SakuraToken Token Logo

ST [Sakura] Token

ALERT: unclassified scam

About ST

Listings

Not Found
Token 3 years

Website

Not Found

Description

Not Found

Social

Not Found

Laser Scorebeta Last Audit: 30 November 2021

report
Token seems to be a scam (type: unclassified scam).


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

SakuraToken.swapBack() (#527-571) sends eth to arbitrary user
Dangerous calls:
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#555)
Ensure that an arbitrary user cannot withdraw unauthorized funds.

Additional information: link

Reentrancy in SakuraToken._transferFrom(address,address,uint256) (#457-490):
External calls:
- swapBack() (#469)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#538-544)
- distributor.deposit{value: amountBNBReflection}() (#554)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#555)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#560-567)
External calls sending eth:
- swapBack() (#469)
- distributor.deposit{value: amountBNBReflection}() (#554)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#555)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#560-567)
State variables written after the call(s):
- _balances[sender] = _balances[sender].sub(amount,Insufficient Balance) (#472)
- _balances[recipient] = _balances[recipient].add(amountReceived) (#475)
- amountReceived = takeFee(sender,amount) (#474)
- _balances[address(this)] = _balances[address(this)].add(feeAmount) (#509)
Apply the check-effects-interactions pattern.

Additional information: link

DividendDistributor.distributeDividend(address) (#300-311) ignores return value by REWARDS.transfer(shareholder,amount) (#306)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.

Additional information: link


Too many vulnerabilities (Unchecked transfer, Reentrancy vulnerability, etc.). High risk of a scam. DYOR & manual audit are advised.

SakuraToken.swapBack().tmpSuccess (#555) is written in both
(tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#555)
tmpSuccess = false (#557)
Fix or remove the writes.

Additional information: link


Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.

Reentrancy in DividendDistributor.setShare(address,uint256) (#234-248):
External calls:
- distributeDividend(shareholder) (#236)
- REWARDS.transfer(shareholder,amount) (#306)
State variables written after the call(s):
- shares[shareholder].amount = amount (#246)
- shares[shareholder].totalExcluded = getCumulativeDividends(shares[shareholder].amount) (#247)
Apply the check-effects-interactions pattern.

Additional information: link

SakuraToken.swapBack() (#527-571) ignores return value by router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#560-567)
Ensure that all the return values of the function calls are used.

Additional information: link

SakuraToken.setSwapBackSettings(bool,uint256) (#607-610) should emit an event for:
- swapThreshold = _amount (#609)
Emit an event for critical parameter changes.

Additional information: link

SakuraToken.setLiquidityReciver(address)._autoLiquidityReceiver (#603) lacks a zero-check on :
- autoLiquidityReceiver = _autoLiquidityReceiver (#604)
Check that the address is not zero.

Additional information: link

Reentrancy in DividendDistributor.setShare(address,uint256) (#234-248):
External calls:
- distributeDividend(shareholder) (#236)
- REWARDS.transfer(shareholder,amount) (#306)
State variables written after the call(s):
- addShareholder(shareholder) (#240)
- shareholderIndexes[shareholder] = shareholders.length (#332)
- removeShareholder(shareholder) (#242)
- shareholderIndexes[shareholders[shareholders.length - 1]] = shareholderIndexes[shareholder] (#338)
- addShareholder(shareholder) (#240)
- shareholders.push(shareholder) (#333)
- removeShareholder(shareholder) (#242)
- shareholders[shareholderIndexes[shareholder]] = shareholders[shareholders.length - 1] (#337)
- shareholders.pop() (#339)
- totalShares = totalShares.sub(shares[shareholder].amount).add(amount) (#245)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in SakuraToken.swapBack() (#527-571):
External calls:
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#538-544)
- distributor.deposit{value: amountBNBReflection}() (#554)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#555)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#560-567)
External calls sending eth:
- distributor.deposit{value: amountBNBReflection}() (#554)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#555)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#560-567)
Event emitted after the call(s):
- AutoLiquify(amountBNBLiquidity,amountToLiquify) (#569)
Apply the check-effects-interactions pattern.

Additional information: link

DividendDistributor.shouldDistribute(address) (#295-298) uses timestamp for comparisons
Dangerous comparisons:
- shareholderClaims[shareholder] + minPeriod < block.timestamp && getUnpaidEarnings(shareholder) > minDistribution (#296-297)
Avoid relying on block.timestamp.

Additional information: link

DividendDistributor.process(uint256) (#270-294) has costly operations inside a loop:
- currentIndex ++ (#291)
Use a local variable to hold the loop computation result.

Additional information: link

SakuraToken.swapThreshold (#392) is set pre-construction with a non-constant function or state variable:
- _totalSupply * 10 / 10000
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.

Additional information: link

solc-0.8.4 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in SakuraToken.swapBack() (#527-571):
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#555)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Variable SakuraToken._allowances (#366) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

Variable IDEXRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#130) is too similar to IDEXRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#131)
Prevent variables from having similar names.

Additional information: link

SakuraToken.slitherConstructorVariables() (#343-636) uses literals with too many digits:
- distributorGas = 500000 (#389)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

SakuraToken.REWARDS (#346) is never used in SakuraToken (#343-636)
Remove unused state variables.

Additional information: link

SakuraToken.targetLiquidityDenominator (#383) should be constant
Add the constant attributes to state variables that never change.

Additional information: link

transferOwnership(address) should be declared external:
- Auth.transferOwnership(address) (#110-114)
Use the external attribute for functions never called from the contract.

Additional information: link

Holders:


Number of Binance Smart Chain (BSC) token holders is less than 100. Token is either dead or inactive. Ignore for presale.


Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.


Token is deployed only at one blockchain


Token has only one trading pair


Unable to find PancakeSwap trading pair to compute liquidity.


Unable to find PancakeSwap trading pair to compute volume.


Unable to find PancakeSwap trading pair to compute number of swaps.


Unable to find Telegram and Twitter accounts


Unable to find website, listings and other project-related information


Young tokens have high risks of price dump / death


Token has no active CoinGecko listing / rank


Token has no active CoinMarketCap listing / rank

Price for ST