-
Notifications
You must be signed in to change notification settings - Fork 1.3k
NHlogo.png #939
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
NHlogo.png #939
Conversation
NH Token core features are a minable SHA 256 algorithm, just like BITCOIN, Trade, Stake, and Ecommerce payment purposes. The public response comes up with my expected Utilities, then we will develop real real-world payment system Application for NH token usage in Switzerland first.
Nishantthakkeer
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added svg logo file for token logo hosting
New self hosted runner
Logo Description: This is the official logo image for the NH Token Security Manager Contract (0xf930cf4150f7cb1108b30df610f07188fd794398) deployed on Polygon Mainnet. The logo represents trust, security, and transparency. The NH Security Manager Contract provides advanced features: - Anti-Money Laundering (AML) protection - Timelock functionality (24-hour delay for sensitive operations) - Anti-bot measures - Sell rate limits and withdrawal rate restrictions - Fully verified source code on PolygonScan - Decentralized contract ownership options This PNG file serves as the visual identity for integrations, such as Uniswap token lists, explorer interfaces, and UI applications that display the NH Token contract info.
The NH Token Security Manager Contract (NHSEC) is a highly secure and fully verified smart contract deployed on Polygon Mainnet (Chain ID: 137) at address 0xf930cf4150f7cb1108b30df610f07188fd794398. This contract is designed to provide advanced security and compliance features for NH Token holders and the decentralized ecosystem, including: - ✅ Anti-Money Laundering (AML) Protection: Prevents suspicious or illegal transactions by enforcing predefined rules and monitoring large or abnormal transfers. - ✅ 24-Hour Timelock: Critical sensitive operations (like ownership transfer, large withdrawals, configuration changes) are delayed by 24 hours, providing time for audits and intervention in case of mistakes or attacks. - ✅ Anti-Bot Protection: Restricts automated bots from abusing the contract for unfair gain, ensuring fair participation for all users. - ✅ Withdrawal & Sell Rate Limits: Limits the maximum withdrawal or sell rate per time unit to prevent large dumps and price manipulation. - ✅ Verified Source Code: The contract source code is fully verified on PolygonScan and open to public audit for transparency and trust. - ✅ MIT Licensed: Provides freedom for reuse, integration, and modification in other decentralized applications. 🔗 Polygonscan Link: https://polygonscan.com/address/0xf930cf4150f7cb1108b30df610f07188fd794398#code 🎯 Purpose: Secure the NH Token ecosystem, enhance investor confidence, prevent abuse, and align with DeFi best practices. This metadata allows wallets, explorers, and DEXs to display full token details, promoting adoption and trust.
Logo Description: This is the official logo image for the NH Token Security Manager Contract (0xf930cf4150f7cb1108b30df610f07188fd794398) deployed on Polygon Mainnet. The logo represents trust, security, and transparency. The NH Security Manager Contract provides advanced features: - Anti-Money Laundering (AML) protection - Timelock functionality (24-hour delay for sensitive operations) - Anti-bot measures - Sell rate limits and withdrawal rate restrictions - Fully verified source code on PolygonScan - Decentralized contract ownership options This PNG file serves as the visual identity for integrations, such as Uniswap token lists, explorer interfaces, and UI applications that display the NH Token contract info.
NH token polygon Defi score -42%, https://scan-results.de.fi/137@0xf930cf4150f7cb1108b30df610f07188fd794398_express_audit.pdf
Add LIFE Token details
This workflow automates the deployment of static content to GitHub Pages on push to the main branch or manually via the Actions tab.
yarn.lock
Outdated
|
|
||
| strip-bom@^3.0.0: | ||
| version "3.0.0" | ||
| re |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
High severity vulnerability introduced by a package you're using:
Line 9607 lists a dependency (terser) with a known High severity vulnerability. Fixing requires upgrading or replacing the dependency.
ℹ️ Why this matters
terser versions before 4.8.1, >= 5.0.0 before 5.14.2 are vulnerable to Inefficient Regular Expression Complexity.
To resolve this comment:
Upgrade this dependency to at least version 4.8.1 at yarn.lock.
💬 Ignore this finding
To ignore this, reply with:
/fp <comment>for false positive/ar <comment>for acceptable risk/other <comment>for all other reasons
You can view more details on this finding in the Semgrep AppSec Platform here.
yarn.lock
Outdated
|
|
||
| strip-bom@^3.0.0: | ||
| version "3.0.0" | ||
| re |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
High severity vulnerability may affect your project—review required:
Line 8622 lists a dependency (rollup) with a known High severity vulnerability.
ℹ️ Why this matters
Affected versions of rollup are vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
To resolve this comment:
Check if you use Rollup to bundle JavaScript with import.meta.url and the output format is set to cjs, umd, or iife formats, while allowing users to inject scriptless HTML elements with unsanitized name attributes.
- If you're affected, upgrade this dependency to at least version 2.79.2 at yarn.lock.
- If you're not affected, comment
/fp we don't use this [condition]
💬 Ignore this finding
To ignore this, reply with:
/fp <comment>for false positive/ar <comment>for acceptable risk/other <comment>for all other reasons
You can view more details on this finding in the Semgrep AppSec Platform here.
|
Semgrep found 8
Risk: Affected versions of @babel/traverse, babel-traverse, @babel/plugin-transform-runtime, @babel/preset-env, @babel/helper-define-polyfill-provider, babel-plugin-polyfill-corejs2, babel-plugin-polyfill-corejs3, babel-plugin-polyfill-es-shims, and babel-plugin-polyfill-regenerator are vulnerable to Incomplete List Of Disallowed Inputs. An attacker can exploit a vulnerability in the internal Babel methods Manual Review Advice: A vulnerability from this advisory is reachable if you use Babel to compile untrusted JavaScript Fix: Upgrade this library to at least version 0.5.3 at token-lists/yarn.lock:2592. Reference(s): GHSA-67hx-6x53-jw92, CVE-2023-45133 |
No description provided.