Skip to content

Conversation

@Nishantthakkeer
Copy link

No description provided.

NH Token core features are a minable SHA 256 algorithm, just like BITCOIN, Trade, Stake, and Ecommerce payment purposes. The public response comes up with my expected Utilities, then we will develop real real-world payment system Application for NH token usage in Switzerland first.
Copy link
Author

@Nishantthakkeer Nishantthakkeer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added svg logo file for token logo hosting

Nishantthakkeer and others added 6 commits July 26, 2025 17:32
New self hosted runner
Logo Description:
This is the official logo image for the NH Token Security Manager Contract (0xf930cf4150f7cb1108b30df610f07188fd794398) deployed on Polygon Mainnet. The logo represents trust, security, and transparency.

The NH Security Manager Contract provides advanced features:
- Anti-Money Laundering (AML) protection
- Timelock functionality (24-hour delay for sensitive operations)
- Anti-bot measures
- Sell rate limits and withdrawal rate restrictions
- Fully verified source code on PolygonScan
- Decentralized contract ownership options

This PNG file serves as the visual identity for integrations, such as Uniswap token lists, explorer interfaces, and UI applications that display the NH Token contract info.
The NH Token Security Manager Contract (NHSEC) is a highly secure and fully verified smart contract deployed on Polygon Mainnet (Chain ID: 137) at address 0xf930cf4150f7cb1108b30df610f07188fd794398.

This contract is designed to provide advanced security and compliance features for NH Token holders and the decentralized ecosystem, including:

- ✅ Anti-Money Laundering (AML) Protection: Prevents suspicious or illegal transactions by enforcing predefined rules and monitoring large or abnormal transfers.
  
- ✅ 24-Hour Timelock: Critical sensitive operations (like ownership transfer, large withdrawals, configuration changes) are delayed by 24 hours, providing time for audits and intervention in case of mistakes or attacks.

- ✅ Anti-Bot Protection: Restricts automated bots from abusing the contract for unfair gain, ensuring fair participation for all users.

- ✅ Withdrawal & Sell Rate Limits: Limits the maximum withdrawal or sell rate per time unit to prevent large dumps and price manipulation.

- ✅ Verified Source Code: The contract source code is fully verified on PolygonScan and open to public audit for transparency and trust.

- ✅ MIT Licensed: Provides freedom for reuse, integration, and modification in other decentralized applications.

🔗 Polygonscan Link:  
https://polygonscan.com/address/0xf930cf4150f7cb1108b30df610f07188fd794398#code

🎯 Purpose:  
Secure the NH Token ecosystem, enhance investor confidence, prevent abuse, and align with DeFi best practices.

This metadata allows wallets, explorers, and DEXs to display full token details, promoting adoption and trust.
Logo Description:
This is the official logo image for the NH Token Security Manager Contract (0xf930cf4150f7cb1108b30df610f07188fd794398) deployed on Polygon Mainnet. The logo represents trust, security, and transparency.

The NH Security Manager Contract provides advanced features:
- Anti-Money Laundering (AML) protection
- Timelock functionality (24-hour delay for sensitive operations)
- Anti-bot measures
- Sell rate limits and withdrawal rate restrictions
- Fully verified source code on PolygonScan
- Decentralized contract ownership options

This PNG file serves as the visual identity for integrations, such as Uniswap token lists, explorer interfaces, and UI applications that display the NH Token contract info.
RobloxHero pushed a commit to Golden-Armor-Studios/token-lists that referenced this pull request Nov 19, 2025
This workflow automates the deployment of static content to GitHub Pages on push to the main branch or manually via the Actions tab.
yarn.lock Outdated

strip-bom@^3.0.0:
version "3.0.0"
re

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High severity vulnerability introduced by a package you're using:
Line 9607 lists a dependency (terser) with a known High severity vulnerability. Fixing requires upgrading or replacing the dependency.

ℹ️ Why this matters

terser versions before 4.8.1, >= 5.0.0 before 5.14.2 are vulnerable to Inefficient Regular Expression Complexity.

References: GHSA, CVE

To resolve this comment:
Upgrade this dependency to at least version 4.8.1 at yarn.lock.

💬 Ignore this finding

To ignore this, reply with:

  • /fp <comment> for false positive
  • /ar <comment> for acceptable risk
  • /other <comment> for all other reasons

You can view more details on this finding in the Semgrep AppSec Platform here.

yarn.lock Outdated

strip-bom@^3.0.0:
version "3.0.0"
re

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High severity vulnerability may affect your project—review required:
Line 8622 lists a dependency (rollup) with a known High severity vulnerability.

ℹ️ Why this matters

Affected versions of rollup are vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').

References: GHSA, CVE

To resolve this comment:
Check if you use Rollup to bundle JavaScript with import.meta.url and the output format is set to cjs, umd, or iife formats, while allowing users to inject scriptless HTML elements with unsanitized name attributes.

  • If you're affected, upgrade this dependency to at least version 2.79.2 at yarn.lock.
  • If you're not affected, comment /fp we don't use this [condition]
💬 Ignore this finding

To ignore this, reply with:

  • /fp <comment> for false positive
  • /ar <comment> for acceptable risk
  • /other <comment> for all other reasons

You can view more details on this finding in the Semgrep AppSec Platform here.

@semgrep-code-uniswap
Copy link

Semgrep found 8 ssc-aff5e8de-c638-4356-8a93-120597e35ce9 findings:

Risk: Affected versions of @babel/traverse, babel-traverse, @babel/plugin-transform-runtime, @babel/preset-env, @babel/helper-define-polyfill-provider, babel-plugin-polyfill-corejs2, babel-plugin-polyfill-corejs3, babel-plugin-polyfill-es-shims, and babel-plugin-polyfill-regenerator are vulnerable to Incomplete List Of Disallowed Inputs. An attacker can exploit a vulnerability in the internal Babel methods path.evaluate() or path.evaluateTruthy() by compiling specially crafted code, potentially resulting in arbitrary code execution during compilation. babel-traverse does not have a fix version. If you are using babel-traverse, switch to @babel/traverse.

Manual Review Advice: A vulnerability from this advisory is reachable if you use Babel to compile untrusted JavaScript

Fix: Upgrade this library to at least version 0.5.3 at token-lists/yarn.lock:2592.

Reference(s): GHSA-67hx-6x53-jw92, CVE-2023-45133

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants