CertiK Security Score
B
0
100
Rank#154
PercentileTop 55%
7-day Ranking History
2 Highlights
0 Alerts
Ucon Social Info
more info
Ucon.social has emerged as a revolutionary force in the field of social networking, aiming to redefine the way users interact through a decentralized, secure, and rewarding platform. By utilizing blockchain technology, Ucon.Social focuses on ensuring the highest level of user information security while pioneering a profit-sharing model that empowers its community members.
Audits
1 Available
Listed Date
Contracts
Not Available
Tags
Socials
Code Audit
KYC
Bug Bounty
Go Vote!
Code Audit History
5
All Findings
3
Acknowledged
0
Partially
2
Resolved
0
Critical
1
Major

1 Acknowledged

0
Medium
4
Minor

2 Acknowledged, 2 Resolved

0
Informational
Methods
Manual Review
Static Analysis
Audited Files/SHA256
TokenLockup.sol
512...62F
Audit Timeline
Requested on 1/29/2024
Revised on 2/5/2024
Centralization Overview
Distribution
None
Upgrade
None
Privilege
1 Issue
Other
None
CertiK Formal Verification
No Properties Verified
Contracts
None applied
KYC Status
CertiK KYC
No
3rd Party KYC
No
User Votes
-0123456789
-0123456789
-0123456789
-0123456789
-0123456789
Go Vote!
Project Owner?
Project Maturity Metrics
Maturity Indicator
Low
Minimally Developed
Project Age
0 yrs1 mo
Token Launch Date
Not Available
Market Cap Not Available
Maturity Timeline
Project 1 mo
Median 32 mos
Funding History
Bug Bounty Program
CertiK Bounty
No
3rd Party Bounty
No
User Votes
-0123456789
-0123456789
-0123456789
-0123456789
-0123456789
Go Vote!
Project Owner?
Incident History
Twitter Monitoring
@Ucon_SocialFi
Twitter Activity Indicator
MediumModerately
Active
Twitter Followers (24h)
10,006+80
Twitter Account Age
0 yr1 mo
Total Tweets (24h)
103+8
Follower Growth & Daily Tweets
Vote for CertiK Services!
-0123456789
-0123456789
-0123456789
-0123456789
-0123456789
logo indicator
  1. KYC
    25%
  2. KYC
    Free
  3. Bug Bounty
    Free
  4. Contract
    25%
  5. Contract
    50%
  6. Contract
    Free
Disclaimer:
CertiK conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.