MoonVikingsBSC.addLiquidity(uint256,uint256) (#1014-1029) sends eth to arbitrary user
Dangerous calls:
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#1019-1028)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in MoonVikingsBSC._transfer(address,address,uint256) (#945-980):
External calls:
- swapAndLiquify(contractTokenBalance) (#967)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#1019-1028)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1007-1011)
External calls sending eth:
- swapAndLiquify(contractTokenBalance) (#967)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#1019-1028)
State variables written after the call(s):
- _tokenTransfer(from,to,amount,takeFee) (#979)
- _rOwned[address(this)] = _rOwned[address(this)].add(rLiquidity) (#901)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#1076)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#1067)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#1068)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#804)
- _rOwned[sender] = _rOwned[sender].sub(rAmount) (#1087)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#1088)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#1078)
- _rOwned[recipient] = _rOwned[recipient].add(rTransferAmount) (#806)
- _tokenTransfer(from,to,amount,takeFee) (#979)
- _rTotal = _rTotal.sub(rFee) (#854)
- _tokenTransfer(from,to,amount,takeFee) (#979)
- _tOwned[address(this)] = _tOwned[address(this)].add(tLiquidity) (#902)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#803)
- _tOwned[sender] = _tOwned[sender].sub(tAmount) (#1086)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#1077)
- _tOwned[recipient] = _tOwned[recipient].add(tTransferAmount) (#805)
Apply the check-effects-interactions pattern.
Additional information: link
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
MoonVikingsBSC.addLiquidity(uint256,uint256) (#1014-1029) ignores return value by uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#1019-1028)
Ensure that all the return values of the function calls are used.
Additional information: link
MoonVikingsBSC._approve(address,address,uint256).owner (#938) shadows:
- Ownable.owner() (#408-410) (function)
Rename the local variables that shadow another component.
Additional information: link
MoonVikingsBSC.setMaxTxPercent(uint256) (#841-843) should emit an event for:
- _maxTransactionAmount = maxTxPercent * 10 ** _decimals (#842)
Emit an event for critical parameter changes.
Additional information: link
MoonVikingsBSC.setCharityWallet(address).newWallet (#828) lacks a zero-check on :
- _charityWallet = newWallet (#829)
Check that the address is not zero.
Additional information: link
Reentrancy in MoonVikingsBSC.transferFrom(address,address,uint256) (#722-726):
External calls:
- _transfer(sender,recipient,amount) (#723)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#1019-1028)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1007-1011)
External calls sending eth:
- _transfer(sender,recipient,amount) (#723)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#1019-1028)
State variables written after the call(s):
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#724)
- _allowances[owner][spender] = amount (#941)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in MoonVikingsBSC.transferFrom(address,address,uint256) (#722-726):
External calls:
- _transfer(sender,recipient,amount) (#723)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#1019-1028)
- uniswapV2Router.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1007-1011)
External calls sending eth:
- _transfer(sender,recipient,amount) (#723)
- uniswapV2Router.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,owner(),block.timestamp) (#1019-1028)
Event emitted after the call(s):
- Approval(owner,spender,amount) (#942)
- _approve(sender,_msgSender(),_allowances[sender][_msgSender()].sub(amount,ERC20: transfer amount exceeds allowance)) (#724)
Apply the check-effects-interactions pattern.
Additional information: link
Ownable.unlock() (#455-460) uses timestamp for comparisons
Dangerous comparisons:
- require(bool,string)(now > _lockTime,Contract is locked until 7 days) (#457)
Avoid relying on block.timestamp.
Additional information: link
Address._functionCallWithValue(address,bytes,uint256,string) (#356-384) uses assembly
- INLINE ASM (#377)
Do not use evm assembly.
Additional information: link
SafeMath.mod(uint256,uint256,string) (#220-223) is never used and should be removed
Remove unused functions.
Additional information: link
Low level call in Address._functionCallWithValue(address,bytes,uint256,string) (#356-384):
- (success,returndata) = target.call{value: weiValue}(data) (#360-364)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Variable MoonVikingsBSC._maxTransactionAmount (#643) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Redundant expression "this (#232)" inContext (#226-235)
Remove redundant statements if they congest code but offer no value.
Additional information: link
Variable MoonVikingsBSC.reflectionFromToken(uint256,bool).rTransferAmount (#764) is too similar to MoonVikingsBSC._transferStandard(address,address,uint256).tTransferAmount (#1066)
Prevent variables from having similar names.
Additional information: link
setRouterAddress(address) should be declared external:
- MoonVikingsBSC.setRouterAddress(address) (#1095-1099)
Use the external attribute for functions never called from the contract.
Additional information: link
Not a direct threat, but may indicate unreliable intentions of developer. Widespread names (e.g. Elon, King, Moon, Doge) are common among meme-tokens and scams. The allow to gain free hype and attract unexperienced investors.
Not a direct threat, but may indicate unreliable intentions of developer. Both name and ticker of current token are widespread, i.e. common across multiple tokens. This is slightly suspicious
Number of Binance Smart Chain (BSC) token holders is less than 100. Token is either dead or inactive. Ignore for presale.
Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute volume.
Unable to find PancakeSwap trading pair to compute number of swaps.
Unable to find website, listings and other project-related information
Young tokens have high risks of price dump / death
Token has no active CoinGecko listing / rank
Token has no active CoinMarketCap listing / rank
Unable to find Telegram and Twitter accounts