Audit Scan of DEXTscore
Yaser Rahmati | یاسر رحمتی
Understanding DEXTools Audit KPIs with Examples
The KPIs listed below are critical for assessing a token’s trustworthiness. Let’s break them down with detailed explanations and examples.
1. Contract Verified
Definition: Indicates whether the smart contract is verified on the blockchain (e.g., Etherscan, BscScan).
Why Important: A verified contract is publicly available for review, ensuring transparency.
Example:
Verified: Token A’s contract is publicly accessible, allowing anyone to inspect its code for vulnerabilities.
Unverified: Token B’s contract is not accessible, hiding potential malicious features.
Risk: Unverified contracts often hide backdoors or harmful code.
2. Honeypot
Definition: Indicates whether a token is a honeypot (allows buying but restricts selling).
Why Important: Honeypots trap investors by blocking their ability to sell.
Example:
Honeypot Detected: Token C allows you to buy but prevents selling, locking funds.
No Honeypot: Token D allows free trading.
Risk: Honeypots are scams that steal user funds.
3. Buy Tax
Definition: The percentage fee charged when purchasing the token.
Why Important: High buy taxes can reduce the token’s trading appeal.
Example:
Token E: 2% buy tax (reasonable for project development).
Token F: 50% buy tax (excessive, likely a scam).
Risk: Excessively high buy taxes are red flags.
4. Sell Tax
Definition: The percentage fee charged when selling the token.
Why Important: High sell taxes can trap investors, discouraging selling.
Example:
Token G: 3% sell tax (used for ecosystem growth).
Token H: 80% sell tax (exploitative and scam-like).
Risk: High sell taxes can indicate a scam or unsustainable tokenomics.
5. Proxy Contract
Definition: Indicates whether the token uses a proxy contract that can be upgraded or modified by the developer.
Why Important: Proxy contracts can be legitimate but also enable rug-pulls if misused.
Example:
Token I: Uses a proxy contract to allow feature upgrades.
Token J: Uses a proxy contract to add malicious code after launch.
Risk: Proxy contracts are risky if controlled by untrustworthy developers.
6. Mintable
Definition: Indicates whether new tokens can be minted after deployment.
Why Important: Mintable tokens can lead to supply inflation, devaluing the token.
Example:
Token K: Minting is disabled, ensuring fixed supply.
Token L: Minting is enabled, allowing the team to create unlimited tokens.
Risk: Enabled minting without oversight is a significant red flag.
7. Tax Modifiable
Definition: Indicates whether the buy/sell taxes can be modified after deployment.
Why Important: Modifiable taxes can be exploited to introduce predatory fees.
Example:
Token M: Fixed taxes at 5%.
Token N: Taxes are modifiable and suddenly increased to 90%.
Risk: Modifiable taxes enable sudden, exploitative changes.
8. Transfer Pausable
Definition: Indicates whether token transfers can be paused by the contract owner.
Why Important: Pausing transfers can be used maliciously to freeze user funds.
Example:
Token O: Transfers cannot be paused, ensuring smooth trading.
Token P: Transfers were paused by the team, locking all funds.
Risk: Transfer pausing is a tool for scams if used unethically.
9. Blacklisted
Definition: Indicates whether specific wallets can be blacklisted from transferring tokens.
Why Important: Blacklisting can prevent certain users from selling their tokens.
Example:
Token Q: No blacklisting enabled.
Token R: Blacklisted wallets found, raising trust issues.
Risk: Blacklisting is a potential tool for unfair practices.
10. Scam Risk
Definition: Overall assessment of whether the token exhibits characteristics of a scam.
Why Important: Combines multiple KPIs into a single score or flag for user awareness.
Example:
Token S: Low scam risk with no honeypot, fixed taxes, and verified contract.
Token T: High scam risk with honeypot behavior, proxy contract misuse, and excessive taxes.
Risk: High scam risk suggests avoiding the token entirely.
How to Use These KPIs Practically
Step 1: Use DEXTools or other audit platforms to scan the token.
Step 2: Examine each KPI carefully.
Step 3: Cross-check results using blockchain explorers (e.g., Etherscan) and community forums.
Step 4: Avoid tokens with multiple red flags, especially honeypots, modifiable taxes, and high scam risk.
Visit me on:
🔵 Official Website: https://www.yaser-rahmati.ir/
💰 Blockchain & Financial Insights: https://finance.yaser-rahmati.ir/
🛡️ Network: https://netsec.yaser-rahmati.ir/
📊 Data Science: https://ds.yaser-rahmati.ir/
Last updated