ASYAGRO

ASYAGRO

Date
Auditor
April 2022
Hacksafe

Audit Details

Audited project

ASYAGRO

Deployer address

0x8A9A638F389B22469D99CE156680822f53D77275

Client contacts

ASYAGRO team

Blockchain

Binance smartchain

Website

www.asyagro.io

Disclaimer

This is a limited report on our findings based on our analysis, in accordance with good industry practice as at the date of this report, in relation to cybersecurity vulnerabilities and issues in the framework and algorithms based on smart contracts, the details of which are set out in this report. In order to get a full view of our analysis, it is crucial for you to read the full report. While we have done our best in conducting our analysis and producing this report, it is important to note that you should not rely on this report and cannot claim against us on the basis of what it says or doesn’t say, or how we produced it, and it is important for you to conduct your own independent investigations before making any decisions. We go into more detail on this in the below disclaimer below – please make sure to read it in full.
DISCLAIMER: By reading this report or any part of it, you agree to the terms of this disclaimer. If you do not agree to the terms, then please immediately cease reading this report, and delete and destroy any and all copies of this report downloaded and/or printed by you. This report is provided for information purposes only and on a non-reliance basis, and does not constitute investment advice. No one shall have any right to rely on the report or its contents, and TechRate and its affiliates (including holding companies, shareholders, subsidiaries, employees, directors, officers and other representatives) (HackSafe) owe no duty of care towards you or any other person, nor does HackSafe make any warranty or representation to any person on the accuracy or completeness of the report. The report is provided “as is”, without any conditions, warranties or other terms of any kind except as set out in this disclaimer, and HackSafe hereby excludes all representations, warranties, conditions and other terms (including, without limitation, the warranties implied by law of satisfactory quality, fitness for purpose and the use of reasonable care and skill) which, but for this clause, might have effect in relation to the report. Except and only to the extent that it is prohibited by law, HackSafe hereby excludes all liability and responsibility, and neither you nor any other person shall have any claim against HackSafe, for any amount or kind of loss or damage that may result to you or any other person (including without limitation, any direct, indirect, special, punitive, consequential or pure economic loss or damages, or any loss of income, profits, goodwill, data, contracts, use of money, or business interruption, and whether in delict, tort (including without limitation negligence), contract, breach of statutory duty, misrepresentation (whether innocent or negligent) or otherwise under any claim of any nature whatsoever in any jurisdiction) in any way arising from or connected with this report and the use, inability to use or the results of use of this report, and any reliance on this report
The analysis of the security is purely based on the smart contracts alone. No applications or operations were reviewed for security. No product code has been reviewed.

Background

HeckSafe was commissioned by ASYAGRO to perform an audit of smart contracts:

The purpose of the audit was to achieve the following:

The information in this report should be used to understand the risk exposure of the smart contract, and as a guide to improve the security posture of the smart contract by remediating the issues that were identified.

Contracts Details

Token contract details for 08.04.2022

Contract name
: ASYAGRO
Total supply
: 7,500,000,000 (Max)
Token ticker
: ASY
Decimals
: 18
Network
: Binance Smart Chain
Transactions count
: 203
Token Holders
: 159 addresses
Contract deployer address
:  0x8A9A638F389B22469D99CE156680822f53D77275

ASYAGRO Token Distribution

asyagro 1

ASYAGRO Top 10 Token Holders

asyagro 2

Contract functions details

+ [Int] IERC20

+ Context

+ [Lib] SafeMath

+Ownable(Context)

+ASYAGRO (Context, IERC20, Ownable)

($) = payable function

# = non-constant function

Issues Checking Status

No
Title
Status
1.
Unlocked Compiler Version
Passed
2.
Missing Input Validation
Passed
3.
Race conditions and Reentrancy. Cross-function race conditions.
Passed
4.
Possible delays in data delivery
Passed
5.
Oracle calls.
Passed
6.
Timestamp dependence.
Passed
7.
Integer Overflow and Underflow
Passed
8.
DoS with Revert.
Passed
9.
DoS with block gas limit.
Passed
10.
Methods execution permissions.
Critical, High
11.
Economy model of the contract
Passed
12.
Private use data leaks.
Passed
13.
Malicious Event log
Passed
14.
Scoping and Declarations.
Medium issue
15.
Uninitialized storage pointers.
Passed
16.
Arithmetic accuracy.
Passed
17.
Design Logic.
Passed
18.
Safe Open Zeppelin contracts implementation and usage.
Passed
19.
Incorrect Naming State Variable
Passed

Severity Definitions

Risk Level
Description
Critical
Critical vulnerabilities are usually straightforward to exploit and can lead to assets loss or data manipulations.
High
High-level vulnerabilities are difficult to exploit; however, they also have a significant impact on smart contract execution, e.g., public access to crucial functions
Medium
Medium-level vulnerabilities are important to fix; however, they can't lead to assets loss or data manipulations.
Low
Low-level vulnerabilities are mostly related to outdated, unused, etc. code snippets that can't have a significant impact on execution.

Security Issues

Critical Severity Issues

Four critical severity issue found.

1. Methods execution permissions.

Owners can mint tokens.
According to the tokenomics maximum total supply is 7,500,000,000 ASY, but owners can mint more tokens using the mint function.
Mint function
We advise to remove the ability to mint more than stated in tokenomics.
Owners can lock all tokens of any user anytime.
Lock functionality should be limited by clear contract rules. Owners should not be able to block user tokens at their discretion.
Lock function
We advise to change lock functionality.
Owners can change the lock time after the lock is created.
The ability to change the lock time of an already created lock can lead to various manipulations.
extendLockTime, reduceLockTime functions.
We advise to remove the ability to change the lock time after the lock is created.
Owners can unlock tokens anytime.
he ability to unlock tokens for any account at any time can lead to various manipulations.
unlockToken, releaseLock functions
We advise to remove the ability to unlock tokens before the end of the lock period.
High Severity Issues

One high severity issue found

1. Methods execution permissions.

Highly permissive owner access
Owners can add the user’s address to the ‘frozen’ list. All ASY token transfers from such addresses will be reverted. This can lead to various manipulations and even loss of funds by users.
freezeAccount function
We advise to remove the possibility to block the user’s funds.
Medium Severity Issues

One Medium severity issue found.

1. Scoping and Declarations.

Unused function.
The freezeAccount function does nothing.
freezeAccount function
We advise to remove unused code.
Low Severity Issues

One low severity issue found

Owner Privileges

Owner Privileges (in the period when the owner is not renounced) :

Conclusion

Smart contract contains low severity issues!

HackSafe note: Please check the disclaimer above and note, the audit makes no statements or warranties on business model, investment attractiveness or code sustainability. The report is provided for the only contract mentioned in the report and does not include any other potential contracts deployed by Owner.

Send your project now

Fill the details to be connected with our experts.

Send your project now

Fill the details to be connected with our experts.