Dear Delphy Community,

Recently, hackers exploited a flaw in SmartMesh’s (SMT) ERC20 smart contract, which resulted in a large number of tokens being received through overflow attacks. Delphy has analyzed this breach and reviewed our code to insure the Delphy project and community will not suffer the same problems. Delphy is making an official announcement to our community that, we have checked our code and can now confirm that there’s no vulnerability to Delphy code.

Delphy DPY token contract:

0x6c2adc2073994fb2ccc5032cc2906fa221e9b391

At present , Delphy has completed the source certification of the token contract on Etherscan. Anyone can view the source code through the following link:

https://etherscan.io/address/0x6c2adc2073994fb2ccc5032cc2906fa221e9b391#code

The vulnerabilities in SMT’s ERC-20 token contract occur in the passing of uint256 variable to a function without the safeguard of checking for making mathematical operations overflow. The will result in the skip of the balance check and allow people can transfer any amount of tokens.

As can be seen in the source code, the contract Delphy Token(DPY) contract inherits directly from the Standard Token contract. In the Standard Token contract, two functions, Transfer and Transfer From, are both involved in mathematical operations.

For these two functions, all calculations will call Math.safeToAdd or Math.safeToSub before execution to ensure that no overflow occurs. Therefore, the smart contract for Delphy DPY tokens will not be affected by this vulnerability.

Thank you for your continued support!