ZillaDoge.swapAndDistributeBNB(uint256) (#1927-1957) sends eth to arbitrary user
Dangerous calls:
- (success,None) = address(buybackWallet).call{value: forBuyback}() (#1944)
- (success,None) = address(dividendTracker).call{value: forDividends}() (#1951)
Ensure that an arbitrary user cannot withdraw unauthorized funds.
Additional information: link
Reentrancy in ZillaDoge.swapAndDistributeBNB(uint256) (#1927-1957):
External calls:
- swapTokensForEth(tokens) (#1928)
- pancakeRouter.swapExactTokensForETHSupportingFeeOnTransferTokens(tokenAmount,0,path,address(this),block.timestamp) (#1917-1923)
- (success) = address(marketingWallet).call{value: forMarketing}() (#1937)
- (success,None) = address(buybackWallet).call{value: forBuyback}() (#1944)
- (success,None) = address(dividendTracker).call{value: forDividends}() (#1951)
External calls sending eth:
- (success) = address(marketingWallet).call{value: forMarketing}() (#1937)
- (success,None) = address(buybackWallet).call{value: forBuyback}() (#1944)
- (success,None) = address(dividendTracker).call{value: forDividends}() (#1951)
State variables written after the call(s):
- accDividendFee = 1 (#1955)
Apply the check-effects-interactions pattern.
Additional information: link
ZillaDoge.withdrawStuckTokens(address,uint256) (#1959-1961) ignores return value by IERC20(_token).transfer(msg.sender,_amount) (#1960)
Use SafeERC20, or ensure that the transfer/transferFrom return value is checked.
Additional information: link
Unable to verify that contract auditor is trusted: Certik, Quantstamp, Hacken, Solidity, Paladinsec, Openzeppelin, Verichains
Combination 1: Reentrancy vulnerabilities + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 2: Unchecked transfer + Functions that send Ether to arbitraty destination. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Combination 3: Reentrancy vulnerabilities + Unchecked transfer vulnerability. Usual for scams. May be justified by some complex mechanics (e.g. rebase, reflections). DYOR & manual audit are advised.
Reentrancy in ZillaDoge.updateDividendTracker(address) (#1660-1674):
External calls:
- newDividendTracker.excludeFromDividends(address(newDividendTracker)) (#1667)
- newDividendTracker.excludeFromDividends(address(this)) (#1668)
- newDividendTracker.excludeFromDividends(address(pancakeRouter)) (#1669)
State variables written after the call(s):
- dividendTracker = newDividendTracker (#1673)
Apply the check-effects-interactions pattern.
Additional information: link
ZillaDoge._transfer(address,address,uint256).lastProcessedIndex (#1898) is a local variable never initialized
Initialize all the variables. If a variable is meant to be initialized to zero, explicitly set it to zero to improve code readability.
Additional information: link
ZillaDoge._transfer(address,address,uint256) (#1805-1905) ignores return value by dividendTracker.process(gas) (#1898-1903)
Ensure that all the return values of the function calls are used.
Additional information: link
DividendPayingToken.constructor(string,string)._symbol (#849) shadows:
- ERC20._symbol (#167) (state variable)
Rename the local variables that shadow another component.
Additional information: link
ZillaDoge.updatePancakeRouter(address)._pancakePair (#1539-1540) lacks a zero-check on :
- pancakePair = _pancakePair (#1541)
Check that the address is not zero.
Additional information: link
Variable 'ZillaDoge._transfer(address,address,uint256).lastProcessedIndex (#1898)' in ZillaDoge._transfer(address,address,uint256) (#1805-1905) potentially used before declaration: ProcessedDividendTracker(iterations,claims,lastProcessedIndex,true,gas,tx.origin) (#1899)
Move all variable declarations prior to any usage of the variable, and ensure that reaching a variable declaration does not depend on some conditional if it is used unconditionally.
Additional information: link
Reentrancy in ZillaDoge.updatePancakeRouter(address) (#1535-1551):
External calls:
- _pancakePair = IPancakeFactory(pancakeRouter.factory()).createPair(address(this),pancakeRouter.WETH()) (#1539-1540)
- dividendTracker.excludeFromDividends(address(pancakeRouter)) (#1543)
- dividendTracker.excludeFromDividends(pancakePair) (#1544)
State variables written after the call(s):
- excludeFromAllLimits(newAddress,true) (#1546)
- _isExcludedFromFees[account] = status (#1557)
- excludeFromAllLimits(newAddress,true) (#1546)
- _isExcludedFromMaxHoldLimit[account] = status (#1560)
- _isExcludedFromMaxHoldLimit[pancakePair] = true (#1549)
- excludeFromAllLimits(newAddress,true) (#1546)
- _isExcludedFromMaxTxLimit[account] = status (#1558)
- excludeFromAllLimits(newAddress,true) (#1546)
- _isExcludedFromPeriodLimit[account] = status (#1559)
- _isExcludedFromPeriodLimit[pancakePair] = true (#1548)
Apply the check-effects-interactions pattern.
Additional information: link
Reentrancy in ZillaDoge.updateDividendTracker(address) (#1660-1674):
External calls:
- newDividendTracker.excludeFromDividends(address(newDividendTracker)) (#1667)
- newDividendTracker.excludeFromDividends(address(this)) (#1668)
- newDividendTracker.excludeFromDividends(address(pancakeRouter)) (#1669)
Event emitted after the call(s):
- UpdateDividendTracker(newAddress,address(dividendTracker)) (#1671)
Apply the check-effects-interactions pattern.
Additional information: link
ZillaDoge.getAccountPeriodSellVolume(address) (#1584-1608) uses timestamp for comparisons
Dangerous comparisons:
- block.timestamp.sub(accountSells[account][i].time) <= restrictionPeriod (#1589)
Avoid relying on block.timestamp.
Additional information: link
SafeMathInt.mul(int256,int256) (#491-499) is never used and should be removed
Remove unused functions.
Additional information: link
ZillaDoge.swapTokensAtAmount (#1422) is set pre-construction with a non-constant function or state variable:
- 10000 * (10 ** decimals())
Remove any initialization of state variables via non-constant state variables or function calls. If variables must be set upon contract deployment, locate initialization in the constructor instead.
Additional information: link
solc-0.8.0 is not recommended for deployment
Deploy with any of the following Solidity versions: 0.5.16 - 0.5.17, 0.6.11 - 0.6.12, 0.7.5 - 0.7.6 Use a simple pragma version that allows any of these versions. Consider using the latest version of Solidity for testing.
Additional information: link
Low level call in ZillaDoge.swapAndDistributeBNB(uint256) (#1927-1957):
- (success) = address(marketingWallet).call{value: forMarketing}() (#1937)
- (success,None) = address(buybackWallet).call{value: forBuyback}() (#1944)
- (success,None) = address(dividendTracker).call{value: forDividends}() (#1951)
Avoid low-level calls. Check the call success. If the call is meant for a contract, check for code existence
Additional information: link
Parameter ZillaDoge.withdrawStuckTokens(address,uint256)._amount (#1959) is not in mixedCase
Follow the Solidity naming convention.
Additional information: link
Variable IPancakeRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountADesired (#1280) is too similar to IPancakeRouter01.addLiquidity(address,address,uint256,uint256,uint256,uint256,address,uint256).amountBDesired (#1281)
Prevent variables from having similar names.
Additional information: link
ZillaDoge.slitherConstructorVariables() (#1408-1963) uses literals with too many digits:
- gasForProcessing = 300000 (#1437)
Use: Ether suffix, Time suffix, or The scientific notation
Additional information: link
Ownable._previousOwner (#17) is never used in ZillaDoge (#1408-1963)
Remove unused state variables.
Additional information: link
Ownable._previousOwner (#17) should be constant
Add the constant attributes to state variables that never change.
Additional information: link
withdrawStuckTokens(address,uint256) should be declared external:
- ZillaDoge.withdrawStuckTokens(address,uint256) (#1959-1961)
Use the external attribute for functions never called from the contract.
Additional information: link
Average 30d PancakeSwap volume is low.
Average PancakeSwap trading volume, liqudity, number of swaps are low. Token seems to be inactive.
Token is deployed only at one blockchain
Token has only one trading pair
Unable to find PancakeSwap trading pair to compute liquidity.
Unable to find PancakeSwap trading pair to compute number of swaps.
Young tokens have high risks of price dump / death
Young tokens have high risks of scam / price dump / death
Token has no active CoinGecko listing / rank
Young tokens have high risks of price dump / death
Token has relatively low CoinMarketCap rank
Twitter account link seems to be invalid
Unable to find Blog account (Reddit or Medium)
Unable to find Youtube account
Unable to find Discord account