Smart Contract
Security Scan
Scanning Result
ETH
  • ETH
  • TRON
Waves
0x57daca8840fae5319bf73feff447139baba39c98
3.2
score
3.20/5
Defeated 28% of the rest smart contracts
2
High
risks
6
Medium
risks
0
Low
risks
Contact Us
To get detail info about vulnerability of smart contract and suggestion for optimizing, please contact: audit@cmcm.com
Details
Integers Overflow/Underflow
Integer Underflow

Very severe. Once the vulnerability is exploited, it might result in loss of large amount of assets directly.
To elaborate a bit: There might exist an integer underflow in the contract code, which can be exploited by attackers to steal funds or execute malicious transfers, etc.

Integer Overflow

There might exist an integer overflow in the contract code, which can be exploited by attackers to steal funds.

There might exist an integer overflow in the contract code, which can be exploited by attackers to steal funds.

Very severe. Once the vulnerability is exploited, it might result in loss of large amount of assets directly.
To elaborate a bit: There might exist an integer underflow in the contract code, which can be exploited by attackers to steal funds or execute malicious transfers, etc.

Vulnerabilities in external calls
Message call to external contract

There are vulnerabilities in message call to external contract. Attackers can exploit them with double spend attacks and malicious transfers.

State change after external call

To some extent at risk.
Status of contract has been changed after external call. Attackers can repeatedly exploit this vulnerability and it might result in business logic errors.

Unchecked CALL return value

To some extent at risk.
Vulnerabilities found with the function call and the contract might not be executed properly.

Multiple calls

Multiple sends exist in one transaction. This might lead to instability in contract execution.

There are vulnerabilities in message call to external contract. Attackers can exploit them with double spend attacks and malicious transfers.

To some extent at risk.
Status of contract has been changed after external call. Attackers can repeatedly exploit this vulnerability and it might result in business logic errors.

To some extent at risk.
Vulnerabilities found with the function call and the contract might not be executed properly.

Multiple sends exist in one transaction. This might lead to instability in contract execution.