Audit ID: 122
Critical Issues
Your contract has security issues that need to be addressed.
ID | Vulnerability | Severity | Location | Confidence | Details |
---|---|---|---|---|---|
V-001 | Reentrancy Vulnerability The contract is vulnerable to reentrancy attacks in the withdraw function. | Critical | Token.sol:156 | High | |
V-002 | Unchecked External Call External call result is not checked, which could lead to silent failures. | Critical | Token.sol:203 | High | |
V-003 | Integer Overflow Potential integer overflow in the calculateRewards function. | High | Staking.sol:87 | Medium | |
V-004 | Unprotected Function The setFeeRecipient function lacks access control. | High | Token.sol:245 | High | |
V-005 | Timestamp Dependence Contract relies on block.timestamp for critical operations. | High | Staking.sol:112 | Medium | |
V-006 | Missing Zero Address Check No zero address validation in the constructor for owner address. | Medium | Token.sol:42 | High | |
V-007 | Floating Pragma Contract uses a floating pragma ^0.8.0. | Low | Token.sol:1 | High |