SWT
← Back to main page

Security & Audit Notes

A transparent overview of security decisions. This page is not a formal audit, but a summary of key guarantees and constraints.

Contract Properties

Network: Polygon (POL), Chain ID 137
Standard: ERC-20 single-file implementation
Address: 0x49786b20c0E076CDF82F6b07d55312dF9e265db0
Source: verified on Polygonscan.
Upgradeability: no proxy — contract is immutable.

Supply & Fee Constraints

Max supply: 1,000,000 SWT — no mint function.
No burn: no privileged token destruction.
Fee: fixed at 0.1% per transfer.
Hard cap: fee cannot be increased — only reduced (min 0.05%).
Defined in code: fully enforced on-chain.

Wallet Controls

• Owner & reserve wallets are time-locked.
• LP NFT positions (Uniswap v3 & QuickSwap) locked until 01.01.2027 — no withdrawal functionality available.
• Development, airdrop & marketing wallets have enforced transfer limits.
• Marketing wallet restricted from sending tokens directly to contracts.
• No owner function to withdraw user funds or bypass caps.
• Liquidity lock status is also exposed via a public JSON endpoint at /api/stats.

Humanitarian Logic

• Fees accumulate in the contract before swap to USDT.
• Swap triggered by any user — no privileged caller.
• All transfers emit detailed events for full traceability.
• The humanitarian wallet will transition to multisig (per governance policy).

Humanitarian Logic

The contract is fully open-source and verified. External audit will be considered once usage and liquidity justify professional review.

STOPWARTOKEN is built for humanitarian transparency — not investment speculation.More context is available in the Whitepaper 2025.