VetMe has been established to fix the gaps that exist in online professional communities and make certain that people get the accurate picture when it comes to facts and figures about people, products, services, jobs and other facets of business and work.
This will be achieved by providing an escrow service system and a vetting platform. 0 % TAX for the first two days, then 6% BUY and 6 SELL.
VetMe.swapBack() (#378-420) sends eth to arbitrary user
Dangerous calls:
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in VetMe._transferFrom(address,address,uint256) (#295-326):
External calls:
- swapBack() (#316)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#389-395)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#410-417)
External calls sending eth:
- swapBack() (#316)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#410-417)
State variables written after the call(s):
- _balances[sender] = _balances[sender].sub(amount,Insufficient Balance) (#319)
- _balances[recipient] = _balances[recipient].add(amountReceived) (#322)
- amountReceived = takeFee(sender,amount) (#321)
- _balances[address(this)] = _balances[address(this)].add(feeAmount) (#356)
Apply the check-effects-interactions pattern.
Additional information: link
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
VetMe.swapBack().tmpSuccess (#404) is written in both
(tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
tmpSuccess = false (#407)
Fix or remove the writes.
Additional information: link
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Contract ownership is not renounced (belongs to a wallet)
VetMe.takeFee(address,uint256) (#352-360) performs a multiplication on the result of a division:
-feeAmount = amount.div(feeDenominator * 100).mul(totalFee) (#354)
VetMe.setTxLimit(uint256) (#423-426) performs a multiplication on the result of a division:
-require(bool,string)(amount > (_totalSupply / 100) * 1,Cannot set below 1%) (#425)
Consider ordering multiplication before division.
Additional information: link
VetMe.swapBack() (#378-420) ignores return value by router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#410-417)
Ensure that all the return values of the function calls are used.
Additional information: link
VetMe.setTxLimit(uint256) (#423-426) should emit an event for:
- _maxTxAmount = amount (#424)
VetMe.setFees(uint256,uint256) (#440-445) should emit an event for:
- liquidityFee = _liquidityFee (#441)
- marketingFee = _marketingFee (#442)
- totalFee = _liquidityFee.add(_marketingFee) (#443)
VetMe.setSwapBackSettings(bool,uint256) (#452-455) should emit an event for:
- swapThreshold = _amount (#454)
VetMe.setTargetLiquidity(uint256,uint256) (#457-460) should emit an event for:
- targetLiquidity = _target (#458)
- targetLiquidityDenominator = _denominator (#459)
Emit an event for critical parameter changes.
Additional information: link
Auth.renounce(address).adr (#84) lacks a zero-check on :
- owner = adr (#85)
VetMe.setFeeReceivers(address,address)._autoLiquidityReceiver (#447) lacks a zero-check on :
- autoLiquidityReceiver = _autoLiquidityReceiver (#448)
VetMe.setFeeReceivers(address,address)._marketingFeeReceiver (#447) lacks a zero-check on :
- marketingFeeReceiver = _marketingFeeReceiver (#449)
Check that the address is not zero.
Additional information: link
Reentrancy in VetMe.constructor() (#239-256):
External calls:
- pair = IDEXFactory(router.factory()).createPair(WBNB,address(this)) (#241)
State variables written after the call(s):
- _allowances[address(this)][address(router)] = uint256(- 1) (#242)
- _balances[msg.sender] = _totalSupply (#254)
- autoLiquidityReceiver = address(this) (#251)
- isFeeExempt[msg.sender] = true (#244)
- isTimelockExempt[msg.sender] = true (#247)
- isTimelockExempt[DEAD] = true (#248)
- isTimelockExempt[address(this)] = true (#249)
- isTxLimitExempt[msg.sender] = true (#245)
- marketingFeeReceiver = MarketingWallet (#252)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in VetMe._transferFrom(address,address,uint256) (#295-326):
External calls:
- swapBack() (#316)
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#389-395)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#410-417)
External calls sending eth:
- swapBack() (#316)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#410-417)
Event emitted after the call(s):
- Transfer(sender,address(this),feeAmount) (#357)
- amountReceived = takeFee(sender,amount) (#321)
- Transfer(sender,recipient,amountReceived) (#324)
Reentrancy in VetMe.constructor() (#239-256):
External calls:
- pair = IDEXFactory(router.factory()).createPair(WBNB,address(this)) (#241)
Event emitted after the call(s):
- Transfer(address(0),msg.sender,_totalSupply) (#255)
Reentrancy in VetMe.swapBack() (#378-420):
External calls:
- router.swapExactTokensForETHSupportingFeeOnTransferTokens(amountToSwap,0,path,address(this),block.timestamp) (#389-395)
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#410-417)
External calls sending eth:
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
- router.addLiquidityETH{value: amountBNBLiquidity}(address(this),amountToLiquify,0,0,autoLiquidityReceiver,block.timestamp) (#410-417)
Event emitted after the call(s):
- AutoLiquify(amountBNBLiquidity,amountToLiquify) (#418)
Apply the check-effects-interactions pattern.
Additional information: link
VetMe._transferFrom(address,address,uint256) (#295-326) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(cooldownTimer[recipient] < block.timestamp,Please wait for cooldown between buys) (#310)
Avoid relying on block.timestamp.
Additional information: link
VetMe.totalFee (#212) is set pre-construction with a non-constant function or state variable:
- marketingFee + liquidityFee
VetMe.swapThreshold (#233) is set pre-construction with a non-constant function or state variable:
- _totalSupply / 500
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
Pragma version^0.7.4 (#7) allows old versions
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in VetMe.refresh() (#335-338):
- (sent) = address(msg.sender).call{value: (address(this).balance)}() (#336)
Low level call in VetMe.swapBack() (#378-420):
- (tmpSuccess) = address(marketingFeeReceiver).call{gas: 30000,value: amountBNBMarketing}() (#404)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Function IDEXRouter.WETH() (#99) is not in mixedCase
Parameter VetMe.cooldownEnabled(bool,uint8)._status (#371) is not in mixedCase
Parameter VetMe.cooldownEnabled(bool,uint8)._interval (#371) is not in mixedCase
Parameter VetMe.setFees(uint256,uint256)._liquidityFee (#440) is not in mixedCase
Parameter VetMe.setFees(uint256,uint256)._marketingFee (#440) is not in mixedCase
Parameter VetMe.setFeeReceivers(address,address)._autoLiquidityReceiver (#447) is not in mixedCase
Parameter VetMe.setFeeReceivers(address,address)._marketingFeeReceiver (#447) is not in mixedCase
Parameter VetMe.setSwapBackSettings(bool,uint256)._enabled (#452) is not in mixedCase
Parameter VetMe.setSwapBackSettings(bool,uint256)._amount (#452) is not in mixedCase
Parameter VetMe.setTargetLiquidity(uint256,uint256)._target (#457) is not in mixedCase
Parameter VetMe.setTargetLiquidity(uint256,uint256)._denominator (#457) is not in mixedCase
Variable VetMe.WBNB (#188) is not in mixedCase
Variable VetMe.DEAD (#189) is not in mixedCase
Variable VetMe.ZERO (#190) is not in mixedCase
Variable VetMe.MarketingWallet (#192) is not in mixedCase
Constant VetMe._name (#194) is not in UPPER_CASE_WITH_UNDERSCORES
Constant VetMe._symbol (#195) is not in UPPER_CASE_WITH_UNDERSCORES
Constant VetMe._decimals (#196) is not in UPPER_CASE_WITH_UNDERSCORES
Variable VetMe._totalSupply (#198) is not in mixedCase
Variable VetMe._maxTxAmount (#199) is not in mixedCase
Variable VetMe._maxWalletToken (#200) is not in mixedCase
Variable VetMe._balances (#202) is not in mixedCase
Variable VetMe._allowances (#203) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Variable IDEXRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#104) is too similar to IDEXRouter.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#105)
Prevent variables from having similar names.
Additional information: link
VetMe.slitherConstructorVariables() (#186-491) uses literals with too many digits:
- DEAD = 0x000000000000000000000000000000000000dEaD (#189)
VetMe.slitherConstructorVariables() (#186-491) uses literals with too many digits:
- ZERO = 0x0000000000000000000000000000000000000000 (#190)
VetMe.slitherConstructorVariables() (#186-491) uses literals with too many digits:
- _totalSupply = 1000000 * (10 ** _decimals) (#198)
VetMe.slitherConstructorVariables() (#186-491) uses literals with too many digits:
- _maxWalletToken = 1000000 * (10 ** _decimals) (#200)
VetMe.slitherConstructorVariables() (#186-491) uses literals with too many digits:
- distributorGas = 500000 (#226)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
VetMe.isDividendExempt (#208) is never used in VetMe (#186-491)
VetMe.distributorGas (#226) is never used in VetMe (#186-491)
Remove unused state variables.
Additional information: link
VetMe.DEAD (#189) should be constant
VetMe.MarketingWallet (#192) should be constant
VetMe.WBNB (#188) should be constant
VetMe.ZERO (#190) should be constant
VetMe._totalSupply (#198) should be constant
VetMe.distributorGas (#226) should be constant
VetMe.feeDenominator (#213) should be constant
VetMe.tradingOpen (#224) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
authorize(address) should be declared external:
- Auth.authorize(address) (#56-58)
unauthorize(address) should be declared external:
- Auth.unauthorize(address) (#63-65)
validate(address,uint256) should be declared external:
- VetMe.validate(address,uint256) (#340-342)
cooldownEnabled(bool,uint8) should be declared external:
- VetMe.cooldownEnabled(bool,uint8) (#371-374)
Use the external attribute for functions never called from the contract.
Additional information: link
Contract ticker ($VetMe) contains non-alphanumeric characters.
Not a direct threat, but may indicate unreliable intentions of developer. Non-alphanumeric chars (,.;!#*&") are extremely rare among low risk tokens.
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Unable to find token contract audit
Unable to find KYC or doxxing proof
Unable to verify that token and website are owned by the same team (no listings + unable to find contract on website)
Unable to verify token contract address on the website
Unable to find audit link on the website
Unable to find token on CoinGecko
Additional information: link
Unable to find token on CoinMarketCap
Additional information: link
Token is not listed at Mobula.Finance
Additional information: link
Unable to find token on CoinHunt
Additional information: link
Unable to find code repository for the project
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Young tokens have high risks of scam / price dump / death
Token has no active CoinGecko listing / rank
Token has no active CoinMarketCap listing / rank
Twitter account has less than 100 followers
Unable to find Blog account (Reddit or Medium)
Unable to find Youtube account
Unable to find Discord account
Twitter account has few posts