) should be declared external:
- BEP20.allowance(address,address) (BEP20.sol#121-123)
approve(address,uint256) should be declared external:
- BEP20.approve(address,uint256) (BEP20.sol#132-135)
transferFrom(address,address,uint256) should be declared external:
- BEP20.transferFrom(address,address,uint256) (BEP20.sol#149-157)
increaseAllowance(address,uint256) should be declared external:
- BEP20.increaseAllowance(address,uint256) (BEP20.sol#171-174)
decreaseAllowance(address,uint256) should be declared external:
- BEP20.decreaseAllowance(address,uint256) (BEP20.sol#190-193)
mint(uint256) should be declared external:
- BEP20.mint(uint256) (BEP20.sol#203-206)
add(uint256,IBEP20,uint16,bool) should be declared external:
- MasterChef.add(uint256,IBEP20,uint16,bool) (MasterChef.sol#92-106)
set(uint256,uint256,uint16,bool) should be declared external:
- MasterChef.set(uint256,uint256,uint16,bool) (MasterChef.sol#109-117)
deposit(uint256,uint256) should be declared external:
- MasterChef.deposit(uint256,uint256) (MasterChef.sol#166-188)
withdraw(uint256,uint256) should be declared external:
- MasterChef.withdraw(uint256,uint256) (MasterChef.sol#191-206)
emergencyWithdraw(uint256) should be declared external:
- MasterChef.emergencyWithdraw(uint256) (MasterChef.sol#209-217)
dev(address) should be declared external:
- MasterChef.dev(address) (MasterChef.sol#230-233)
setFeeAddress(address) should be declared external:
- MasterChef.setFeeAddress(address) (MasterChef.sol#235-238)
updateEmissionRate(uint256) should be declared external:
- MasterChef.updateEmissionRate(uint256) (MasterChef.sol#241-244)
mint(address,uint256) should be declared external:
- Metaverse.mint(address,uint256) (Meta.sol#11-14)
renounceOwnership() should be declared external:
- Ownable.renounceOwnership() (Ownable.sol#54-57)
transferOwnership(address) should be declared external:
- Ownable.transferOwnership(address) (Ownable.sol#63-67)
setDelay(uint256) should be declared external:
- Timelock.setDelay(uint256) (TimeLock.sol#53-60)
acceptAdmin() should be declared external:
- Timelock.acceptAdmin() (TimeLock.sol#62-68)
setPendingAdmin(address) should be declared external:
- Timelock.setPendingAdmin(address) (TimeLock.sol#70-81)
queueTransaction(address,uint256,string,bytes,uint256) should be declared external:
- Timelock.queueTransaction(address,uint256,string,bytes,uint256) (TimeLock.sol#83-92)
cancelTransaction(address,uint256,string,bytes,uint256) should be declared external:
- Timelock.cancelTransaction(address,uint256,string,bytes,uint256) (TimeLock.sol#94-101)
executeTransaction(address,uint256,string,bytes,uint256) should be declared external:
- Timelock.executeTransaction(address,uint256,string,bytes,uint256) (TimeLock.sol#103-128)
Use the external attribute for functions never called from the contract.

Additional information: link

Contract name (MetaVerse-M) contains non-alphanumeric characters.
Not a direct threat, but may indicate unreliable intentions of developer. Non-alphanumeric chars (,.;!#*&") are extremely rare among low risk tokens.

Contract ticker (M) has length of 1 chars.
Not a direct threat, but may indicate unreliable intentions of developer.


Contract ownership is semi-renounced (passed to a contract)

Holders:


Average 30d PancakeSwap liquidity is low.


Number of Binance Smart Chain (BSC) token holders is low.


Token is deployed only at one blockchain


Telegram account has relatively few subscribers


Twitter account has relatively few followers


Unable to find Blog account (Reddit or Medium)


Unable to find Youtube account


Unable to find token on CoinMarketCap

Additional information: link


Unable to find token/project description on the website or on BscScan, CoinMarketCap


Unable to find token contract audit


Unable to find KYC or doxxing proof


Unable to find audit link on the website


Unable to find whitepaper link on the website


Token is not listed at Mobula.Finance

Additional information: link


Unable to find token on CoinHunt

Additional information: link


Young tokens have high risks of scam / price dump / death


Young tokens have high risks of scam / price dump / death


Young tokens have high risks of scam / price dump / death


Token has no active CoinGecko listing / rank


Token has no active CoinMarketCap listing / rank


Token is relatively young, but twitter if very old (probably it's fake).

Price for M

News for M