TCHALLA Token Logo

TCHA [TCHALLA] Token

About TCHA

Listings

Token 2 years

Website

white paper

T’Challa Token is the governance token of the T’Challa Foundation. It aims to build Wakanda Land Game (Metaverse). The T’Challa Wakanda Game will be a combination of multiple elements of technology, including virtual reality, augmented reality and African virtual Arts where users "live" within a digital universe and perform different task to survive in the Wakanda virtual game land. Tchalla is building first African indigenous launchpad called TCHAPAD.

TCHAPAD is a decentralized platform for launching new projects via token creation and the conduction of initial token offering and IDO . Token creation has been simplified for any start up to create their own token without Writing a single line of Code. This is done by simply following a few steps through our terminal and design your own token and launch in a few minutes. NFT being a big trend in the Crypto space, we will be tapping into this trend by building our own NFT marketplace where users can Mint,buy and sell their Digital art collections.

Social

Laser Scorebeta Last Audit: 1 December 2021

report
Token has too many issues. Scam probability is high.

Anti-Scam

Links


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

TCHALLA.addLiquidity(uint256,uint256) (#850-863) sends eth to arbitrary user
Dangerous calls:
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#855-862)
Ensure that an arbitrary user cannot withdraw unauthorized funds.

Additional information: link

TCHALLA._transfer(address,address,uint256) (#676-793) uses a weak PRNG: "_bBSLimit = _bBSLimitMin + uint256(keccak256(bytes)(abi.encodePacked(block.timestamp,block.difficulty))) % (_bBSLimitMax - _bBSLimitMin + 1) (#737)"
Do not use block.timestamp, now or blockhash as a source of randomness

Additional information: link

Reentrancy in TCHALLA._transfer(address,address,uint256) (#676-793):
External calls:
- swapTokens(contractTokenBalance) (#705)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#822-828)
- buyBackTokens(_bBSLimit) (#740)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#840-845)
External calls sending eth:
- swapTokens(contractTokenBalance) (#705)
- recipient.transfer(amount) (#1146)
- buyBackTokens(_bBSLimit) (#740)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#840-845)
State variables written after the call(s):
- _tokenTransfer(from,to,amount,takeFee) (#792)
- _rOwned[address(this)] = _rOwned[address(this)].add(rLiquidity) (#969)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#885)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#894)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#905)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#915)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#886)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#896)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#906)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#917)
- _tokenTransfer(from,to,amount,takeFee) (#792)
- _rTotal = _rTotal.sub(rFee) (#924)
- _tokenTransfer(from,to,amount,takeFee) (#792)
- _tOwned[address(this)] = _tOwned[address(this)].add(tLiquidity) (#971)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#914)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#904)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#895)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#916)
- buyBackTokens(_bBSLimit) (#740)
- inSwapAndLiquify = true (#522)
- inSwapAndLiquify = false (#524)
Apply the check-effects-interactions pattern.

Additional information: link


Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.

TCHALLA._transfer(address,address,uint256).sellHistory (#692) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.

Additional information: link

TCHALLA.addLiquidity(uint256,uint256) (#850-863) ignores return value by uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#855-862)
Ensure that all the return values of the function calls are used.

Additional information: link

TCHALLA._approve(address,address,uint256).owner (#668) shadows:
- Ownable.owner() (#167-169) (function)
Rename the local variables that shadow another component.

Additional information: link

TCHALLA.setNumTokensSellToAddToBuyBack(uint256) (#1108-1110) should emit an event for:
- minimumTokensBeforeSwap = _minimumTokensBeforeSwap (#1109)
Emit an event for critical parameter changes.

Additional information: link

TCHALLA.setMarketingAddress(address)._marketingAddress (#1112) lacks a zero-check on :
- marketingAddress = address(_marketingAddress) (#1113)
Check that the address is not zero.

Additional information: link

Reentrancy in TCHALLA.transferFrom(address,address,uint256) (#586-590):
External calls:
- _transfer(sender,recipient,amount) (#587)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#840-845)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#822-828)
External calls sending eth:
- _transfer(sender,recipient,amount) (#587)
- recipient.transfer(amount) (#1146)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#840-845)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#588)
- _allowances[owner][spender] = amount (#672)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in TCHALLA.transferFrom(address,address,uint256) (#586-590):
External calls:
- _transfer(sender,recipient,amount) (#587)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#840-845)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#822-828)
External calls sending eth:
- _transfer(sender,recipient,amount) (#587)
- recipient.transfer(amount) (#1146)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#840-845)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#673)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#588)
Apply the check-effects-interactions pattern.

Additional information: link

TCHALLA._removeOldSellHistories() (#1025-1047) uses timestamp for comparisons
Dangerous comparisons:
- _sellHistories[j].time >= maxStartTimeForHistories (#1031)
Avoid relying on block.timestamp.

Additional information: link

Address._functionCallWithValue(address,bytes,uint256,string) (#134-151) uses assembly
- INLINE ASM (#143-146)
Do not use evm assembly.

Additional information: link

TCHALLA.addLiquidity(uint256,uint256) (#850-863) is never used and should be removed
Remove unused functions.

Additional information: link

TCHALLA._previousLiquidityFee (#463) is set pre-construction with a non-constant function or state variable:
- _liquidityFee
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.

Additional information: link

solc-0.8.4 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in Address._functionCallWithValue(address,bytes,uint256,string) (#134-151):
- (success,returndata) = target.call{value: weiValue}(data) (#137)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Variable TCHALLA._isEnabledBuyBackAndBurn (#499) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

Redundant expression "this (#21)" inContext (#15-24)
Remove redundant statements if they congest code but offer no value.

Additional information: link

Reentrancy in TCHALLA.transferFrom(address,address,uint256) (#586-590):
External calls:
- _transfer(sender,recipient,amount) (#587)
- recipient.transfer(amount) (#1146)
External calls sending eth:
- _transfer(sender,recipient,amount) (#587)
- recipient.transfer(amount) (#1146)
- uniswapV2Router.swapExactETHForTokensSupportingFeeOnTransferTokens{value: amount}(0,path,deadAddress,block.timestamp.add(300)) (#840-845)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#588)
- _allowances[owner][spender] = amount (#672)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#673)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#588)
Apply the check-effects-interactions pattern.

Additional information: link

Variable TCHALLA._getValues(uint256).rTransferAmount (#930) is too similar to TCHALLA._getValues(uint256).tTransferAmount (#929)
Prevent variables from having similar names.

Additional information: link

TCHALLA.slitherConstructorVariables() (#420-1198) uses literals with too many digits:
- minimumTokensBeforeSwap = 200000 * 1 ** 6 * 10 ** 9 (#482)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

TCHALLA.deadAddress (#425) should be constant
Add the constant attributes to state variables that never change.

Additional information: link

transferForeignToken(address,address) should be declared external:
- TCHALLA.transferForeignToken(address,address) (#1168-1172)
Use the external attribute for functions never called from the contract.

Additional information: link

Holders:


Number of Binance Smart Chain (BSC) token holders is less than 100. Token is either dead or inactive. Ignore for presale.


Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.


Token is deployed only at one blockchain


Token has only one trading pair


Unable to find PancakeSwap trading pair to compute liquidity.


Unable to find PancakeSwap trading pair to compute volume.


Unable to find PancakeSwap trading pair to compute number of swaps.


Telegram account link seems to be invalid


Twitter account link seems to be invalid


Unable to find Youtube account


Unable to find Discord account


Unable to crawl data from the website


BscScan page for the token does not contain additional info: website, socials, description, etc.

Additional information: link


Token was delisted (assigned to inactive / untracked listing) from CoinMarketCap

Additional information: link


Unable to find token contract audit


Unable to verify token contract address on the website


Unable to find audit link on the website


Unable to find whitepaper link on the website


Unable to find Telegram link on the website


Unable to find Twitter link on the website


Unable to find token on CoinHunt

Additional information: link


Unable to find code repository for the project


Young tokens have high risks of price dump / death


Young tokens have high risks of scam / price dump / death


Token has no active CoinMarketCap listing / rank


Token has relatively low CoinGecko rank

Price for TCHA