0
Critical Findings
0
High Findings
0
Medium Findings
8
Low (expected patterns)
20
Informational

Analysis Tools Used

ToolProviderTypeResult
Slither v0.11.5Trail of BitsStatic Analysis0 Critical / 0 High / 0 Medium
Solhint v4.xCommunityLinting0 Errors
GoPlus APIGoPlus LabsToken SecurityAll Checks Passed

GoPlus Token Security

Comprehensive on-chain token security scan

CheckResultStatus
Is HoneypotNo✓ Pass
Is ProxyNo✓ Pass
Is MintableNo✓ Pass
Open SourceYes✓ Pass
Can Take Back OwnershipNo✓ Pass
Hidden OwnerNo✓ Pass
Self DestructNo✓ Pass
External CallNo✓ Pass
Blacklist FunctionNo✓ Pass
Whitelist FunctionNo✓ Pass
Anti-WhaleNo✓ Pass
Slippage ModifiableNo✓ Pass
Buy Tax0%✓ Pass
Sell Tax0%✓ Pass

Verified by GoPlus →

OpenZeppelin Dependencies

All contracts inherit from audited OpenZeppelin v5.x libraries

DextonToken

ERC20 ERC20Burnable ERC20Pausable Ownable

BountyEscrow

AccessControl ReentrancyGuard Pausable SafeERC20

TokenSale

Ownable ReentrancyGuard Pausable SafeERC20

ERC-20 Compliance

Fully compliant with EIP-20 with no non-standard behaviors

  • Standard transfer/approve/transferFrom — All standard ERC-20 methods implemented correctly.
  • No fee-on-transfer — Transferring DXTN incurs no token-level fee (only network gas).
  • No rebasing — Token supply is fixed. Balances do not change automatically.
  • No blacklist on transfers — No address can be blocked from sending or receiving DXTN.
  • Standard 18 decimals — Uses the standard 18-decimal precision.
  • Fixed supply (no minting) — The total supply of 1,000,000,000 DXTN was minted at deployment. No new tokens can ever be created.

Verified Contracts

All source code verified and readable on Basescan

DextonToken Verified

0x824c...b0fe
View on Basescan

BountyEscrow Verified

0x350d...7f80
View on Basescan

TokenSale Verified

0x8a79...B43e
View on Basescan

Report a Vulnerability

We take security seriously. If you discover a security vulnerability in any of our smart contracts or platform infrastructure, please report it responsibly.

Email: dex@dexton.ai

  • Include a detailed description, steps to reproduce, and potential impact.
  • We will acknowledge receipt within 48 hours.
  • Do not publicly disclose the vulnerability until we have addressed it.
  • We will credit researchers who report valid vulnerabilities (with permission).
← Whitepaper Contracts →