Shillit - The Ultimate Token Vetting Platform
Your Safe launch into the Crypto-verse
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
ShillToken.addLiquidity(uint256,uint256) (#2090-2102) sends eth to arbitrary user
Dangerous calls:
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#2093-2100)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in DividendPayingToken._withdrawDividendOfUser(address) (#1388-1404):
External calls:
- (success) = user.call{gas: 3000,value: _withdrawableDividend}() (#1393)
State variables written after the call(s):
- withdrawnDividends[user] = withdrawnDividends[user].sub(_withdrawableDividend) (#1396)
Apply the check-effects-interactions pattern.
Additional information: link
SafeToken.withdraw(address,uint256) (#1706-1709) ignores return value by IERC20(_token).transfer(safeManager,_amount) (#1708)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.
Additional information: link
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
solc-0.8.4 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Variable ShillToken.BNBRewardsFee (#1733) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Low level call in ShillToken.swapAndLiquify(uint256) (#2053-2088):
- (success) = address(dividendTracker).call{value: dividends}() (#2081)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
SignedSafeMath.mul(int256,int256) (#254-256) is never used and should be removed
Remove unused functions.
Additional information: link
ShillToken.swapAndLiquify(uint256) (#2053-2088) performs a multiplication on the result of a division:
-marketingAmount = deltaBalance.sub(bnbToAddLiquidityWith).div(totalFees.sub(liquidityFee)).mul(marketingFee) (#2077)
Consider ordering multiplication before division.
Additional information: link
ShillToken._transfer(address,address,uint256).extraFee (#2022) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.
Additional information: link
ShillToken.addLiquidity(uint256,uint256) (#2090-2102) ignores return value by uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#2093-2100)
Ensure that all the return values of the function calls are used.
Additional information: link
DividendPayingToken.constructor(string,string)._symbol (#1345) shadows:
- ERC20._symbol (#872) (state variable)
Rename the local variables that shadow another component.
Additional information: link
ShillToken.setMaxtx(uint256) (#1800-1802) should emit an event for:
- maxTransactionAmount = _maxTxAmount (#1801)
Emit an event for critical parameter changes.
Additional information: link
SafeToken.setSafeManager(address)._safeManager (#1702) lacks a zero-check on :
- safeManager = _safeManager (#1703)
Check that the address is not zero.
Additional information: link
Variable 'ShillToken._transfer(address,address,uint256).claims (#2044)' in ShillToken._transfer(address,address,uint256) (#1989-2051) potentially used before declaration: ProcessedDividendTracker(iterations,claims,lastProcessedIndex,true,gas,tx.origin) (#2045)
Move all variable declarations prior to any usage of the variable, and ensure that reaching a variable declaration does not depend on some conditional if it is used unconditionally.
Additional information: link
Reentrancy in ShillTokenDividendTracker.processAccount(address,bool) (#1682-1692):
External calls:
- amount = _withdrawDividendOfUser(account) (#1683)
- (success) = user.call{gas: 3000,value: _withdrawableDividend}() (#1393)
State variables written after the call(s):
- lastClaimTimes[account] = block.timestamp (#1686)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in ShillToken.swapAndLiquify(uint256) (#2053-2088):
External calls:
- swapTokensForBnb(toSwap,address(this)) (#2066)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,_to,block.timestamp) (#2117-2123)
- addLiquidity(tokensToAddLiquidityWith,bnbToAddLiquidityWith) (#2075)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#2093-2100)
- (success) = address(dividendTracker).call{value: dividends}() (#2081)
External calls sending eth:
- addLiquidity(tokensToAddLiquidityWith,bnbToAddLiquidityWith) (#2075)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#2093-2100)
- marketingWallet.transfer(marketingAmount) (#2078)
- (success) = address(dividendTracker).call{value: dividends}() (#2081)
Event emitted after the call(s):
- SendDividends(toSwap - tokensToAddLiquidityWith,dividends) (#2084)
- SwapAndLiquify(tokensToAddLiquidityWith,deltaBalance) (#2087)
Apply the check-effects-interactions pattern.
Additional information: link
ShillTokenDividendTracker.canAutoClaim(uint256) (#1610-1616) uses timestamp for comparisons
Dangerous comparisons:
- lastClaimTime > block.timestamp (#1611)
- block.timestamp.sub(lastClaimTime) >= claimWait (#1615)
Avoid relying on block.timestamp.
Additional information: link
Reentrancy in ShillToken.swapAndLiquify(uint256) (#2053-2088):
External calls:
- marketingWallet.transfer(marketingAmount) (#2078)
External calls sending eth:
- addLiquidity(tokensToAddLiquidityWith,bnbToAddLiquidityWith) (#2075)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#2093-2100)
- marketingWallet.transfer(marketingAmount) (#2078)
- (success) = address(dividendTracker).call{value: dividends}() (#2081)
Event emitted after the call(s):
- SendDividends(toSwap - tokensToAddLiquidityWith,dividends) (#2084)
- SwapAndLiquify(tokensToAddLiquidityWith,deltaBalance) (#2087)
Apply the check-effects-interactions pattern.
Additional information: link
Variable ShillToken.BNBRewardsFee (#1733) is too similar to ShillToken.setFee(uint256,uint256,uint256)._bnbRewardFee (#1788)
Prevent variables from having similar names.
Additional information: link
ShillToken.slitherConstructorVariables() (#1718-2134) uses literals with too many digits:
- gasForProcessing = 300000 (#1741)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
ShillToken.swapTokensAtAmount (#1731) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
setSwapAndLiquifyEnabled(bool) should be declared external:
- ShillToken.setSwapAndLiquifyEnabled(bool) (#1984-1987)
Use the external attribute for functions never called from the contract.
Additional information: link
Average 30d PancakeSwap volume is low.
Average PancakeSwap trading volume, liqudity, number of swaps are low. Token seems to be inactive.
Token is deployed only at one blockchain
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute number of swaps.
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Unable to find token contract audit
Unable to find audit link on the website
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinGecko rank
Token has relatively low CoinMarketCap rank
Twitter account link seems to be invalid