OrionPool V2 Token Logo

UNI-V2 [OrionPool V2] Token

About UNI-V2

Listings

Not Found
Token 3 years

Website

Not Found

Description

Not Found

Social

Not Found

Laser Scorebeta Last Audit: 30 December 2021

report
Token seems to be anonymous. As long as we are unable to find website score is limited.


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

OrionPoolV2Pair._update(uint256,uint256,uint112,uint112) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#71-84) uses a weak PRNG: "blockTimestamp = uint32(block.timestamp % 2 ** 32) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#73)"
Do not use block.timestamp, now or blockhash as a source of randomness

Additional information: link

OrionPoolV2Pair._safeTransfer(address,address,uint256) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#42-45) uses a dangerous strict equality:
- require(bool,string)(success && (data.length == 0 || abi.decode(data,(bool))),OrionPoolV2: TRANSFER_FAILED) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#44)
OrionPoolV2Pair.mint(address) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#108-129) uses a dangerous strict equality:
- _totalSupply == 0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#117)
Don't use strict equality to determine if an account has enough Ether or tokens.

Additional information: link

Contract ticker (UNI-V2) contains non-alphanumeric characters.
Not a direct threat, but may indicate unreliable intentions of developer. Non-alphanumeric chars (,.;!#*&") are extremely rare among low risk tokens.

Reentrancy in OrionPoolV2Pair.burn(address) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#132-154):
External calls:
- _safeTransfer(_token0,to,amount0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#146)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#147)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
State variables written after the call(s):
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- blockTimestampLast = blockTimestamp (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#82)
- kLast = uint256(reserve0).mul(reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#152)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- reserve0 = uint112(balance0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#80)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- reserve1 = uint112(balance1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#81)
Reentrancy in OrionPoolV2Pair.swap(uint256,uint256,address,bytes) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#157-185):
External calls:
- _safeTransfer(_token0,to,amount0Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#168)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#169)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- IOrionPoolV2Callee(to).orionpoolV2Call(msg.sender,amount0Out,amount1Out,data) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#170)
State variables written after the call(s):
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- blockTimestampLast = blockTimestamp (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#82)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- reserve0 = uint112(balance0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#80)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- reserve1 = uint112(balance1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#81)
Apply the check-effects-interactions pattern.

Additional information: link

OrionPoolV2Pair.initialize(address,address)._token0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#64) lacks a zero-check on :
- token0 = _token0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#66)
OrionPoolV2Pair.initialize(address,address)._token1 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#64) lacks a zero-check on :
- token1 = _token1 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#67)
Check that the address is not zero.

Additional information: link

Reentrancy in OrionPoolV2Pair.burn(address) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#132-154):
External calls:
- _safeTransfer(_token0,to,amount0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#146)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#147)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
State variables written after the call(s):
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- price0CumulativeLast += uint256(UQ112x112.encode(_reserve1).uqdiv(_reserve0)) * timeElapsed (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#77)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
- price1CumulativeLast += uint256(UQ112x112.encode(_reserve0).uqdiv(_reserve1)) * timeElapsed (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#78)
Reentrancy in OrionPoolV2Pair.swap(uint256,uint256,address,bytes) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#157-185):
External calls:
- _safeTransfer(_token0,to,amount0Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#168)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#169)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- IOrionPoolV2Callee(to).orionpoolV2Call(msg.sender,amount0Out,amount1Out,data) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#170)
State variables written after the call(s):
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- price0CumulativeLast += uint256(UQ112x112.encode(_reserve1).uqdiv(_reserve0)) * timeElapsed (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#77)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
- price1CumulativeLast += uint256(UQ112x112.encode(_reserve0).uqdiv(_reserve1)) * timeElapsed (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#78)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in OrionPoolV2Pair.burn(address) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#132-154):
External calls:
- _safeTransfer(_token0,to,amount0) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#146)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#147)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
Event emitted after the call(s):
- Burn(msg.sender,amount0,amount1,to) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#153)
- Sync(reserve0,reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#83)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#151)
Reentrancy in OrionPoolV2Pair.swap(uint256,uint256,address,bytes) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#157-185):
External calls:
- _safeTransfer(_token0,to,amount0Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#168)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- _safeTransfer(_token1,to,amount1Out) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#169)
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
- IOrionPoolV2Callee(to).orionpoolV2Call(msg.sender,amount0Out,amount1Out,data) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#170)
Event emitted after the call(s):
- Swap(msg.sender,amount0In,amount1In,amount0Out,amount1Out,to) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#184)
- Sync(reserve0,reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#83)
- _update(balance0,balance1,_reserve0,_reserve1) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#183)
Apply the check-effects-interactions pattern.

Additional information: link

OrionPoolV2ERC20.permit(address,address,uint256,uint256,uint8,bytes32,bytes32) (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#79-91) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(deadline >= block.timestamp,OrionPoolV2: EXPIRED) (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#80)
OrionPoolV2Pair._update(uint256,uint256,uint112,uint112) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#71-84) uses timestamp for comparisons
Dangerous comparisons:
- timeElapsed > 0 && _reserve0 != 0 && _reserve1 != 0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#75)
Avoid relying on block.timestamp.

Additional information: link

OrionPoolV2ERC20.constructor() (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#22-36) uses assembly
- INLINE ASM (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#24-26)
Do not use evm assembly.

Additional information: link

SafeMath.div(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#135-138) is never used and should be removed
SafeMath.div(uint256,uint256,string) (@openzeppelin/contracts/math/SafeMath.sol#190-193) is never used and should be removed
SafeMath.mod(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#152-155) is never used and should be removed
SafeMath.mod(uint256,uint256,string) (@openzeppelin/contracts/math/SafeMath.sol#210-213) is never used and should be removed
SafeMath.sub(uint256,uint256,string) (@openzeppelin/contracts/math/SafeMath.sol#170-173) is never used and should be removed
SafeMath.tryAdd(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#24-28) is never used and should be removed
SafeMath.tryDiv(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#60-63) is never used and should be removed
SafeMath.tryMod(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#70-73) is never used and should be removed
SafeMath.tryMul(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#45-53) is never used and should be removed
SafeMath.trySub(uint256,uint256) (@openzeppelin/contracts/math/SafeMath.sol#35-38) is never used and should be removed
Remove unused functions.

Additional information: link

Pragma version>=0.6.0<0.8.0 (@openzeppelin/contracts/math/SafeMath.sol#3) is too complex
Pragma version>=0.6.0<0.8.0 (@openzeppelin/contracts/token/ERC20/IERC20.sol#3) is too complex
solc-0.7.4 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

Low level call in OrionPoolV2Pair._safeTransfer(address,address,uint256) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#42-45):
- (success,data) = token.call(abi.encodeWithSelector(SELECTOR,to,value)) (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#43)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Variable OrionPoolV2ERC20.DOMAIN_SEPARATOR (contracts/utils/orionpool/core/OrionPoolV2ERC20.sol#14) is not in mixedCase
Parameter OrionPoolV2Pair.initialize(address,address)._token0 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#64) is not in mixedCase
Parameter OrionPoolV2Pair.initialize(address,address)._token1 (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#64) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

Variable OrionPoolV2Pair.swap(uint256,uint256,address,bytes).balance0Adjusted (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#178) is too similar to OrionPoolV2Pair.swap(uint256,uint256,address,bytes).balance1Adjusted (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#179)
Variable OrionPoolV2Pair.price0CumulativeLast (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#24) is too similar to OrionPoolV2Pair.price1CumulativeLast (contracts/utils/orionpool/core/OrionPoolV2Pair.sol#25)
Prevent variables from having similar names.

Additional information: link

Holders:


Number of Binance Smart Chain (BSC) token holders is less than 100. Token is either dead or inactive. Ignore for presale.


Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.


Token is deployed only at one blockchain


Token has only one trading pair


Unable to find PancakeSwap trading pair to compute liquidity.


Unable to find PancakeSwap trading pair to compute volume.


Unable to find PancakeSwap trading pair to compute number of swaps.


Unable to find Telegram and Twitter accounts


Unable to find website, listings and other project-related information


Token has a considerable age, but we're still unable to find its website


Token has no active CoinGecko listing / rank


Token has no active CoinMarketCap listing / rank


Token has a considerable age, but social accounts / website are missing or have few users


Token has a considerable age, but average PancakeSwap 30d trading volume is low


Young tokens have high risks of price dump / death

Price for UNI-V2