0 Critical Risks
Overall critical risk count for the entire project
1 Potential Risk
Overall potential risk count for the entire project
Active Followers
Twitter follower audit coming soon ™
Active Members
Discord member audit coming soon ™
Active Members
Telegram member audit coming soon ™️
Not what you're looking for? View similar projects
User Reviews
Write a Review

This project has no reviews yet, be the first?
0 Smart Contracts
Contract: 0x813c315a72192805f99fd90d8d65b3ec3a83ac02
Address: 0x813c315a72192805f99fd90d8d65b3ec3a83ac02
Name: Satoshi Pickle Spears
Symbol:
Chain: Ethereum
Token Standard: ERC-721
Verification status unknown
If an NFT is verified it has been certified by mainstream NFT platforms and its authenticity is guaranteed
Owner cannot bypass the mint supply limit
Refers to the existence of a special mint function in the NFT contract allowing the owner to bypass the maximum amount of minting specified in the contract, and continue to mint NFTs beyond this limit
Owner cannot restrict trading of NFTs
The contract may have the ability to pause trading of NFTs in this contract, meaning that no NFTs can be traded on Decentralized Exchanges.
Owner cannot transfer NFTs without approval
Some contracts may contain a function that allows them to directly transfer NFTs without the consent of the owner. In some cases this function is not used in a malicious way, for example in presale, it can be used to transfer the placeholder NFT to a burn address and replace it with a real one
Owner cannot burn NFTs
Some contracts may contain a function which allows them to directly destroy NFTs without the consent of the owner. However, this function might be intended for presale mechanisms, whereby a placeholder NFT is burned, in order to be replaced by the real one in a collection
Not a suspected malicious contract
Malicious Contracts are contracts that have been found to be involved in malicious activities such as scams, rug pulls and other dishonest behaviors.
Contract cannot self destruct
Some contracts may have the ability for the owner of the contract to destroy the contract, making all NFTs in the contract inaccessible.
Not a proxy contract
If a contract is a proxy, it is able to deploy new versions of the underlying NFT contract; most commonly in order to fix security vulnerabilities. This is a common practice in the NFT space and is not necessarily malicious. However, it is important to be aware of this as it can potentially be used to hide malicious code.
Code is Open source
If the contracts code is not open source, we cannot check the contract code for any security vulnerabilities, therefore interacting with it poses a much greater risk if the project is not verified. NOTE: there may be valid reasons for not open sourcing the code, such as hiding sensitive data or protecting intellectual property