Sparta warriors defended, determined to fight back the huge Persian army of nearly 1 million troops to annex Greece
Unable to verify that contract auditor is trusted: Certik, Quantstamp, Hacken, Solidity, Paladinsec, Openzeppelin, Verichains
TheSpartansToken._transfer(address,address,uint256) (contracts/TheSpartansToken.sol#182-219) has external calls inside a loop: BP.protect(sender,recipient,amount) (contracts/TheSpartansToken.sol#195)
Favor pull over push strategy for external calls.
Additional information: link
TheSpartansToken.ceil(uint256,uint256) (contracts/TheSpartansToken.sol#263-265) performs a multiplication on the result of a division:
-((a + m - 1) / m) * m (contracts/TheSpartansToken.sol#264)
Consider ordering multiplication before division.
Additional information: link
Reentrancy in TheSpartansToken._transfer(address,address,uint256) (contracts/TheSpartansToken.sol#182-219):
External calls:
- BP.protect(sender,recipient,amount) (contracts/TheSpartansToken.sol#195)
State variables written after the call(s):
- _balances[poolWallet] = _balances[poolWallet] + poolFee (contracts/TheSpartansToken.sol#202)
- _balances[marketingWallet] = _balances[marketingWallet] + marketingFee (contracts/TheSpartansToken.sol#210)
- _balances[sender] = _balances[sender] - amount (contracts/TheSpartansToken.sol#216)
- _balances[recipient] = _balances[recipient] + tokensToTransfer (contracts/TheSpartansToken.sol#217)
Apply the check-effects-interactions pattern.
Additional information: link
TheSpartansToken.balanceOf(address).owner (contracts/TheSpartansToken.sol#93) shadows:
- Ownable.owner() (@openzeppelin/contracts/access/Ownable.sol#34-36) (function)
TheSpartansToken.allowance(address,address).owner (contracts/TheSpartansToken.sol#106) shadows:
- Ownable.owner() (@openzeppelin/contracts/access/Ownable.sol#34-36) (function)
TheSpartansToken._approve(address,address,uint256).owner (contracts/TheSpartansToken.sol#125) shadows:
- Ownable.owner() (@openzeppelin/contracts/access/Ownable.sol#34-36) (function)
Rename the local variables that shadow another component.
Additional information: link
TheSpartansToken.setPoolReward(uint256) (contracts/TheSpartansToken.sol#243-246) should emit an event for:
- _poolReward = reward (contracts/TheSpartansToken.sol#245)
TheSpartansToken.setMarketingReward(uint256) (contracts/TheSpartansToken.sol#248-251) should emit an event for:
- _marketingReward = reward (contracts/TheSpartansToken.sol#250)
Emit an event for critical parameter changes.
Additional information: link
TheSpartansToken.constructor(address,address)._uniswapV2Pair (contracts/TheSpartansToken.sol#54) lacks a zero-check on :
- uniswapV2Pair = _uniswapV2Pair (contracts/TheSpartansToken.sol#57)
TheSpartansToken.constructor(address,address).marketingWallet_ (contracts/TheSpartansToken.sol#48) lacks a zero-check on :
- marketingWallet = marketingWallet_ (contracts/TheSpartansToken.sol#60)
TheSpartansToken.setPoolWallet(address).poolWallet_ (contracts/TheSpartansToken.sol#235) lacks a zero-check on :
- poolWallet = poolWallet_ (contracts/TheSpartansToken.sol#236)
TheSpartansToken.setMarketingWallet(address).marketingWallet_ (contracts/TheSpartansToken.sol#239) lacks a zero-check on :
- marketingWallet = marketingWallet_ (contracts/TheSpartansToken.sol#240)
Check that the address is not zero.
Additional information: link
Reentrancy in TheSpartansToken.constructor(address,address) (contracts/TheSpartansToken.sol#46-61):
External calls:
- _uniswapV2Pair = IPancakeFactory(_pancakeV2Router.factory()).createPair(address(this),_pancakeV2Router.WETH()) (contracts/TheSpartansToken.sol#54)
State variables written after the call(s):
- isExcludedFromFee[msg.sender] = true (contracts/TheSpartansToken.sol#59)
- isPairAddress[_uniswapV2Pair] = true (contracts/TheSpartansToken.sol#56)
- marketingWallet = marketingWallet_ (contracts/TheSpartansToken.sol#60)
- pancakeV2Router = _pancakeV2Router (contracts/TheSpartansToken.sol#58)
- uniswapV2Pair = _uniswapV2Pair (contracts/TheSpartansToken.sol#57)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in TheSpartansToken._transfer(address,address,uint256) (contracts/TheSpartansToken.sol#182-219):
External calls:
- BP.protect(sender,recipient,amount) (contracts/TheSpartansToken.sol#195)
Event emitted after the call(s):
- Transfer(sender,poolWallet,poolFee) (contracts/TheSpartansToken.sol#205)
- Transfer(sender,marketingWallet,marketingFee) (contracts/TheSpartansToken.sol#213)
- Transfer(sender,recipient,tokensToTransfer) (contracts/TheSpartansToken.sol#218)
Apply the check-effects-interactions pattern.
Additional information: link
Address.isContract(address) (@openzeppelin/contracts/utils/Address.sol#26-36) uses assembly
- INLINE ASM (@openzeppelin/contracts/utils/Address.sol#32-34)
Address.verifyCallResult(bool,bytes,string) (@openzeppelin/contracts/utils/Address.sol#195-215) uses assembly
- INLINE ASM (@openzeppelin/contracts/utils/Address.sol#207-210)
Do not use evm assembly.
Additional information: link
TheSpartansToken.setBotProtectionDisableForever() (contracts/TheSpartansToken.sol#72-75) compares to a boolean constant:
-require(bool)(BPDisabledForever == false) (contracts/TheSpartansToken.sol#73)
TheSpartansToken._transfer(address,address,uint256) (contracts/TheSpartansToken.sol#182-219) compares to a boolean constant:
-isExcludedFromFee[sender] != true (contracts/TheSpartansToken.sol#200)
TheSpartansToken._transfer(address,address,uint256) (contracts/TheSpartansToken.sol#182-219) compares to a boolean constant:
-isExcludedFromFee[sender] != true && (isPairAddress[sender] || isPairAddress[recipient]) (contracts/TheSpartansToken.sol#208)
Remove the equality to the boolean constant.
Additional information: link
Address.functionCall(address,bytes) (@openzeppelin/contracts/utils/Address.sol#79-81) is never used and should be removed
Address.functionCall(address,bytes,string) (@openzeppelin/contracts/utils/Address.sol#89-95) is never used and should be removed
Address.functionCallWithValue(address,bytes,uint256) (@openzeppelin/contracts/utils/Address.sol#108-114) is never used and should be removed
Address.functionCallWithValue(address,bytes,uint256,string) (@openzeppelin/contracts/utils/Address.sol#122-133) is never used and should be removed
Address.functionDelegateCall(address,bytes) (@openzeppelin/contracts/utils/Address.sol#168-170) is never used and should be removed
Address.functionDelegateCall(address,bytes,string) (@openzeppelin/contracts/utils/Address.sol#178-187) is never used and should be removed
Address.functionStaticCall(address,bytes) (@openzeppelin/contracts/utils/Address.sol#141-143) is never used and should be removed
Address.functionStaticCall(address,bytes,string) (@openzeppelin/contracts/utils/Address.sol#151-160) is never used and should be removed
Address.isContract(address) (@openzeppelin/contracts/utils/Address.sol#26-36) is never used and should be removed
Address.sendValue(address,uint256) (@openzeppelin/contracts/utils/Address.sol#54-59) is never used and should be removed
Address.verifyCallResult(bool,bytes,string) (@openzeppelin/contracts/utils/Address.sol#195-215) is never used and should be removed
Context._msgData() (@openzeppelin/contracts/utils/Context.sol#20-22) is never used and should be removed
TheSpartansToken._mint(address,uint256) (contracts/TheSpartansToken.sol#229-233) is never used and should be removed
Remove unused functions.
Additional information: link
Pragma version^0.8.0 (@openzeppelin/contracts/access/Ownable.sol#3) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#3) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/utils/Address.sol#3) allows old versions
Pragma version^0.8.0 (@openzeppelin/contracts/utils/Context.sol#3) allows old versions
Pragma version^0.8.0 (contracts/TheSpartansToken.sol#2) allows old versions
Pragma version^0.8.0 (contracts/interfaces/IPancakeFactory.sol#3) allows old versions
Pragma version^0.8.0 (contracts/interfaces/IPancakeRouter01.sol#2) allows old versions
Pragma version^0.8.0 (contracts/interfaces/IPancakeRouter02.sol#2) allows old versions
solc-0.8.0 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in Address.sendValue(address,uint256) (@openzeppelin/contracts/utils/Address.sol#54-59):
- (success) = recipient.call{value: amount}() (@openzeppelin/contracts/utils/Address.sol#57)
Low level call in Address.functionCallWithValue(address,bytes,uint256,string) (@openzeppelin/contracts/utils/Address.sol#122-133):
- (success,returndata) = target.call{value: value}(data) (@openzeppelin/contracts/utils/Address.sol#131)
Low level call in Address.functionStaticCall(address,bytes,string) (@openzeppelin/contracts/utils/Address.sol#151-160):
- (success,returndata) = target.staticcall(data) (@openzeppelin/contracts/utils/Address.sol#158)
Low level call in Address.functionDelegateCall(address,bytes,string) (@openzeppelin/contracts/utils/Address.sol#178-187):
- (success,returndata) = target.delegatecall(data) (@openzeppelin/contracts/utils/Address.sol#185)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Parameter TheSpartansToken.setBPAddrss(address)._bp (contracts/TheSpartansToken.sol#63) is not in mixedCase
Parameter TheSpartansToken.setBpEnabled(bool)._enabled (contracts/TheSpartansToken.sol#68) is not in mixedCase
Variable TheSpartansToken.BP (contracts/TheSpartansToken.sol#23) is not in mixedCase
Variable TheSpartansToken.BPDisabledForever (contracts/TheSpartansToken.sol#25) is not in mixedCase
Constant TheSpartansToken._name (contracts/TheSpartansToken.sol#35) is not in UPPER_CASE_WITH_UNDERSCORES
Constant TheSpartansToken._symbol (contracts/TheSpartansToken.sol#36) is not in UPPER_CASE_WITH_UNDERSCORES
Constant TheSpartansToken._decimals (contracts/TheSpartansToken.sol#37) is not in UPPER_CASE_WITH_UNDERSCORES
Function IPancakeRouter01.WETH() (contracts/interfaces/IPancakeRouter01.sol#6) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Variable IPancakeRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (contracts/interfaces/IPancakeRouter01.sol#11) is too similar to IPancakeRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (contracts/interfaces/IPancakeRouter01.sol#12)
Prevent variables from having similar names.
Additional information: link
TheSpartansToken.slitherConstructorVariables() (contracts/TheSpartansToken.sol#15-267) uses literals with too many digits:
- _totalSupply = 10000000 * 10 ** uint256(_decimals) (contracts/TheSpartansToken.sol#39)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
TheSpartansToken._totalSupply (contracts/TheSpartansToken.sol#39) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
renounceOwnership() should be declared external:
- Ownable.renounceOwnership() (@openzeppelin/contracts/access/Ownable.sol#53-55)
transferOwnership(address) should be declared external:
- Ownable.transferOwnership(address) (@openzeppelin/contracts/access/Ownable.sol#61-64)
name() should be declared external:
- TheSpartansToken.name() (contracts/TheSpartansToken.sol#77-79)
symbol() should be declared external:
- TheSpartansToken.symbol() (contracts/TheSpartansToken.sol#81-83)
decimals() should be declared external:
- TheSpartansToken.decimals() (contracts/TheSpartansToken.sol#85-87)
totalSupply() should be declared external:
- TheSpartansToken.totalSupply() (contracts/TheSpartansToken.sol#89-91)
balanceOf(address) should be declared external:
- TheSpartansToken.balanceOf(address) (contracts/TheSpartansToken.sol#93-95)
allowance(address,address) should be declared external:
- TheSpartansToken.allowance(address,address) (contracts/TheSpartansToken.sol#106-113)
approve(address,uint256) should be declared external:
- TheSpartansToken.approve(address,uint256) (contracts/TheSpartansToken.sol#115-122)
increaseAllowance(address,uint256) should be declared external:
- TheSpartansToken.increaseAllowance(address,uint256) (contracts/TheSpartansToken.sol#136-147)
decreaseAllowance(address,uint256) should be declared external:
- TheSpartansToken.decreaseAllowance(address,uint256) (contracts/TheSpartansToken.sol#149-160)
transferFrom(address,address,uint256) should be declared external:
- TheSpartansToken.transferFrom(address,address,uint256) (contracts/TheSpartansToken.sol#162-170)
multiTransfer(address[],uint256[]) should be declared external:
- TheSpartansToken.multiTransfer(address[],uint256[]) (contracts/TheSpartansToken.sol#221-227)
Use the external attribute for functions never called from the contract.
Additional information: link
Average 30d PancakeSwap volume is less than $100. Token is either dead or inactive.
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute number of swaps.
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Unable to verify token contract address on the website
Unable to find whitepaper link on the website
Unable to find token on CoinHunt
Additional information: link
Unable to find code repository for the project
Young tokens have high risks of price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of price dump / death
Young tokens have high risks of price dump / death
Young tokens have high risks of price dump / death
Token has relatively low CoinGecko rank
Token has relatively low CoinMarketCap rank
Last post in Twitter was more than 30 days ago