How to Identify Contract Issues

Pi Xun contract

1. For example, when you are not sure whether a token is a Piyun disk, you can use honeypot to do a simple verification.

If Appears: Yup, honeypot. Run the fuck away

ETH contract check: https://honeypot.is/ethereum.html

BSC contract check: https://honeypot.is/index.html

Of course, the honeypot is only a basic inspection of the ERC contract code, and manual inspection is still required for the packaging code. For details, you can read this article. Generally speaking, there are many kinds of contract attacks on Pixiu Disk, which are very complicated for Xiaobai. https://freebuf.com/articles/blockchain-articles/175915.html icon-default.png?t=M4ADhttps://t.co/C43JM7XbPB

2. Of course, we can also see whether these contracts have been audited by the security company, which is why I strongly recommended $people to do a security audit at the beginning   . Now people have issued an audit report, and I am very happy. Some tokens can be viewed in the audit report on coinmarketcap, and some need to check the audit company’s official website audit query:  https://slowmist.com/en/service-smart-contract-security-audit.html

3. Token chip distribution For simple cases, the chips have not been broken up, you can directly check the block browser and click holder to view. If a project, the official holds more than 99% of the chips, the address is not over-signed, and the identity information of the project party is not transparent, then you need to be careful. ETH browser: https://etherscan.io  BSC browser: https://bscscan.com

4. Token chip distribution For simple cases, the chips have not been broken up, you can directly check the block browser and click holder to view. If a project, the official holds more than 99% of the chips, the address is not over-signed, and the identity information of the project party is not transparent, then you need to be careful.

ETH Browser: https://etherscan.io

BSC Browser: https://bscscan.

 

5. Dangerous signatures This type of signature is mainly to call the transfer authority of your other tokens, and forcibly transfer the tokens from your wallet. After signing, you can see these parameter calls. 

Most of these attack methods appear in fake airdrops, phishing attacks and crimes committed by acquaintances. When you see approve when you sign, you must be more careful. Generally, these operations are performed by the certified contract address on uni. As long as the signature sees approve, cancel it first. Look online to see if there is any similar experience of being cheated, and whether the approved address is credible.

 

6. Fake private key leaked I can’t find a picture here, probably the liar sent a bunch of private keys, telling you that there are some uni tokens in this address, which are given away for free, and whoever gets them will get them. You import the private key and see that there are indeed some valuable Tokens, but there is no ETH in the wallet, so you try to send some ETH to this address as a handling fee. As a result, the address was immediately transferred by the scammer as soon as it received ETH. 

Guess you like

Origin blog.csdn.net/xiaozhupeiqi321/article/details/125047412