Audit Scan of DEXTscore

Yaser Rahmati | یاسر رحمتی

Understanding DEXTools Audit KPIs with Examples

The KPIs listed below are critical for assessing a token’s trustworthiness. Let’s break them down with detailed explanations and examples.


1. Contract Verified

  • Definition: Indicates whether the smart contract is verified on the blockchain (e.g., Etherscan, BscScan).

  • Why Important: A verified contract is publicly available for review, ensuring transparency.

Example:

  • Verified: Token A’s contract is publicly accessible, allowing anyone to inspect its code for vulnerabilities.

  • Unverified: Token B’s contract is not accessible, hiding potential malicious features.

Risk: Unverified contracts often hide backdoors or harmful code.


2. Honeypot

  • Definition: Indicates whether a token is a honeypot (allows buying but restricts selling).

  • Why Important: Honeypots trap investors by blocking their ability to sell.

Example:

  • Honeypot Detected: Token C allows you to buy but prevents selling, locking funds.

  • No Honeypot: Token D allows free trading.

Risk: Honeypots are scams that steal user funds.


3. Buy Tax

  • Definition: The percentage fee charged when purchasing the token.

  • Why Important: High buy taxes can reduce the token’s trading appeal.

Example:

  • Token E: 2% buy tax (reasonable for project development).

  • Token F: 50% buy tax (excessive, likely a scam).

Risk: Excessively high buy taxes are red flags.


4. Sell Tax

  • Definition: The percentage fee charged when selling the token.

  • Why Important: High sell taxes can trap investors, discouraging selling.

Example:

  • Token G: 3% sell tax (used for ecosystem growth).

  • Token H: 80% sell tax (exploitative and scam-like).

Risk: High sell taxes can indicate a scam or unsustainable tokenomics.


5. Proxy Contract

  • Definition: Indicates whether the token uses a proxy contract that can be upgraded or modified by the developer.

  • Why Important: Proxy contracts can be legitimate but also enable rug-pulls if misused.

Example:

  • Token I: Uses a proxy contract to allow feature upgrades.

  • Token J: Uses a proxy contract to add malicious code after launch.

Risk: Proxy contracts are risky if controlled by untrustworthy developers.


6. Mintable

  • Definition: Indicates whether new tokens can be minted after deployment.

  • Why Important: Mintable tokens can lead to supply inflation, devaluing the token.

Example:

  • Token K: Minting is disabled, ensuring fixed supply.

  • Token L: Minting is enabled, allowing the team to create unlimited tokens.

Risk: Enabled minting without oversight is a significant red flag.


7. Tax Modifiable

  • Definition: Indicates whether the buy/sell taxes can be modified after deployment.

  • Why Important: Modifiable taxes can be exploited to introduce predatory fees.

Example:

  • Token M: Fixed taxes at 5%.

  • Token N: Taxes are modifiable and suddenly increased to 90%.

Risk: Modifiable taxes enable sudden, exploitative changes.


8. Transfer Pausable

  • Definition: Indicates whether token transfers can be paused by the contract owner.

  • Why Important: Pausing transfers can be used maliciously to freeze user funds.

Example:

  • Token O: Transfers cannot be paused, ensuring smooth trading.

  • Token P: Transfers were paused by the team, locking all funds.

Risk: Transfer pausing is a tool for scams if used unethically.


9. Blacklisted

  • Definition: Indicates whether specific wallets can be blacklisted from transferring tokens.

  • Why Important: Blacklisting can prevent certain users from selling their tokens.

Example:

  • Token Q: No blacklisting enabled.

  • Token R: Blacklisted wallets found, raising trust issues.

Risk: Blacklisting is a potential tool for unfair practices.


10. Scam Risk

  • Definition: Overall assessment of whether the token exhibits characteristics of a scam.

  • Why Important: Combines multiple KPIs into a single score or flag for user awareness.

Example:

  • Token S: Low scam risk with no honeypot, fixed taxes, and verified contract.

  • Token T: High scam risk with honeypot behavior, proxy contract misuse, and excessive taxes.

Risk: High scam risk suggests avoiding the token entirely.


How to Use These KPIs Practically

  1. Step 1: Use DEXTools or other audit platforms to scan the token.

  2. Step 2: Examine each KPI carefully.

  3. Step 3: Cross-check results using blockchain explorers (e.g., Etherscan) and community forums.

  4. Step 4: Avoid tokens with multiple red flags, especially honeypots, modifiable taxes, and high scam risk.

Visit me on:

Last updated