Pinecone Finance is a Yield Optimizer Protocol on Binance Smart Chain which aims to innovate yield farming by making it effortless, frictionless and sustainable.
On top of the Transfer Tax rewards, our token Holders also share the Performance Fee generated from our farming vaults, which will continue to increase proportionally with the growth of Pinecone ecosystem.
We differentiate ourselves from other Yield Optimizers and Reflection Tokens in the following perspectives:
1. High Yield Single Asset Farming. For the People. By the People
2. One token. Dual rewards. Even without the need of staking!
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
PineconeToken._addLiquidity(uint256,uint256) (contracts/PineconeToken.sol#553-563) sends eth to arbitrary user
Dangerous calls:
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/PineconeToken.sol#555-562)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in PineconeToken._transfer(address,address,uint256) (contracts/PineconeToken.sol#437-512):
External calls:
- _swapAndLiquify(contractTokenBalance) (contracts/PineconeToken.sol#484)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/PineconeToken.sol#555-562)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (contracts/PineconeToken.sol#544-550)
- _tokenTransfer(from,to,amount,tFee) (contracts/PineconeToken.sol#511)
- IPineconeTokenCallee(callee).transferCallee(from,to) (contracts/PineconeToken.sol#421)
External calls sending eth:
- _swapAndLiquify(contractTokenBalance) (contracts/PineconeToken.sol#484)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/PineconeToken.sol#555-562)
State variables written after the call(s):
- _tokenTransfer(from,to,amount,tFee) (contracts/PineconeToken.sol#511)
- _rOwned[to] = _rOwned[to].add(rAmount) (contracts/PineconeToken.sol#682)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (contracts/PineconeToken.sol#637)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (contracts/PineconeToken.sol#628)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (contracts/PineconeToken.sol#648)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (contracts/PineconeToken.sol#629)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (contracts/PineconeToken.sol#618)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (contracts/PineconeToken.sol#649)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (contracts/PineconeToken.sol#639)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (contracts/PineconeToken.sol#620)
- _tokenTransfer(from,to,amount,tFee) (contracts/PineconeToken.sol#511)
- _rTotal = _rTotal.sub(rHolderFee) (contracts/PineconeToken.sol#661)
- _tokenTransfer(from,to,amount,tFee) (contracts/PineconeToken.sol#511)
- _tOwned[to] = _tOwned[to].add(tAmount) (contracts/PineconeToken.sol#684)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (contracts/PineconeToken.sol#617)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (contracts/PineconeToken.sol#647)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (contracts/PineconeToken.sol#638)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (contracts/PineconeToken.sol#619)
Apply the check-effects-interactions pattern.
Additional information: link
PineconeToken.withdrawBEP20(address) (contracts/PineconeToken.sol#413-416) ignores return value by IERC20(_tokenAddress).transfer(msg.sender,tokenBal) (contracts/PineconeToken.sol#415)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.
Additional information: link
PineconeToken.isPresaleUser(address) (contracts/PineconeToken.sol#219-226) uses a dangerous strict equality:
- unlockTime == 0 || unlockTime > block.timestamp (contracts/PineconeToken.sol#221)
Don't use strict equality to determine if an account has enough Ether or tokens.
Additional information: link
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
PineconeToken._takeTxFee(uint256,uint256) (contracts/PineconeToken.sol#655-679) performs a multiplication on the result of a division:
-burnFee = tFeeAmount.mul(burnPart).div(FEEMAX) (contracts/PineconeToken.sol#669)
-rBurnFee = burnFee.mul(currentRate) (contracts/PineconeToken.sol#670)
Consider ordering multiplication before division.
Additional information: link
Reentrancy in PineconeToken._takeTxFee(uint256,uint256) (contracts/PineconeToken.sol#655-679):
External calls:
- _transferCallee(address(0),address(this)) (contracts/PineconeToken.sol#667)
- IPineconeTokenCallee(callee).transferCallee(from,to) (contracts/PineconeToken.sol#421)
- _transferCallee(address(0),DEAD) (contracts/PineconeToken.sol#673)
- IPineconeTokenCallee(callee).transferCallee(from,to) (contracts/PineconeToken.sol#421)
State variables written after the call(s):
- _transferFeeTo(vaultWallet,rVaultFee,vaultFee) (contracts/PineconeToken.sol#678)
- _rOwned[to] = _rOwned[to].add(rAmount) (contracts/PineconeToken.sol#682)
- _transferFeeTo(vaultWallet,rVaultFee,vaultFee) (contracts/PineconeToken.sol#678)
- _tOwned[to] = _tOwned[to].add(tAmount) (contracts/PineconeToken.sol#684)
Apply the check-effects-interactions pattern.
Additional information: link
PineconeToken._addLiquidity(uint256,uint256) (contracts/PineconeToken.sol#553-563) ignores return value by router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/PineconeToken.sol#555-562)
Ensure that all the return values of the function calls are used.
Additional information: link
PineconeToken.setPresaleContract(address) (contracts/PineconeToken.sol#228-230) should emit an event for:
- presaleAddress = addr (contracts/PineconeToken.sol#229)
Emit an event for critical parameter changes.
Additional information: link
PineconeToken.setTokensSellToAddToLiquidityPercent(uint256) (contracts/PineconeToken.sol#297-300) should emit an event for:
- tokensSellToAddToLiquidityPercent = percent (contracts/PineconeToken.sol#299)
Emit an event for critical parameter changes.
Additional information: link
PineconeToken.setPresaleContract(address).addr (contracts/PineconeToken.sol#228) lacks a zero-check on :
- presaleAddress = addr (contracts/PineconeToken.sol#229)
Check that the address is not zero.
Additional information: link
PineconeToken._transferCallee(address,address) (contracts/PineconeToken.sol#418-423) has external calls inside a loop: IPineconeTokenCallee(callee).transferCallee(from,to) (contracts/PineconeToken.sol#421)
Favor pull over push strategy for external calls.
Additional information: link
Reentrancy in PineconeToken.transferFrom(address,address,uint256) (contracts/PineconeToken.sol#187-191):
External calls:
- _transfer(sender,recipient,amount) (contracts/PineconeToken.sol#188)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/PineconeToken.sol#555-562)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (contracts/PineconeToken.sol#544-550)
- IPineconeTokenCallee(callee).transferCallee(from,to) (contracts/PineconeToken.sol#421)
External calls sending eth:
- _transfer(sender,recipient,amount) (contracts/PineconeToken.sol#188)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/PineconeToken.sol#555-562)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (contracts/PineconeToken.sol#189)
- _allowances[from][spender] = amount (contracts/PineconeToken.sol#433)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in PineconeToken.transferFrom(address,address,uint256) (contracts/PineconeToken.sol#187-191):
External calls:
- _transfer(sender,recipient,amount) (contracts/PineconeToken.sol#188)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/PineconeToken.sol#555-562)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (contracts/PineconeToken.sol#544-550)
- IPineconeTokenCallee(callee).transferCallee(from,to) (contracts/PineconeToken.sol#421)
External calls sending eth:
- _transfer(sender,recipient,amount) (contracts/PineconeToken.sol#188)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (contracts/PineconeToken.sol#555-562)
Event emitted after the call(s):
- Approval(from,spender,amount) (contracts/PineconeToken.sol#434)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (contracts/PineconeToken.sol#189)
Apply the check-effects-interactions pattern.
Additional information: link
PineconeToken.isPresaleUser(address) (contracts/PineconeToken.sol#219-226) uses timestamp for comparisons
Dangerous comparisons:
- unlockTime == 0 || unlockTime > block.timestamp (contracts/PineconeToken.sol#221)
Avoid relying on block.timestamp.
Additional information: link
Address._verifyCallResult(bool,bytes,string) (contracts/libraries/Address.sol#228-249) uses assembly
- INLINE ASM (contracts/libraries/Address.sol#241-244)
Do not use evm assembly.
Additional information: link
PineconeToken._transfer(address,address,uint256) (contracts/PineconeToken.sol#437-512) compares to a boolean constant:
-isExcludedFromAntiWhale(from) == false && isExcludedFromAntiWhale(to) == false (contracts/PineconeToken.sol#458)
Remove the equality to the boolean constant.
Additional information: link
Different versions of Solidity is used:
- Version used: ['0.6.12', '^0.6.12']
- ^0.6.12 (contracts/PineconeToken.sol#3)
- 0.6.12 (contracts/helpers/Context.sol#3)
- ^0.6.12 (contracts/interfaces/IERC20.sol#3)
- ^0.6.12 (contracts/interfaces/IPancakeFactory.sol#2)
- 0.6.12 (contracts/interfaces/IPancakeRouter01.sol#3)
- 0.6.12 (contracts/interfaces/IPancakeRouter02.sol#3)
- ^0.6.12 (contracts/interfaces/IPineconeToken.sol#3)
- 0.6.12 (contracts/libraries/Address.sol#3)
- 0.6.12 (contracts/libraries/MinterRole.sol#2)
- 0.6.12 (contracts/libraries/Roles.sol#2)
- ^0.6.12 (contracts/libraries/SafeMath.sol#3)
Use one Solidity version.
Additional information: link
SafeMath.mod(uint256,uint256,string) (contracts/libraries/SafeMath.sol#151-158) is never used and should be removed
Remove unused functions.
Additional information: link
PineconeToken._rTotal (contracts/PineconeToken.sol#56) is set pre-construction with a non-constant function or state variable:
- (MAX - (MAX % _tTotal))
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
Low level call in Address.functionDelegateCall(address,bytes,string) (contracts/libraries/Address.sol#216-226):
- (success,returndata) = target.delegatecall(data) (contracts/libraries/Address.sol#224)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Function IPancakeRouter01.WETH() (contracts/interfaces/IPancakeRouter01.sol#8) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Redundant expression "this (contracts/helpers/Context.sol#12)" inContext (contracts/helpers/Context.sol#6-15)
Remove redundant statements if they congest code but offer no value.
Additional information: link
Variable IPancakeRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (contracts/interfaces/IPancakeRouter01.sol#13) is too similar to IPancakeRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (contracts/interfaces/IPancakeRouter01.sol#14)
Prevent variables from having similar names.
Additional information: link
PineconeToken.slitherConstructorConstantVariables() (contracts/PineconeToken.sol#13-687) uses literals with too many digits:
- DEAD = 0x000000000000000000000000000000000000dEaD (contracts/PineconeToken.sol#65)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
PineconeToken.vaultPart (contracts/PineconeToken.sol#28) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
renounceMinter() should be declared external:
- MinterRole.renounceMinter() (contracts/libraries/MinterRole.sol#31-33)
Use the external attribute for functions never called from the contract.
Additional information: link
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute volume.
Unable to find PancakeSwap trading pair to compute number of swaps.
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Token was delisted (assigned to inactive / untracked listing) from CoinMarketCap
Additional information: link
Unable to find token contract audit
Unable to find audit link on the website
Unable to find whitepaper link on the website
Unable to find Telegram link on the website
Unable to find Twitter link on the website
Unable to find token on CoinHunt
Additional information: link
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Token has no active CoinMarketCap listing / rank
Token has a considerable age, but social accounts / website are missing or have few users
Token has a considerable age, but average PancakeSwap 30d trading volume is low
Young tokens have high risks of price dump / death
Token has relatively low CoinGecko rank
Twitter account link seems to be invalid
Unable to find Youtube account
Unable to find Discord account