Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
OrionPoolV2Pair._update(uint256,uint256,uint112,uint112) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#71-84) uses a weak PRNG: "blockTimestamp = uint32(block.timestamp % 2 ** 32) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#73)"
Do not use block.timestamp, now or blockhash as a source of randomness
Additional information: link
OrionPoolV2Pair._safeTransfer(address,address,uint256) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#42-45) uses a dangerous strict equality:
- require(bool,string)(success && (data.length == 0 || abi.decode(data,(bool))),OrionPoolV2: TRANSFER_FAILED) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#44)
OrionPoolV2Pair.mint(address) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#108-129) uses a dangerous strict equality:
- _totalSupply == 0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#117)
Don't use strict equality to determine if an account has enough Ether or tokens.
Additional information: link
Contract ticker (UNI-V2) contains non-alphanumeric characters.
Not a direct threat, but may indicate unreliable intentions of developer. Non-alphanumeric chars (,.;!#*&") are extremely rare among low risk tokens.
Reentrancy in OrionPoolV2Pair.burn(address) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#132-154):
External calls:
- _safeTransfer(_token0,to,amount0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#146)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#147)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
State variables written after the call(s):
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- blockTimestampLast = blockTimestamp (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#82)
- kLast = uint256(reserve0).mul(reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#152)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- reserve0 = uint112(balance0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#80)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- reserve1 = uint112(balance1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#81)
Reentrancy in OrionPoolV2Pair.swap(uint256,uint256,address,bytes) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#157-185):
External calls:
- _safeTransfer(_token0,to,amount0Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#168)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#169)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- IOrionPoolV2Callee(to).orionpoolV2Call(msg.sender,amount0Out,amount1Out,data) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#170)
State variables written after the call(s):
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- blockTimestampLast = blockTimestamp (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#82)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- reserve0 = uint112(balance0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#80)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- reserve1 = uint112(balance1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#81)
Apply the check-effects-interactions pattern.
Additional information: link
OrionPoolV2Pair.initialize(address,address)._token0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#64) lacks a zero-check on :
- token0 = _token0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#66)
OrionPoolV2Pair.initialize(address,address)._token1 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#64) lacks a zero-check on :
- token1 = _token1 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#67)
Check that the address is not zero.
Additional information: link
Reentrancy in OrionPoolV2Pair.burn(address) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#132-154):
External calls:
- _safeTransfer(_token0,to,amount0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#146)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#147)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
State variables written after the call(s):
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- price0CumulativeLast += uint256(UQ112x112.encode(_reserve1).uqdiv(_reserve0)) * timeElapsed (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#77)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- price1CumulativeLast += uint256(UQ112x112.encode(_reserve0).uqdiv(_reserve1)) * timeElapsed (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#78)
Reentrancy in OrionPoolV2Pair.swap(uint256,uint256,address,bytes) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#157-185):
External calls:
- _safeTransfer(_token0,to,amount0Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#168)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#169)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- IOrionPoolV2Callee(to).orionpoolV2Call(msg.sender,amount0Out,amount1Out,data) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#170)
State variables written after the call(s):
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- price0CumulativeLast += uint256(UQ112x112.encode(_reserve1).uqdiv(_reserve0)) * timeElapsed (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#77)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- price1CumulativeLast += uint256(UQ112x112.encode(_reserve0).uqdiv(_reserve1)) * timeElapsed (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#78)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in OrionPoolV2Pair.burn(address) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#132-154):
External calls:
- _safeTransfer(_token0,to,amount0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#146)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#147)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
Event emitted after the call(s):
- Burn(msg.sender,amount0,amount1,to) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#153)
- Sync(reserve0,reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#83)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
Reentrancy in OrionPoolV2Pair.swap(uint256,uint256,address,bytes) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#157-185):
External calls:
- _safeTransfer(_token0,to,amount0Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#168)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#169)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- IOrionPoolV2Callee(to).orionpoolV2Call(msg.sender,amount0Out,amount1Out,data) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#170)
Event emitted after the call(s):
- Swap(msg.sender,amount0In,amount1In,amount0Out,amount1Out,to) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#184)
- Sync(reserve0,reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#83)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
Apply the check-effects-interactions pattern.
Additional information: link
OrionPoolV2ERC20.permit(address,address,uint256,uint256,uint8,bytes32,bytes32) (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#79-91) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(deadline >= block.timestamp,OrionPoolV2: EXPIRED) (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#80)
OrionPoolV2Pair._update(uint256,uint256,uint112,uint112) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#71-84) uses timestamp for comparisons
Dangerous comparisons:
- timeElapsed > 0 && _reserve0 != 0 && _reserve1 != 0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#75)
Avoid relying on block.timestamp.
Additional information: link
OrionPoolV2ERC20.constructor() (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#22-36) uses assembly
- INLINE ASM (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#24-26)
Do not use evm assembly.
Additional information: link
SafeMath.div(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#135-138) is never used and should be removed
SafeMath.div(uint256,uint256,string) (@openzeppelin/contracts/math/SafeMath.sol#190-193) is never used and should be removed
SafeMath.mod(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#152-155) is never used and should be removed
SafeMath.mod(uint256,uint256,string) (@openzeppelin/contracts/math/SafeMath.sol#210-213) is never used and should be removed
SafeMath.sub(uint256,uint256,string) (@openzeppelin/contracts/math/SafeMath.sol#170-173) is never used and should be removed
SafeMath.tryAdd(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#24-28) is never used and should be removed
SafeMath.tryDiv(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#60-63) is never used and should be removed
SafeMath.tryMod(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#70-73) is never used and should be removed
SafeMath.tryMul(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#45-53) is never used and should be removed
SafeMath.trySub(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#35-38) is never used and should be removed
Remove unused functions.
Additional information: link
Pragma version>=0.6.0<0.8.0 (@openzeppelin/contracts/math/SafeMath.sol#3) is too complex
Pragma version>=0.6.0<0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#3) is too complex
solc-0.7.4 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in OrionPoolV2Pair._safeTransfer(address,address,uint256) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#42-45):
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Variable OrionPoolV2ERC20.DOMAIN_SEPARATOR (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#14) is not in mixedCase
Parameter OrionPoolV2Pair.initialize(address,address)._token0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#64) is not in mixedCase
Parameter OrionPoolV2Pair.initialize(address,address)._token1 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#64) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Variable OrionPoolV2Pair.swap(uint256,uint256,address,bytes).balance0Adjusted (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#178) is too similar to OrionPoolV2Pair.swap(uint256,uint256,address,bytes).balance1Adjusted (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#179)
Variable OrionPoolV2Pair.price0CumulativeLast (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#24) is too similar to OrionPoolV2Pair.price1CumulativeLast (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#25)
Prevent variables from having similar names.
Additional information: link
Number of Binance Smart Chain (BSC) token holders is less than 100. Token is either dead or inactive. Ignore for presale.
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute volume.
Unable to find PancakeSwap trading pair to compute number of swaps.
Unable to find website, listings and other project-related information
Token has a considerable age, but we're still unable to find its website
Token has no active CoinGecko listing / rank
Token has no active CoinMarketCap listing / rank
Token has a considerable age, but social accounts / website are missing or have few users
Token has a considerable age, but average PancakeSwap 30d trading volume is low
Young tokens have high risks of price dump / death
Unable to find Telegram and Twitter accounts