WEDEX TOKEN Token Logo

WEX [WEDEX] Token

About WEX

Listings

Not Found
Token 3 years

Website

Not Found

Description

Not Found

Social

Not Found

Laser Scorebeta Last Audit: 30 November 2021

report
Token seems to be anonymous. As long as we are unable to find website score is limited.


Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)

Wedex.addLiquidity(uint256,uint256) (#1540-1553) sends eth to arbitrary user
Dangerous calls:
- wedexSwapRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1545-1552)
Ensure that an arbitrary user cannot withdraw unauthorized funds.

Additional information: link

Reentrancy in Wedex._transfer(address,address,uint256) (#1454-1485):
External calls:
- swapAndLiquify() (#1464)
- wedexSwapRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1545-1552)
- wedexSwapRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1530-1536)
External calls sending eth:
- swapAndLiquify() (#1464)
- wedexSwapRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1545-1552)
State variables written after the call(s):
- super._transfer(sender,recipient,amount) (#1468)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#1046)
- _balances[recipient] = _balances[recipient].add(amount) (#1047)
- super._transfer(sender,BURN_ADDRESS,burnAmount) (#1480)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#1046)
- _balances[recipient] = _balances[recipient].add(amount) (#1047)
- super._transfer(sender,address(this),liquidityAmount) (#1481)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#1046)
- _balances[recipient] = _balances[recipient].add(amount) (#1047)
- super._transfer(sender,recipient,sendAmount) (#1482)
- _balances[sender] = _balances[sender].sub(amount,BEP20: transfer amount exceeds balance) (#1046)
- _balances[recipient] = _balances[recipient].add(amount) (#1047)
Apply the check-effects-interactions pattern.

Additional information: link

WedexChef.safeWedexTransfer(address,uint256) (#2191-2198) ignores return value by wedex.transfer(_to,_amount) (#2196)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.

Additional information: link

Wedex._presaleLocked (#1373) is never initialized. It is used in:
- Wedex.presaleLocked(address) (#1568-1570)
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.

Additional information: link

WedexChef.updatePool(uint256) (#2085-2101) uses a dangerous strict equality:
- lpSupply == 0 || pool.allocPoint == 0 (#2091)
Don't use strict equality to determine if an account has enough Ether or tokens.

Additional information: link


Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.


Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.

Pragma version>=0.5.0 (#1329) allows old versions
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.

Additional information: link

WedexChef.updatePool(uint256) (#2085-2101) performs a multiplication on the result of a division:
-wedexReward = multiplier.mul(wedexPerBlock).mul(pool.allocPoint).div(totalAllocPoint) (#2096)
-pool.accWedexPerShare = pool.accWedexPerShare.add(wedexReward.mul(1e12).div(lpSupply)) (#2099)
Consider ordering multiplication before division.

Additional information: link

Reentrancy in WedexChef.withdraw(uint256,uint256) (#2132-2145):
External calls:
- updatePool(_pid) (#2136)
- wedex.mint(devAddress,wedexReward.div(10)) (#2097)
- wedex.mint(address(this),wedexReward) (#2098)
- payOrLockupPendingWedex(_pid) (#2137)
- wedex.transfer(_to,wedexBal) (#2194)
- wedex.transfer(_to,_amount) (#2196)
- wedex.mint(referrer,commissionAmount) (#2234)
- wedexReferral.recordReferralCommission(referrer,commissionAmount) (#2235)
- pool.lpToken.safeTransfer(address(msg.sender),_amount) (#2140)
- wedexReferral.reduceTotalFund(wedexReferral.getReferrer(msg.sender),_amount,0) (#2141)
State variables written after the call(s):
- user.rewardDebt = user.amount.mul(pool.accWedexPerShare).div(1e12) (#2143)
Apply the check-effects-interactions pattern.

Additional information: link

Wedex.addLiquidity(uint256,uint256) (#1540-1553) ignores return value by wedexSwapRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1545-1552)
Ensure that all the return values of the function calls are used.

Additional information: link

Wedex.recoverLostBNB()._owner (#1644) shadows:
- Ownable._owner (#693) (state variable)
Rename the local variables that shadow another component.

Additional information: link

WedexChef.set(uint256,uint256,uint16,uint256,bool) (#2038-2048) should emit an event for:
- totalAllocPoint = totalAllocPoint.sub(poolInfo[_pid].allocPoint).add(_allocPoint) (#2044)
Emit an event for critical parameter changes.

Additional information: link

Wedex.recoverLostBNB()._owner (#1644) lacks a zero-check on :
- _owner.transfer(address(this).balance) (#1645)
Check that the address is not zero.

Additional information: link

Reentrancy in Wedex.swapAndLiquify() (#1488-1518):
External calls:
- swapTokensForEth(half) (#1508)
- wedexSwapRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1530-1536)
- addLiquidity(otherHalf,newBalance) (#1514)
- wedexSwapRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1545-1552)
External calls sending eth:
- addLiquidity(otherHalf,newBalance) (#1514)
- wedexSwapRouter.addLiquidityETH{value: ethAmount}(address(this),tokenAmount,0,0,operator(),block.timestamp) (#1545-1552)
State variables written after the call(s):
- addLiquidity(otherHalf,newBalance) (#1514)
- _allowances[owner][spender] = amount (#1108)
Apply the check-effects-interactions pattern.

Additional information: link

Reentrancy in WedexChef.withdraw(uint256,uint256) (#2132-2145):
External calls:
- updatePool(_pid) (#2136)
- wedex.mint(devAddress,wedexReward.div(10)) (#2097)
- wedex.mint(address(this),wedexReward) (#2098)
- payOrLockupPendingWedex(_pid) (#2137)
- wedex.transfer(_to,wedexBal) (#2194)
- wedex.transfer(_to,_amount) (#2196)
- wedex.mint(referrer,commissionAmount) (#2234)
- wedexReferral.recordReferralCommission(referrer,commissionAmount) (#2235)
- pool.lpToken.safeTransfer(address(msg.sender),_amount) (#2140)
- wedexReferral.reduceTotalFund(wedexReferral.getReferrer(msg.sender),_amount,0) (#2141)
Event emitted after the call(s):
- Withdraw(msg.sender,_pid,_amount) (#2144)
Apply the check-effects-interactions pattern.

Additional information: link

WedexChef.canHarvest(uint256,address) (#2071-2074) uses timestamp for comparisons
Dangerous comparisons:
- block.timestamp >= user.nextHarvestUntil (#2073)
Avoid relying on block.timestamp.

Additional information: link

Wedex.getChainId() (#1905-1909) uses assembly
- INLINE ASM (#1907)
Do not use evm assembly.

Additional information: link

WedexChef.nonDuplicated(IBEP20) (#2013-2016) compares to a boolean constant:
-require(bool,string)(poolExistence[_lpToken] == false,nonDuplicated: duplicated) (#2014)
Remove the equality to the boolean constant.

Additional information: link

Different versions of Solidity is used:
- Version used: ['0.6.12', '>=0.4.0', '>=0.5.0', '>=0.6.0<0.8.0', '>=0.6.2', '>=0.6.2<0.8.0', '^0.6.0']
- >=0.6.0<0.8.0 (#3)
- >=0.4.0 (#220)
- >=0.6.2<0.8.0 (#321)
- ^0.6.0 (#513)
- 0.6.12 (#616)
- >=0.6.0<0.8.0 (#651)
- >=0.6.0<0.8.0 (#678)
- >=0.6.0<0.8.0 (#748)
- >=0.4.0 (#815)
- >=0.6.2 (#1130)
- >=0.6.2 (#1228)
- >=0.5.0 (#1274)
- >=0.5.0 (#1329)
- 0.6.12 (#1351)
- 0.6.12 (#1915)
Use one Solidity version.

Additional information: link

Wedex.swapTokensForEth(uint256) (#1521-1537) is never used and should be removed
Remove unused functions.

Additional information: link

Low level call in Address.functionDelegateCall(address,bytes,string) (#481-487):
- (success,returndata) = target.delegatecall(data) (#485)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence

Additional information: link

Parameter WedexChef.payReferralCommission(address,uint256)._pending (#2227) is not in mixedCase
Follow the Solidity naming convention.

Additional information: link

Redundant expression "this (#669)" inContext (#663-672)
Remove redundant statements if they congest code but offer no value.

Additional information: link

Variable IUniswapV2Router01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#1139) is too similar to IUniswapV2Router01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#1140)
Prevent variables from having similar names.

Additional information: link

Wedex.slitherConstructorConstantVariables() (#1354-1910) uses literals with too many digits:
- BURN_ADDRESS = 0x000000000000000000000000000000000000dEaD (#1362)
Use: Ether suffix, Time suffix, or The scientific notation

Additional information: link

setWedexReferral(IWedexReferral) should be declared external:
- WedexChef.setWedexReferral(IWedexReferral) (#2221-2223)
Use the external attribute for functions never called from the contract.

Additional information: link

Holders:


Average PancakeSwap trading volume, liqudity, number of swaps are extremely low. Token seems to be dead.


Number of Binance Smart Chain (BSC) token holders is low.


Token is deployed only at one blockchain


Token has only one trading pair


Unable to find PancakeSwap trading pair to compute liquidity.


Unable to find PancakeSwap trading pair to compute volume.


Unable to find PancakeSwap trading pair to compute number of swaps.


Unable to find Telegram and Twitter accounts


Unable to find website, listings and other project-related information


Token has no active CoinGecko listing / rank


Token has no active CoinMarketCap listing / rank


Young tokens have high risks of price dump / death

Price for WEX