Audit

KYC

BabyHashFlow

0x52087c2e0988e6fdf4a606c8074cfecad6fe0fb7

Audit Scope
Blockchain
Language
Compiler
Verified
Audit Method
Audit Date

Note that we only audited the code available to us on this URL at the time of the audit. If the URL is not from any block explorer (main net), it may be subject to change. Always check the contract address on this audit report and compare it to the token you are doing research for.

Audit Result
Latest update: Mon, 07 Nov 2022 13:36:27 +0100
Informational
Low-Risk
Medium-Risk
High-Risk

Contract Information

Total Supply
Decimals
Holders
License
Code
Ability to mint
Ability to blacklist
Max Transaction
Fee Limitation
Exclude from Fees
Contract Pausability

Audit Results

Informational ()
Low-Risk ()
Medium-Risk ()
High-Risk ()
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

CNS-015

Reliance on third-parties

Interaction between smart contracts with third-party protocols like Uniswap and Pancakeswap. The audit’s scope presupposes that third party entities will perform as intended and treats them as if they were black boxes. In the real world, third parties can be hacked and used against you. Additionally, improvements made by third parties may have negative effects, such as higher transaction costs or the deprecation of older routers.

Recommendation

Regularly check third-party dependencies, and when required, reduce severe effects.

Update notes

No notes.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

CNS-016

Initial supply

When the contract is deployed, the contract deployer receives all of the initially created assets. Since the deployer and/or contract owner can distribute tokens without consulting the community, this could be a problem.

Recommendation

Private keys belonging to the employer and/or contract owner should be stored properly. The initial asset allocation procedure should involve consultation with the community.

Update notes

No notes.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

Contract does not use a ReEntrancyGuardย 

One of the major dangers of calling external contracts is that they can take over the control flow. In the reentrancy attack (a.k.a. recursive call attack), a malicious contract calls back into the calling contract before the first invocation of the function is finished. This may cause the different invocations of the function to interact in undesirable ways.

 function _transfer(
        address from,
        address to,
        uint256 amount
    ) internal override {
        require(from != address(0), "ERC20: transfer from the zero address");
        require(to != address(0), "ERC20: transfer to the zero address");
        
         if(amount == 0) {
            super._transfer(from, to, 0);
            return;
        }
        
        if(!tradingActive){
            require(_isExcludedFromFees[from] || _isExcludedFromFees[to], "Trading is not active yet.");
        }
                
        if( 
            swapEnabled &&
            !swapping &&
            !automatedMarketMakerPairs[from] &&
            !_isExcludedFromFees[from] &&
            !_isExcludedFromFees[to]
        ) {
            swapping = true;
            swapBack();
            swapping = false;
        }

        bool takeFee = !swapping;

        // if any account belongs to _isExcludedFromFee account then remove the fee
        if(_isExcludedFromFees[from] || _isExcludedFromFees[to]) {
            takeFee = false;
        }
        
        uint256 fees = 0;
        
        // no taxes on transfers (non buys/sells)
        if(takeFee){

            if (tradingActiveBlock!=0 && block.number  0){
                fees = amount.mul(totalSellFees).div(100);
                tokensForRewards += fees * rewardsSellFee / totalSellFees;
                tokensForLiquidity += fees * liquiditySellFee / totalSellFees;
                tokensForMarketing += fees * marketingSellFee / totalSellFees;
            }
            // on buy
            else if(automatedMarketMakerPairs[from] && totalBuyFees > 0) {
        	    fees = amount.mul(totalBuyFees).div(100);
        	    tokensForRewards += fees * rewardsBuyFee / totalBuyFees;
                tokensForLiquidity += fees * liquidityBuyFee / totalBuyFees;
                tokensForMarketing += fees * marketingBuyFee / totalBuyFees;
            }
            
            if(fees > 0){    
                super._transfer(from, address(this), fees);
            }
        	
        	amount -= fees;
        }

        super._transfer(from, to, amount);

        try dividendTracker.setBalance(payable(from), balanceOf(from)) {} catch {}
        try dividendTracker.setBalance(payable(to), balanceOf(to)) {} catch {}

        if(!swapping) {
	    	uint256 gas = gasForProcessing;

	    	try dividendTracker.process(gas) returns (uint256 iterations, uint256 claims, uint256 lastProcessedIndex) {
	    		emit ProcessedDividendTracker(iterations, claims, lastProcessedIndex, true, gas, tx.origin);
	    	}
	    	catch {}
        }
    } 

Exploit scenario

				
					    function withdrawBalance(){
        // send userBalance[msg.sender] Ether to msg.sender
        // if mgs.sender is a contract, it will call its fallback function
        if( ! (msg.sender.call.value(userBalance[msg.sender])() ) ){
            throw;
        }
        userBalance[msg.sender] = 0;
    }
				
			
Bob uses the re-entrancy bug to callย withdrawBalanceย two times, and withdraw more than its initial deposit to the contract.

Recommendation

The best practices to avoid Reentrancy weaknesses are: Make sure all internal state changes are performed before the call is executed. This is known as the Checks-Effects-Interactions pattern, or use a reentrancy lock (ie. OpenZeppelin’s ReentrancyGuard.

Update notes

No notes.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

Floating Pragma

Contracts should be deployed with the same compiler version and flags that they have been tested with thoroughly. Locking the pragma helps to ensure that contracts do not accidentally get deployed using, for example, an outdated compiler version that might introduce bugs that affect the contract system negatively.

 pragma solidity ^0.8.9; 

Example

				
					pragma solidity ^0.4.0;

contract PragmaNotLocked {
    uint public x = 1;
}
				
			

Recommendation

Lock the pragma version and also consider known bugs (https://github.com/ethereum/solidity/releases) for the compiler version that is chosen.

Pragma statements can be allowed to float when a contract is intended for consumption by other developers, as in the case with contracts in a library or EthPM package. Otherwise, the developer would need to manually update the pragma in order to compile locally.

Update notes

No notes.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

Missing events arithmetic

Missing events for critical arithmetic parameters.

     function setSwapEnabled (bool _flag) public onlyOwner {
        swapEnabled = _flag;
    }

 

Example

				
					contract C {

    modifier onlyOwner {
        if (msg.sender != owner) throw;
        _;
    }

    function setBuyPrice(uint256 newBuyPrice) onlyOwner public {
        buyPrice = newBuyPrice;
    }

    function buy() external {
     ... // buyPrice is used to determine the number of tokens purchased
    }    
}
				
			

updateOwner()ย has no event, so it is difficult to track off-chain changes in the buy price.

Recommendation

Emit an event for critical parameter changes.

Update notes

No notes.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

Too many digits

Literals with many digits are difficult to read and review.

     // use by default 400,000 gas to process auto-claiming dividends
    uint256 public gasForProcessing = 400000;

        require(newValue >= 200000 && newValue <= 500000, " gasForProcessing must be between 200,000 and 500,000");
 

Example

				
					contract MyContract{
    uint 1_ether = 10000000000000000000; 
}
				
			

Whileย 1_etherย looks likeย 1 ether, it isย 10 ether. As a result, it’s likely to be used incorrectly.

Recommendation

Update notes

No notes.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

Missing zero address validation

     function updateMarketingWallet(address newMarketingWallet) external onlyOwner {
        excludeFromFees(newMarketingWallet, true);
        emit marketingWalletUpdated(newMarketingWallet, marketingWallet);
        marketingWallet = newMarketingWallet;
    } 

Example

				
					contract C {

  modifier onlyAdmin {
    if (msg.sender != owner) throw;
    _;
  }

  function updateOwner(address newOwner) onlyAdmin external {
    owner = newOwner;
  }
}
				
			

Bob callsย updateOwnerย without specifying theย newOwner, so Bob loses ownership of the contract.

Recommendation

Check that the address is not zero.

Update notes

No notes.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

CST-014

Ownership transferred to already current owner
         _mint(address(newOwner), totalSupply);
        transferOwnership(newOwner); 

Recommendation

Remove transferownership from the constructor
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

CST-015

Useless function ’emergencyPresaleAddressUpdate’
     // only use if conducting a presale (If using PinkSale, just put the same address in twice)
    function addPresaleAddressForExclusions(address _presaleAddress, address _presaleRouterAddress) external onlyOwner {
        presaleAddress = _presaleAddress;
        excludeFromFees(_presaleAddress, true);
        dividendTracker.excludeFromDividends(_presaleAddress);
        presaleRouterAddress = _presaleRouterAddress;
        excludeFromFees(_presaleRouterAddress, true);
        dividendTracker.excludeFromDividends(_presaleRouterAddress);
    }
    
    function emergencyPresaleAddressUpdate(address _presaleAddress, address _presaleRouterAddress) external onlyOwner {
        presaleAddress = _presaleAddress;
        presaleRouterAddress = _presaleRouterAddress;
    } 

Recommendation

the variables presaleAddress and presaleRouterAddress are never used. You can just use function addPresaleAddressForExclusions to change the presale address.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

CST-016

No limit on minimum token balance for dividends
     function setMinimumTokenBalanceForDividends (uint256 newAmount) public onlyOwner {
        dividendTracker.setMinimumTokenBalanceForDividends(newAmount);
    } 

Recommendation

Set a minimum requirement statement to prevent centralization risks.
Low-Risk

Could be fixed, will not bring problems.

Error Code

Description

CST-017

Block values as a proxy for time
             if (tradingActiveBlock!=0 && block.number <= tradingActiveBlock+2){
                fees = amount.mul(99).div(100);
                tokensForRewards += fees * rewardsSellFee / totalSellFees;
                tokensForLiquidity += fees * liquiditySellFee / totalSellFees;
                tokensForMarketing += fees * marketingSellFee / totalSellFees;
            } 

Recommendation

Considering the block time is generally about 14 seconds, it’s possible to predict the time delta between blocks. However, block times are not constant and are subject to change for a variety of reasons, e.g. fork reorganisations and the difficulty bomb. Due to variable block times, block.number should also not be relied on for precise calculations of time.
Medium-Risk

Could be fixed, will not bring problems.

Error Code

Description

CST-021

ERC20 decimals are set to 18, while contract decimals are set to 9
         address newOwner = msg.sender;
        _decimals = 9;
    
        uint256 totalSupply = 1e9 * (10**_decimals);

    function decimals() public view virtual override returns (uint8) {
        return 18;
    } 

Recommendation

Use the same decimals for all contracts
Medium-Risk

Could be fixed, will not bring problems.

Error Code

Description

CST-022

No minimum contract balance before swapping to dividends
         if( 
            swapEnabled &&
            !swapping &&
            !automatedMarketMakerPairs[from] &&
            !_isExcludedFromFees[from] &&
            !_isExcludedFromFees[to]
        ) {
            swapping = true;
            swapBack();
            swapping = false;
        } 

Recommendation

Every sell or every transfer, the contract balance is swapped. It is recommended to have a minimum balance to limit the amount of swaps.
Buy fee 2%
Sell fee 2%
Transfer fee 2%
<iframe width="100%" height="410px" frameBorder="0" scrolling="no" src="https://coinbrain.com/embed/bnb-0x52087c2e0988e6fdf4a606c8074cfecad6fe0fb7?theme=dark&padding=0&chart=1&trades=0">
Disclaimer
Latest update: Mon, 07 Nov 2022 13:36:27 +0100

This audit report has been prepared by Coinsultโ€™s experts at the request of the client. In this audit, the results of the static analysis and the manual code review will be presented. The purpose of the audit is to see if the functions work as intended, and to identify potential security issues within the smart contract.

The information in this report should be used to understand the risks associated with the smart contract. This report can be used as a guide for the development team on how the contract could possibly be improved by remediating the issues that were identified.

Coinsult is not responsible if a project turns out to be a scam, rug-pull or honeypot. We only provide a detailed analysis for your own research.

Coinsult is not responsible for any financial losses. Nothing in this contract audit is financial advice, please do your own research.

The information provided in this audit is for informational purposes only and should not be considered investment advice. Coinsult does not endorse, recommend, support or suggest to invest in any project.ย 

Coinsult can not be held responsible for when a project turns out to be a rug-pull, honeypot or scam.

Share this audit report