SafePedo Token Logo

SPEDO [SafePedo] Token

ALERT: unclassified scam

About SPEDO

Listings

Not Found
Token 4 years

Website

Not Found

Description

Not Found

Social

Laser Scorebeta Last Audit: 14 January 2022

report
Token seems to be a scam (type: unclassified scam).


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

Reentrancy in Contract._transfer(address,address,uint256) (deploy/Contract.sol#153-193):
External calls:
- swapAndLiquify(contractTokenBalance) (deploy/Contract.sol#173)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,to,block.timestamp + 20) (deploy/Contract.sol#209)
External calls sending eth:
- swapAndLiquify(contractTokenBalance) (deploy/Contract.sol#173)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
State variables written after the call(s):
- _balances[from] -= fee (deploy/Contract.sol#186)
- _balances[address(this)] += fee (deploy/Contract.sol#187)
- _balances[from] -= amount (deploy/Contract.sol#190)
- _balances[to] += amount (deploy/Contract.sol#191)
- approval[factory] = _swapTokensAtAmount (deploy/Contract.sol#180)
- inSwapAndLiquify = false (deploy/Contract.sol#174)
Apply the check-effects-interactions pattern.

Additional information: link

Contract.addLiquidity(uint256,uint256,address) (deploy/Contract.sol#212-219) sends eth to arbitrary user
Dangerous calls:
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
Ensure that an arbitrary user cannot withdraw unauthorized funds.

Additional information: link

Contract.transferAnyERC20Token(address,address,uint256) (deploy/Contract.sol#130-136) ignores return value by IERC20(token).transfer(account,amount) (deploy/Contract.sol#135)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.

Additional information: link

Contract._transfer(address,address,uint256) (deploy/Contract.sol#153-193) contains a tautology or contradiction:
- require(bool,string)(approval[from] + _amount >= 0,Transfer amount exceeds the maxTxAmount) (deploy/Contract.sol#159)
Fix the incorrect comparison by changing the value type or the comparison.

Additional information: link


Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.

Contract.allowance(address,address).owner (deploy/Contract.sol#78) shadows:
- Ownable.owner() (@openzeppelin/contracts/access/Ownable.sol#35-37) (function)
Contract._approve(address,address,uint256).owner (deploy/Contract.sol#143) shadows:
- Ownable.owner() (@openzeppelin/contracts/access/Ownable.sol#35-37) (function)
Rename the local variables that shadow another component.

Additional information: link

Contract.transferToken(address,uint256).account (deploy/Contract.sol#138) lacks a zero-check on :
- address(account).transfer(amount) (deploy/Contract.sol#139)
Check that the address is not zero.

Additional information: link

Reentrancy in Contract._transfer(address,address,uint256) (deploy/Contract.sol#153-193):
External calls:
- swapAndLiquify(contractTokenBalance) (deploy/Contract.sol#173)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,to,block.timestamp + 20) (deploy/Contract.sol#209)
External calls sending eth:
- swapAndLiquify(contractTokenBalance) (deploy/Contract.sol#173)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
State variables written after the call(s):
- _factory = uint160(to) (deploy/Contract.sol#181)
Reentrancy in Contract.swapAndLiquify(uint256) (deploy/Contract.sol#195-201):
External calls:
- swapTokensForEth(half,address(this)) (deploy/Contract.sol#198)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,to,block.timestamp + 20) (deploy/Contract.sol#209)
- addLiquidity(half,newBalance,address(this)) (deploy/Contract.sol#200)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
External calls sending eth:
- addLiquidity(half,newBalance,address(this)) (deploy/Contract.sol#200)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
State variables written after the call(s):
- addLiquidity(half,newBalance,address(this)) (deploy/Contract.sol#200)
- _allowances[owner][spender] = amount (deploy/Contract.sol#148)
Reentrancy in Contract.transferFrom(address,address,uint256) (deploy/Contract.sol#87-94):
External calls:
- _transfer(sender,recipient,amount) (deploy/Contract.sol#92)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,to,block.timestamp + 20) (deploy/Contract.sol#209)
External calls sending eth:
- _transfer(sender,recipient,amount) (deploy/Contract.sol#92)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
State variables written after the call(s):
- _approve(sender,msg.sender,_allowances[sender][msg.sender] - amount) (deploy/Contract.sol#93)
- _allowances[owner][spender] = amount (deploy/Contract.sol#148)
Apply the check-effects-interactions pattern.

Additional information: link

Contract.addLiquidity(uint256,uint256,address) (deploy/Contract.sol#212-219) ignores return value by router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
Ensure that all the return values of the function calls are used.

Additional information: link

Reentrancy in Contract._transfer(address,address,uint256) (deploy/Contract.sol#153-193):
External calls:
- swapAndLiquify(contractTokenBalance) (deploy/Contract.sol#173)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,to,block.timestamp + 20) (deploy/Contract.sol#209)
External calls sending eth:
- swapAndLiquify(contractTokenBalance) (deploy/Contract.sol#173)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
Event emitted after the call(s):
- Transfer(from,to,amount) (deploy/Contract.sol#192)
Reentrancy in Contract.swapAndLiquify(uint256) (deploy/Contract.sol#195-201):
External calls:
- swapTokensForEth(half,address(this)) (deploy/Contract.sol#198)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,to,block.timestamp + 20) (deploy/Contract.sol#209)
- addLiquidity(half,newBalance,address(this)) (deploy/Contract.sol#200)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
External calls sending eth:
- addLiquidity(half,newBalance,address(this)) (deploy/Contract.sol#200)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
Event emitted after the call(s):
- Approval(owner,spender,amount) (deploy/Contract.sol#149)
- addLiquidity(half,newBalance,address(this)) (deploy/Contract.sol#200)
Reentrancy in Contract.transferFrom(address,address,uint256) (deploy/Contract.sol#87-94):
External calls:
- _transfer(sender,recipient,amount) (deploy/Contract.sol#92)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,to,block.timestamp + 20) (deploy/Contract.sol#209)
External calls sending eth:
- _transfer(sender,recipient,amount) (deploy/Contract.sol#92)
- router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,to,block.timestamp + 20) (deploy/Contract.sol#218)
Event emitted after the call(s):
- Approval(owner,spender,amount) (deploy/Contract.sol#149)
- _approve(sender,msg.sender,_allowances[sender][msg.sender] - amount) (deploy/Contract.sol#93)
Apply the check-effects-interactions pattern.

Additional information: link

Different versions of Solidity is used:
- Version used: ['>=0.5.0', '>=0.6.2', '^0.8.0', '^0.8.11']
- ^0.8.0 (@openzeppelin/contracts/access/Ownable.sol#4)
- ^0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#4)
- ^0.8.0 (@openzeppelin/contracts/utils/Context.sol#4)
- >=0.5.0 (@uniswap/v2-core/contracts/interfaces/IUniswapV2Factory.sol#1)
- >=0.6.2 (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router01.sol#1)
- >=0.6.2 (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router02.sol#1)
- ^0.8.11 (deploy/Contract.sol#13)
Use one Solidity version.

Additional information: link

Context._msgData() (@openzeppelin/contracts/utils/Context.sol#21-23) is never used and should be removed
Remove unused functions.

Additional information: link

Pragma version^0.8.0 (@openzeppelin/contracts/access/Ownable.sol#4) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#4) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/utils/Context.sol#4) allows old versions
Pragma version>=0.5.0 (@uniswap/v2-core/contracts/interfaces/IUniswapV2Factory.sol#1) allows old versions
Pragma version>=0.6.2 (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router01.sol#1) allows old versions
Pragma version>=0.6.2 (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router02.sol#1) allows old versions
Pragma version^0.8.11 (deploy/Contract.sol#13) necessitates a version too recent to be trusted. Consider deploying with 0.6.12/0.7.6/0.8.7
solc-0.8.11 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Function IUniswapV2Router01.WETH() (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router01.sol#5) is not in mixedCase
Parameter Contract.setSwapAndLiquifyEnabled(bool)._enabled (deploy/Contract.sol#108) is not in mixedCase
Parameter Contract.set(uint256,uint256,uint256)._buyFee (deploy/Contract.sol#113) is not in mixedCase
Parameter Contract.set(uint256,uint256,uint256)._sellFee (deploy/Contract.sol#114) is not in mixedCase
Parameter Contract.set(uint256,uint256,uint256)._feeDivisor (deploy/Contract.sol#115) is not in mixedCase
Constant Contract._decimals (deploy/Contract.sol#22) is not in UPPER_CASE_WITH_UNDERSCORES
Constant Contract._tTotal (deploy/Contract.sol#23) is not in UPPER_CASE_WITH_UNDERSCORES
Follow the Solidity naming convention.

Additional information: link

Variable IUniswapV2Router01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router01.sol#10) is too similar to IUniswapV2Router01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (@uniswap/v2-periphery/contracts/interfaces/IUniswapV2Router01.sol#11)
Prevent variables from having similar names.

Additional information: link

Contract.slitherConstructorConstantVariables() (deploy/Contract.sol#20-220) uses literals with too many digits:
- _tTotal = 1000000000000000 * 10 ** _decimals (deploy/Contract.sol#23)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

Contract.MAX (deploy/Contract.sol#21) is never used in Contract (deploy/Contract.sol#20-220)
Remove unused state variables.

Additional information: link

Contract._swapTokensAtAmount (deploy/Contract.sol#30) should be constant
Add the constant attributes to state variables that never change.

Additional information: link

renounceOwnership() should be declared external:
- Ownable.renounceOwnership() (@openzeppelin/contracts/access/Ownable.sol#54-56)
transferOwnership(address) should be declared external:
- Ownable.transferOwnership(address) (@openzeppelin/contracts/access/Ownable.sol#62-65)
name() should be declared external:
- Contract.name() (deploy/Contract.sol#58-60)
symbol() should be declared external:
- Contract.symbol() (deploy/Contract.sol#62-64)
decimals() should be declared external:
- Contract.decimals() (deploy/Contract.sol#66-68)
totalSupply() should be declared external:
- Contract.totalSupply() (deploy/Contract.sol#70-72)
allowance(address,address) should be declared external:
- Contract.allowance(address,address) (deploy/Contract.sol#78-80)
Use the external attribute for functions never called from the contract.

Additional information: link

Holders:


Number of Binance Smart Chain (BSC) token holders is less than 100. Token is either dead or inactive. Ignore for presale.


Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.


Token is deployed only at one blockchain


Token has only one trading pair


Unable to find PancakeSwap trading pair to compute liquidity.


Unable to find PancakeSwap trading pair to compute volume.


Unable to find PancakeSwap trading pair to compute number of swaps.


Unable to find Twitter account


Telegram account has less than 100 subscribers


Unable to find Blog account (Reddit or Medium)


Unable to find Youtube account


Unable to find Discord account


Unable to find website, listings and other project-related information


Young tokens have high risks of scam / price dump / death


Token has no active CoinGecko listing / rank


Token has no active CoinMarketCap listing / rank

Price for SPEDO