Hot: rug-pullAll contenthive-129948hive-196917krhive-180932zzansteemhive-150122hive-183959photographyhive-185836hive-166405hive-144064hive-183397uncommonlabhive-101145hive-188619hive-184714hive-103599hive-193637hive-139150hive-106183photohive-145157hive-109690hive-150943TrendingNewHotLikerscrypto4udit (33)in scam • 12 hours agoIdentifying crypto scams through Static Analysis - Part 8Fee The owner can increase the transfer fees to a very large amount or even set it to 100%, as a result, when users want to transfer their tokens, they lose them. function setFee(uint256…crypto4udit (33)in scam • yesterdayIdentifying crypto scams through Static Analysis - Part 7Allowance The owner or developer of the project may provide the ability to transfer assets from any user without having an allowance by providing an access in the code. For…crypto4udit (33)in scam • 3 days agoIdentifying crypto scams through Static Analysis - Part 6Burn Owner or developer from the project team can burn tokens from Anyone’s EOA by providing an access. It can do this in the way that after the users bought token, Owner burns all…crypto4udit (33)in scam • 4 days agoIdentifying crypto scams through Static Analysis - Part 5Renouncing Renouncing a smart contract means that the contract’s creator(owner) will no longer have control over it. In fact, the owner of the contract usually transfers his ownership…crypto4udit (33)in scam • 5 days agoIdentifying crypto scams through Static Analysis - Part 4Hidden minting One of the methods of malicious minting, hidden minting that can be implemented in different ways. A model occurs without updating the total supply . Another way is to occur…crypto4udit (33)in scam • 6 days agoIdentifying crypto scams through Static Analysis - Part 3Mint Infinite Mint Attack is one of the attacks that threaten Mintable Tokens. One of the methods of malicious minting, creating a privileged mint function without any limitations on the…