HashKode Logo
Back to Audits

WolfieStrategy (WOLFSTR) Audit

Complete security evaluation and code review of WolfieStrategy (WOLFSTR) token smart contract

Project Overview

WolfieStrategy (WOLFSTR) is an advanced CRC-20 token with sophisticated fee system, anti-MEV protection, automatic token burning mechanisms, and multi-DEX support for cross-token deflationary effects.

October 6, 2025

Audit Status

Passed with Advisory

Code is functionally safe but owner has extra privileged rights.

Contract Details

Type:CRC-20
Blockchain:Cronos
Project Website:lionstrategy.fun
WOLFSTR Logo

Key Findings

Critical
0
High
0
Med/Low
5
Security Score4/5
Single Point of Failure
M-01

All administrative operations rely on single EOA with no backup mechanisms.

Medium
Centralized Fee Control
M-03

Owner can set combined fees up to 95% through setTaxPercentage function.

Medium
Total: 3 Medium + 2 Low Risk Issues

Audit Scope

The security assessment focused on identifying vulnerabilities, centralization risks, and economic manipulation vectors in the smart contract:

  • Owner privilege escalation and abuse potential
  • Fee mechanism exploitation vectors
  • Anti-MEV bypass vulnerabilities
  • Treasury and fund security analysis
  • Market manipulation capabilities
  • Reentrancy and flash loan protection
  • Economic attack surface evaluation
  • Centralization and single point of failure assessment

Audit Findings

No Critical IssuesNo critical security vulnerabilities found
No High Risk IssuesNo high-risk vulnerabilities identified
3 Medium Risk IssuesCentralization considerations and access control
2 Low Risk IssuesAdministrative controls and external dependencies

The contract is functionally safe with moderate centralization considerations that should be noted by users but do not prevent safe operation.

Detailed Findings

M

Medium Risk Findings

M-01: Single Point of Failure

All administrative operations rely on single EOA owner with no multi-sig or timelock protection. Loss of private key or compromise creates total system failure.

Impact: Complete administrative lockout or unauthorized control if key is compromised.

M-02: Centralized Exclusion Control

Owner controls fee exclusion list, enabling preferential treatment for specific addresses while others pay standard fees.

Impact: Unfair fee treatment and potential competitive advantages for excluded addresses.

M-03: Centralized Fee Control

Owner can set combined fees up to 95% through setTaxPercentage() function, enabling significant value extraction from transactions while remaining within contract limits.

Impact: Potential for high fee burden on users, up to 95% of transaction value in extreme cases.

L

Low Risk Findings

L-01: Market Designation Control

Owner can designate any address as a "market" through setMarket() function, which determines fee application on transfers involving that address.

Impact: Administrative control over fee application scope, generally used for legitimate DEX pair management.

L-02: Multiple External Contract Dependencies

Contract interacts with multiple external protocols including VVS Finance Router, Obsidian Finance Router, Ebisusbay Ryoshi Router, and LIONSTR token contract for swapping and burning operations.

Impact: Dependency on external contract availability and potential changes to third-party protocols could affect functionality.

Recommendations & Conclusion

Overall Risk Level: MEDIUM

Positive Aspects:
  • No reentrancy vulnerabilities in swap functions
  • Proper error handling with custom errors
  • Standard CRC-20 interface compliance
  • No mint backdoors or supply manipulation
  • Reasonable anti-MEV mechanism implementation
  • No critical arithmetic vulnerabilities
  • Secure fee collection and distribution mechanisms
Areas for Consideration:
  • Single point of administrative control
  • Centralized fee exclusion management
  • Market designation administrative privileges
Recommended Enhancements:
  • Consider implementing multi-sig for administrative functions
  • Add timelock delays for sensitive parameter changes
  • Publish transparent governance processes
  • Consider community governance for major decisions
  • Implement emergency pause mechanisms with community override
⚠️ Centralization Notice

While the contract is functionally secure, it operates with centralized administrative control. Users should be aware of the trust assumptions and consider the project team's track record and governance approach when making investment decisions.

The HashKode security team has determined that the WolfieStrategy contract implements solid security practices with reasonable risk management. The centralized aspects are common for many projects and are properly implemented with appropriate access controls. The contract is suitable for deployment with normal due diligence considerations.

Final Security Score

(4/5) Good