Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
SealToken.addLiquidity(uint256,uint256) (#1346-1359) sends eth to arbitrary user
Dangerous calls:
- sealRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1351-1358)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in SealToken._transfer(address,address,uint256) (#1260-1291):
External calls:
- swapAndLiquify() (#1270)
- sealRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1351-1358)
- sealRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1336-1342)
External calls sending eth:
- swapAndLiquify() (#1270)
- sealRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1351-1358)
State variables written after the call(s):
- super._transfer(sender,recipient,amount) (#1274)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#1081)
- _balances[recipient] = _balances[recipient].add(amount) (#1082)
- super._transfer(sender,BURN_ADDRESS,burnAmount) (#1286)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#1081)
- _balances[recipient] = _balances[recipient].add(amount) (#1082)
- super._transfer(sender,address(this),liquidityAmount) (#1287)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#1081)
- _balances[recipient] = _balances[recipient].add(amount) (#1082)
- super._transfer(sender,recipient,sendAmount) (#1288)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#1081)
- _balances[recipient] = _balances[recipient].add(amount) (#1082)
Apply the check-effects-interactions pattern.
Additional information: link
SealToken._writeCheckpoint(address,uint32,uint256,uint256) (#1669-1687) uses a dangerous strict equality:
- nCheckpoints > 0 && checkpoints[delegatee][nCheckpoints - 1].fromBlock == blockNumber (#1679)
Don't use strict equality to determine if an account has enough Ether or tokens.
Additional information: link
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
SealToken._transfer(address,address,uint256) (#1260-1291) performs a multiplication on the result of a division:
-taxAmount = amount.mul(transferTaxRate).div(10000) (#1277)
-burnAmount = taxAmount.mul(burnRate).div(100) (#1278)
Consider ordering multiplication before division.
Additional information: link
SealToken.addLiquidity(uint256,uint256) (#1346-1359) ignores return value by sealRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1351-1358)
Ensure that all the return values of the function calls are used.
Additional information: link
SealToken.swapAndLiquify().maxTransferAmount (#1296) shadows:
- SealToken.maxTransferAmount() (#1364-1366) (function)
Rename the local variables that shadow another component.
Additional information: link
Reentrancy in SealToken.swapAndLiquify() (#1294-1324):
External calls:
- swapTokensForEth(half) (#1314)
- sealRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1336-1342)
- addLiquidity(otherHalf,newBalance) (#1320)
- sealRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1351-1358)
External calls sending eth:
- addLiquidity(otherHalf,newBalance) (#1320)
- sealRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1351-1358)
State variables written after the call(s):
- addLiquidity(otherHalf,newBalance) (#1320)
- _allowances[owner][spender] = amount (#1143)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in SealToken.swapAndLiquify() (#1294-1324):
External calls:
- swapTokensForEth(half) (#1314)
- sealRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1336-1342)
- addLiquidity(otherHalf,newBalance) (#1320)
- sealRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1351-1358)
External calls sending eth:
- addLiquidity(otherHalf,newBalance) (#1320)
- sealRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1351-1358)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#1144)
- addLiquidity(otherHalf,newBalance) (#1320)
- SwapAndLiquify(half,newBalance,otherHalf) (#1322)
Apply the check-effects-interactions pattern.
Additional information: link
SealToken.delegateBySig(address,uint256,uint256,uint8,bytes32,bytes32) (#1535-1576) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(now <= expiry,SEAL::delegateBySig: signature expired) (#1574)
Avoid relying on block.timestamp.
Additional information: link
SealToken.getChainId() (#1694-1698) uses assembly
- INLINE ASM (#1696)
Do not use evm assembly.
Additional information: link
SealToken.antiWhale(address,address,uint256) (#1214-1225) compares to a boolean constant:
-_excludedFromAntiWhale[sender] == false && _excludedFromAntiWhale[recipient] == false (#1217-1218)
Remove the equality to the boolean constant.
Additional information: link
SealToken.swapTokensForEth(uint256) (#1327-1343) is never used and should be removed
Remove unused functions.
Additional information: link
Low level call in Address.functionDelegateCall(address,bytes,string) (#816-826):
- (success,returndata) = target.delegatecall(data) (#824)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Variable SealToken._delegates (#1477) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Redundant expression "this (#288)" inContext (#282-291)
Remove redundant statements if they congest code but offer no value.
Additional information: link
Variable IPancakeRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#80) is too similar to IPancakeRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#81)
Prevent variables from having similar names.
Additional information: link
SealToken.slitherConstructorConstantVariables() (#1168-1700) uses literals with too many digits:
- BURN_ADDRESS = 0x000000000000000000000000000000000000dEaD (#1176)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
transferOperator(address) should be declared external:
- SealToken.transferOperator(address) (#1464-1468)
Use the external attribute for functions never called from the contract.
Additional information: link
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Number of Binance Smart Chain (BSC) token holders is low.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute volume.
Unable to find PancakeSwap trading pair to compute number of swaps.
Unable to find website, listings and other project-related information
Young tokens have high risks of price dump / death
Token has no active CoinGecko listing / rank
Token has no active CoinMarketCap listing / rank
Unable to find Telegram and Twitter accounts