https://etherscan.io/address/0x160C404B2b49CBC3240055CEaEE026df1e8497A0#code
Reentrancy ๐ข
No severity issues were found.
Ownership Takeover ๐ข
No severity issues were found.
Timestamp Dependence ๐ก
Although there is a signature validation on the mintDutchAuction function, the timestamp of the block can be manipulated by the miner to exploit the vulnerability.
Line: # 121 - 178
function mintDutchAuction(uint8 quantity, bytes calldata signature) public payable callerIsUser { . . require( block.timestamp >= DA_STARTING_TIMESTAMP, "DA has not started!" );Dos with (Unexpected) Revert ๐ข
No severity issues were found.
Contract Interaction ๐ข
No severity issues
mintWL, mintDutchAuction, teamMint and withdrawFunds should be external functions because they are only called externally.
transfer() in withdrawFunds function should be avoided.
Overall the contract should be good and there are no critical severity issues were found.
