Security Score
AA
0
100
Rank
#45
Top 5%
Top Score
Morpheus.Network Info
Morpheus.Network enhances supply chain efficiency by utilizing its SaaS middleware platform to seamlessly integrate traditional and modern technologies. Through this platform, supply chain managers gain a Digital Footprint, enabling them to automate and ensure the safety and security of their supply chains while also saving time and money by providing shipment and item visibility.
Audits
2 Available
Onboarded date
Links
How do you feel about this project's security?
Category Score
91.54
Percentile
Top5%
Poor
Excellent
Code Audit History
8
All Findings
4
Acknowledged
0
Partially
4
Resolved
0
Critical
0
Major
1
Medium

1 Resolved

3
Minor

3 Acknowledged

4
Informational

1 Acknowledged, 3 Resolved

Category Score
83.33
Percentile
Top5%
Poor
Excellent
CertiK KYC
Not Verified
3rd Party KYC
Not Verified
Vote for CertiK KYC!
-0123456789
-0123456789
-0123456789
Voted Yes!
logo indicator
Discount
  1. 10%
  2. 30%
  3. 50%
  4. Free!
Category Score
91.72
Percentile
Top10%
Poor
Excellent
Category Score
97.13
Percentile
Top5%
Poor
Excellent
Token Age
1 yr10 mos
Owner Address--
Creator Address
Verification Logo0xc621..e7c4

Contract Uncertainty

4 Passed
1 Attention
Open Source
Yes
Proxy Contract
No
External Call Risk
No
Mint Function
Yes
Self Destruct
No

Owner Privilege

4 Passed
2 Attention
Retrieve Ownership
No
Balance Modifiable
No
Hidden Owner
Yes
Creator Percentage
0.00%
Ownership Renounce
No
Owner Percentage
0.00%

Trading Constraint

5 Passed
3 Attention
Honeypot
No
Buy Tax
0.00%
Sell Tax
0.00%
Modifiable Tax
No
Transfer Pausable
Yes
Anti Whale
No
Modifiable Anti Whale
No
Blacklist
Yes
Partnered withgo-plus logoGoPlus
Category Score
89.26
Percentile
Top20%
Poor
Excellent
Twitter Monitoring
@MNWSupplyChain
Twitter Active Indicator
MediumModerately
Active
Twitter Followers (24h)
39,761+1
Follower Growth
Twitter Account Age
5 yr5 mos
1 Tweets Yesterday
Daily Mention (24h)
16-4
Category Score
92.96
Percentile
Top5%
Poor
Excellent
Disclaimer:
CertiK conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.