SMART CONTRACT
SECURITY SCANNING
3.20/5
SCAN RESULTS
Defeated 8% of the rest smart contracts
  • High risks2
  • Medium risks4
  • Low risks0
To get detail info about vulnerability of smart contract and suggestion for optimizing, please contact: [email protected]
DETAILS
Tips: The detection result shows the current risks of the smart contract and is merely for reference. If there is a false positive, please contact us.
Integers Overflow/Underflow
Integer Underflow

Very severe. Once the vulnerability is exploited, it might result in loss of large amount of assets directly.
To elaborate a bit: There might exist an integer underflow in the contract code, which can be exploited by attackers to steal funds or execute malicious transfers, etc.

Integer Overflow

There might exist an integer overflow in the contract code, which can be exploited by attackers to steal funds.

There might exist an integer overflow in the contract code, which can be exploited by attackers to steal funds.

Very severe. Once the vulnerability is exploited, it might result in loss of large amount of assets directly.
To elaborate a bit: There might exist an integer underflow in the contract code, which can be exploited by attackers to steal funds or execute malicious transfers, etc.

Vulnerabilities in external calls
Message call to external contract

There are vulnerabilities in message call to external contract. Attackers can exploit them with double spend attacks and malicious transfers.

State change after external call

To some extent at risk.
Status of contract has been changed after external call. Attackers can repeatedly exploit this vulnerability and it might result in business logic errors.

Unchecked CALL return value

To some extent at risk.
Vulnerabilities found with the function call and the contract might not be executed properly.

Multiple calls

Multiple sends exist in one transaction. This might lead to instability in contract execution.

There are vulnerabilities in message call to external contract. Attackers can exploit them with double spend attacks and malicious transfers.

To some extent at risk.
Status of contract has been changed after external call. Attackers can repeatedly exploit this vulnerability and it might result in business logic errors.

To some extent at risk.
Vulnerabilities found with the function call and the contract might not be executed properly.

Multiple sends exist in one transaction. This might lead to instability in contract execution.