A FULLY DECENTRALISED GAMING PLATFORM | $XTS ✅ 0% TAX TOKEN BUT HOLDERS CAN STILL EARN DAILY DIVIDENDS IN BTC, ETH, BNB, USDT, ETC. IT’S A UNIQUE MULTIPLAYER GAME, USER CAN PLAY THE GAME WITH BETTING BTC ETH BNB AND MANY TOP COINS, 50% PROFIT FROM THE GAME CAN BE SHARED WITH $XTS HOLDERS EVERY 24 HOURS, GAME SOON CAN BE AVAILABLE ON WINDOWS, ANDROID, AND IOS ONE BY ONE FIRST BETA 0.1 RELEASE IN OCTOBER 2022 ✅COINGECKO ✅CMC ✅ CEX : CATEX AND COINSBIT ✅ DOXXED TEAM ✅ FULLY AUDITED
Unable to find manual contract audit (e.g. Certik, PeckShield, Solidity...)
Contract ownership is not renounced (belongs to a wallet)
Reentrancy in xavieraTech.enableTrading() (#346-355):
External calls:
- antiSnipe.setLaunch(lpPair,uint32(block.number),uint64(block.timestamp),_decimals) (#352)
State variables written after the call(s):
- tradingEnabled = true (#353)
Reentrancy in xavieraTech.transferOwner(address) (#178-189):
External calls:
- finalizeTransfer(_owner,newOwner,balanceOf(_owner),true) (#182)
- antiSnipe.checkUser(from,to,amount) (#379-380)
State variables written after the call(s):
- _owner = newOwner (#186)
Apply the check-effects-interactions pattern.
Additional information: link
xavieraTech.finalizeTransfer(address,address,uint256,bool).checked (#378) is a local variable never initialized
xavieraTech.finalizeTransfer(address,address,uint256,bool).check (#379) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.
Additional information: link
xavieraTech.finalizeTransfer(address,address,uint256,bool) (#370-388) ignores return value by antiSnipe.checkUser(from,to,amount) (#379-380)
Ensure that all the return values of the function calls are used.
Additional information: link
xavieraTech.setOperator(address).newOperator (#199) lacks a zero-check on :
- operator = newOperator (#205)
Check that the address is not zero.
Additional information: link
xavieraTech.finalizeTransfer(address,address,uint256,bool) (#370-388) has external calls inside a loop: antiSnipe.checkUser(from,to,amount) (#379-380)
Favor pull over push strategy for external calls.
Additional information: link
Variable 'xavieraTech.finalizeTransfer(address,address,uint256,bool).check (#379)' in xavieraTech.finalizeTransfer(address,address,uint256,bool) (#370-388) potentially used before declaration: checked = check (#380)
Move all variable declarations prior to any usage of the variable, and ensure that reaching a variable declaration does not depend on some conditional if it is used unconditionally.
Additional information: link
Reentrancy in xavieraTech.constructor() (#140-169):
External calls:
- lpPair = IFactoryV2(dexRouter.factory()).createPair(dexRouter.WETH(),address(this)) (#163)
State variables written after the call(s):
- _approve(_owner,address(dexRouter),type()(uint256).max) (#166)
- _allowances[sender][spender] = amount (#241)
- _approve(address(this),address(dexRouter),type()(uint256).max) (#167)
- _allowances[sender][spender] = amount (#241)
- _liquidityHolders[_owner] = true (#168)
- lpPairs[lpPair] = true (#164)
Reentrancy in xavieraTech.enableTrading() (#346-355):
External calls:
- antiSnipe.setLaunch(lpPair,uint32(block.number),uint64(block.timestamp),_decimals) (#352)
State variables written after the call(s):
- allowedPresaleExclusion = false (#354)
Reentrancy in xavieraTech.finalizeTransfer(address,address,uint256,bool) (#370-388):
External calls:
- antiSnipe.checkUser(from,to,amount) (#379-380)
State variables written after the call(s):
- _tOwned[from] -= amount (#383)
- _tOwned[to] += amount (#384)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in xavieraTech.constructor() (#140-169):
External calls:
- lpPair = IFactoryV2(dexRouter.factory()).createPair(dexRouter.WETH(),address(this)) (#163)
Event emitted after the call(s):
- Approval(sender,spender,amount) (#242)
- _approve(address(this),address(dexRouter),type()(uint256).max) (#167)
- Approval(sender,spender,amount) (#242)
- _approve(_owner,address(dexRouter),type()(uint256).max) (#166)
Reentrancy in xavieraTech.finalizeTransfer(address,address,uint256,bool) (#370-388):
External calls:
- antiSnipe.checkUser(from,to,amount) (#379-380)
Event emitted after the call(s):
- Transfer(from,to,amount) (#386)
Reentrancy in xavieraTech.transferOwner(address) (#178-189):
External calls:
- finalizeTransfer(_owner,newOwner,balanceOf(_owner),true) (#182)
- antiSnipe.checkUser(from,to,amount) (#379-380)
Event emitted after the call(s):
- OwnershipTransferred(oldOwner,newOwner) (#187)
Apply the check-effects-interactions pattern.
Additional information: link
xavieraTech._checkLiquidityAdd(address,address) (#335-344) has costly operations inside a loop:
- _hasLiqBeenAdded = true (#339)
xavieraTech._checkLiquidityAdd(address,address) (#335-344) has costly operations inside a loop:
- antiSnipe = AntiSnipe(address(this)) (#341)
Use a local variable to hold the loop computation result.
Additional information: link
Pragma version>=0.6.0<0.9.0 (#2) is too complex
solc-0.8.16 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Function IRouter01.WETH() (#33) is not in mixedCase
Contract xavieraTech (#101-390) is not in CapWords
Parameter xavieraTech.setProtectionSettings(bool,bool)._antiSnipe (#284) is not in mixedCase
Parameter xavieraTech.setProtectionSettings(bool,bool)._antiBlock (#284) is not in mixedCase
Constant xavieraTech.startingSupply (#117) is not in UPPER_CASE_WITH_UNDERSCORES
Constant xavieraTech._name (#118) is not in UPPER_CASE_WITH_UNDERSCORES
Constant xavieraTech._symbol (#119) is not in UPPER_CASE_WITH_UNDERSCORES
Constant xavieraTech._decimals (#120) is not in UPPER_CASE_WITH_UNDERSCORES
Constant xavieraTech._tTotal (#122) is not in UPPER_CASE_WITH_UNDERSCORES
Variable xavieraTech._hasLiqBeenAdded (#130) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Variable IRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#45) is too similar to IRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#46)
Prevent variables from having similar names.
Additional information: link
xavieraTech.slitherConstructorConstantVariables() (#101-390) uses literals with too many digits:
- DEAD = 0x000000000000000000000000000000000000dEaD (#127)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
xavieraTech.timeSinceLastPair (#109) is never used in xavieraTech (#101-390)
Remove unused state variables.
Additional information: link
xavieraTech.taxesAreLocked (#124) should be constant
xavieraTech.timeSinceLastPair (#109) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
transfer(address,uint256) should be declared external:
- xavieraTech.transfer(address,uint256) (#227-230)
enableTrading() should be declared external:
- xavieraTech.enableTrading() (#346-355)
Use the external attribute for functions never called from the contract.
Additional information: link
Contract name (xaviera.tech) contains non-alphanumeric characters.
Not a direct threat, but may indicate unreliable intentions of developer. Non-alphanumeric chars (,.;!#*&") are extremely rare among low risk tokens.
Contract ticker ($XTS) contains non-alphanumeric characters.
Not a direct threat, but may indicate unreliable intentions of developer. Non-alphanumeric chars (,.;!#*&") are extremely rare among low risk tokens.
BscScan page for the token does not contain additional info: website, socials, description, etc.
Additional information: link
Unable to find token/project description on the website or on BscScan, CoinMarketCap
Unable to find token contract audit
Unable to find KYC or doxxing proof
Unable to verify that token and website are owned by the same team (no listings + unable to find contract on website)
Unable to verify token contract address on the website
Unable to find audit link on the website
Unable to find whitepaper link on the website
Unable to find token on CoinGecko
Additional information: link
Unable to find token on CoinMarketCap
Additional information: link
Token is not listed at Mobula.Finance
Additional information: link
Unable to find token on CoinHunt
Additional information: link
Unable to find code repository for the project
Young tokens have high risks of scam / price dump / death
Token has no active CoinGecko listing / rank
Token has no active CoinMarketCap listing / rank
Token is relatively young, but twitter if very old (probably it's fake).
Unable to find Blog account (Reddit or Medium)
Unable to find Youtube account
Unable to find Discord account