SWT
← Back to main page

Security & Audit Notes

A transparent overview of security decisions. This page is not a formal audit, but a summary of key guarantees and constraints.

Public Security Documents

Token self-audit: AUDIT-SELF.md
LP lockers security note: LP-LOCKERS-SECURITY.md
Transparency API spec: docs/STATS_API.md
Disclosure policy: SECURITY.md

Contract Properties

Network: Polygon (POL), Chain ID 137
Standard: ERC-20 single-file implementation
Address: 0x49786b20c0E076CDF82F6b07d55312dF9e265db0
Source: verified on Polygonscan.
Upgradeability: no proxy — contract is immutable.

Supply & Fee Constraints

Max supply: 1,000,000 SWT — no mint function.
No burn: no privileged token destruction.
Fee: fixed at 0.1% (10 bps), may only be reduced by charity governance (min 0.05%).
Fee destination: accumulates in the contract for humanitarian swap / transfer.

Wallet Controls

• Owner & reserve wallets are time-locked on-chain until 2027-01-01.
• LP NFT positions (Uniswap v3 & QuickSwap) are time-locked until 2027-01-01 (unlock timestamp enforced by locker contracts).
• Development, airdrop & marketing wallets have enforced transfer limits.
• Marketing wallet is restricted from sending SWT directly to contracts.
• There is no owner function to withdraw user funds or bypass the above limits.
• Liquidity lock status and unlock timestamps are verifiable on-chain and also exposed via /api/stats.

Humanitarian Logic

• Fees accumulate in the contract before swap to USDT.
• Swap triggered by any user — no privileged caller.
• All transfers emit detailed events for full traceability.
• The humanitarian wallet will transition to multisig (per governance policy).

Open-source & Review

The contract is fully open-source and verified. External review may be considered once usage and liquidity justify professional audit scope.

STOPWARTOKEN is built for humanitarian transparency — not investment speculation. More context is available in the Whitepaper 2025.