ETH Price: $2,080.31 (-12.47%)
Gas: 1.91 Gwei

Contract

0xfd97796442Ae3f8d1bC2043B3efae67eb6b866CF
 

Overview

ETH Balance

0 ETH

Eth Value

$0.00

Token Holdings

Multichain Info

No addresses found
Transaction Hash
Method
Block
From
To
0x59684470301f14353631e5e2ead3b09e7a159ee0de6b51af96ae5d8099e5c432 Claim(pending)2025-03-02 1:22:242 days ago1740878544IN
0xfd977964...eb6b866CF
0 ETH(Pending)(Pending)
Claim219737512025-03-04 13:13:4735 mins ago1741094027IN
0xfd977964...eb6b866CF
0 ETH0.000127491.28985472
Claim219737312025-03-04 13:09:4739 mins ago1741093787IN
0xfd977964...eb6b866CF
0 ETH0.00023041.98642614
Claim219731892025-03-04 11:20:352 hrs ago1741087235IN
0xfd977964...eb6b866CF
0 ETH0.000101671.02803156
Claim219727862025-03-04 9:59:473 hrs ago1741082387IN
0xfd977964...eb6b866CF
0 ETH0.000132041.1471265
Claim219724682025-03-04 8:55:594 hrs ago1741078559IN
0xfd977964...eb6b866CF
0 ETH0.000072190.72987783
Claim219722512025-03-04 8:12:235 hrs ago1741075943IN
0xfd977964...eb6b866CF
0 ETH0.000140621.21272418
Claim219712602025-03-04 4:53:118 hrs ago1741063991IN
0xfd977964...eb6b866CF
0 ETH0.000135531.16874108
Claim219707932025-03-04 3:18:5910 hrs ago1741058339IN
0xfd977964...eb6b866CF
0 ETH0.000268452.31517598
Claim219694642025-03-03 22:52:2314 hrs ago1741042343IN
0xfd977964...eb6b866CF
0 ETH0.000255172.2
Claim219673942025-03-03 15:56:4721 hrs ago1741017407IN
0xfd977964...eb6b866CF
0 ETH0.000159051.60882981
Claim219667422025-03-03 13:45:4724 hrs ago1741009547IN
0xfd977964...eb6b866CF
0 ETH0.000190261.92541425
Claim219665132025-03-03 12:59:4724 hrs ago1741006787IN
0xfd977964...eb6b866CF
0 ETH0.00011281.14047879
Claim219664312025-03-03 12:43:2325 hrs ago1741005803IN
0xfd977964...eb6b866CF
0 ETH0.000062880.63599018
Claim219662762025-03-03 12:11:5925 hrs ago1741003919IN
0xfd977964...eb6b866CF
0 ETH0.000140831.21430183
Claim219656932025-03-03 10:14:2327 hrs ago1740996863IN
0xfd977964...eb6b866CF
0 ETH0.000133621.15213906
Claim219654042025-03-03 9:16:1128 hrs ago1740993371IN
0xfd977964...eb6b866CF
0 ETH0.000115871.17174744
Claim219649312025-03-03 7:41:2330 hrs ago1740987683IN
0xfd977964...eb6b866CF
0 ETH0.000061571.19000885
Claim219649312025-03-03 7:41:2330 hrs ago1740987683IN
0xfd977964...eb6b866CF
0 ETH0.000137981.19000885
Claim219641442025-03-03 5:03:2332 hrs ago1740978203IN
0xfd977964...eb6b866CF
0 ETH0.00006660.67388612
Claim219638852025-03-03 4:11:2333 hrs ago1740975083IN
0xfd977964...eb6b866CF
0 ETH0.000110431.11677508
Claim219633032025-03-03 2:13:5935 hrs ago1740968039IN
0xfd977964...eb6b866CF
0 ETH0.000177361.52976879
Claim219632102025-03-03 1:55:2335 hrs ago1740966923IN
0xfd977964...eb6b866CF
0 ETH0.000127631.29089614
Claim219631222025-03-03 1:37:3536 hrs ago1740965855IN
0xfd977964...eb6b866CF
0 ETH0.000145781.25678499
Claim219622522025-03-02 22:42:4739 hrs ago1740955367IN
0xfd977964...eb6b866CF
0 ETH0.000102070.8804691
View all transactions

Latest 25 internal transactions (View All)

Advanced mode:
Parent Transaction Hash Block
From
To
219737512025-03-04 13:13:4735 mins ago1741094027
0xfd977964...eb6b866CF
0 ETH
219737312025-03-04 13:09:4739 mins ago1741093787
0xfd977964...eb6b866CF
0 ETH
219731892025-03-04 11:20:352 hrs ago1741087235
0xfd977964...eb6b866CF
0 ETH
219727862025-03-04 9:59:473 hrs ago1741082387
0xfd977964...eb6b866CF
0 ETH
219724682025-03-04 8:55:594 hrs ago1741078559
0xfd977964...eb6b866CF
0 ETH
219722512025-03-04 8:12:235 hrs ago1741075943
0xfd977964...eb6b866CF
0 ETH
219712602025-03-04 4:53:118 hrs ago1741063991
0xfd977964...eb6b866CF
0 ETH
219707932025-03-04 3:18:5910 hrs ago1741058339
0xfd977964...eb6b866CF
0 ETH
219694642025-03-03 22:52:2314 hrs ago1741042343
0xfd977964...eb6b866CF
0 ETH
219673942025-03-03 15:56:4721 hrs ago1741017407
0xfd977964...eb6b866CF
0 ETH
219667422025-03-03 13:45:4724 hrs ago1741009547
0xfd977964...eb6b866CF
0 ETH
219665132025-03-03 12:59:4724 hrs ago1741006787
0xfd977964...eb6b866CF
0 ETH
219664312025-03-03 12:43:2325 hrs ago1741005803
0xfd977964...eb6b866CF
0 ETH
219662762025-03-03 12:11:5925 hrs ago1741003919
0xfd977964...eb6b866CF
0 ETH
219656932025-03-03 10:14:2327 hrs ago1740996863
0xfd977964...eb6b866CF
0 ETH
219654042025-03-03 9:16:1128 hrs ago1740993371
0xfd977964...eb6b866CF
0 ETH
219649312025-03-03 7:41:2330 hrs ago1740987683
0xfd977964...eb6b866CF
0 ETH
219641442025-03-03 5:03:2332 hrs ago1740978203
0xfd977964...eb6b866CF
0 ETH
219638852025-03-03 4:11:2333 hrs ago1740975083
0xfd977964...eb6b866CF
0 ETH
219633032025-03-03 2:13:5935 hrs ago1740968039
0xfd977964...eb6b866CF
0 ETH
219632102025-03-03 1:55:2335 hrs ago1740966923
0xfd977964...eb6b866CF
0 ETH
219631222025-03-03 1:37:3536 hrs ago1740965855
0xfd977964...eb6b866CF
0 ETH
219622522025-03-02 22:42:4739 hrs ago1740955367
0xfd977964...eb6b866CF
0 ETH
219619622025-03-02 21:44:2340 hrs ago1740951863
0xfd977964...eb6b866CF
0 ETH
219611362025-03-02 18:58:5942 hrs ago1740941939
0xfd977964...eb6b866CF
0 ETH
View All Internal Transactions
Loading...
Loading

Contract Source Code Verified (Exact Match)

Contract Name:
StakeStoneRewardDistributor

Compiler Version
v0.8.26+commit.8a97fa7a

Optimization Enabled:
Yes with 200 runs

Other Settings:
paris EvmVersion
File 1 of 10 : StakeStoneRewardDistributor.sol
// SPDX-License-Identifier: BUSL-1.1
pragma solidity 0.8.26;

import {TransferHelper} from "@uniswap/v3-periphery/contracts/libraries/TransferHelper.sol";
import {AccessControl} from "@openzeppelin/contracts/access/AccessControl.sol";
import "@openzeppelin/contracts/token/ERC20/IERC20.sol";
import "@openzeppelin/contracts/utils/cryptography/MerkleProof.sol";

contract StakeStoneRewardDistributor is AccessControl {
    bytes32 public constant SETTER_ROLE = keccak256("SETTER_ROLE");

    bytes32 public root;

    uint256 public terminatingStartTime;
    bool public terminated;

    mapping(address => mapping(address => uint256)) public claimed;

    // Constructor
    constructor() {
        _grantRole(DEFAULT_ADMIN_ROLE, msg.sender);
    }

    // Public
    function claim(
        bytes32[][] memory _proof,
        address[] memory _token,
        uint256[] memory _totalClaimableAmount,
        uint256[] memory _claimAmount
    ) external {
        require(terminated == false, "Claim terminated");

        uint256 length = _proof.length;
        for (uint256 i = 0; i < length; i++) {
            address token = _token[i];
            uint256 totalClaimableAmount = _totalClaimableAmount[i];
            uint256 claimAmount = _claimAmount[i];

            bytes32 leaf = keccak256(
                bytes.concat(
                    keccak256(
                        abi.encode(msg.sender, token, totalClaimableAmount)
                    )
                )
            );
            require(MerkleProof.verify(_proof[i], root, leaf), "Invalid proof");
            claimed[msg.sender][token] += claimAmount;
            require(
                claimed[msg.sender][token] <= totalClaimableAmount,
                "Invalid amount"
            );
            TransferHelper.safeTransfer(token, msg.sender, claimAmount);
        }
    }

    // Owner
    function startTerminate() external onlyRole(SETTER_ROLE) {
        terminatingStartTime = block.timestamp;
    }

    function finalTerminate(
        address[] memory _tokens
    ) external onlyRole(SETTER_ROLE) {
        require(
            block.timestamp - terminatingStartTime > 30 days,
            "Still terminating"
        );

        for (uint256 i = 0; i < _tokens.length; i++) {
            TransferHelper.safeTransfer(
                _tokens[i],
                msg.sender,
                IERC20(_tokens[i]).balanceOf(address(this))
            );
        }

        terminated = true;
    }

    function setRoot(bytes32 _root) external onlyRole(SETTER_ROLE) {
        root = _root;
    }
}

File 2 of 10 : TransferHelper.sol
// SPDX-License-Identifier: GPL-2.0-or-later
pragma solidity >=0.6.0;

import '@openzeppelin/contracts/token/ERC20/IERC20.sol';

library TransferHelper {
    /// @notice Transfers tokens from the targeted address to the given destination
    /// @notice Errors with 'STF' if transfer fails
    /// @param token The contract address of the token to be transferred
    /// @param from The originating address from which the tokens will be transferred
    /// @param to The destination address of the transfer
    /// @param value The amount to be transferred
    function safeTransferFrom(
        address token,
        address from,
        address to,
        uint256 value
    ) internal {
        (bool success, bytes memory data) = token.call(
            abi.encodeWithSelector(IERC20.transferFrom.selector, from, to, value)
        );
        require(success && (data.length == 0 || abi.decode(data, (bool))), 'STF');
    }

    /// @notice Transfers tokens from msg.sender to a recipient
    /// @dev Errors with ST if transfer fails
    /// @param token The contract address of the token which will be transferred
    /// @param to The recipient of the transfer
    /// @param value The value of the transfer
    function safeTransfer(
        address token,
        address to,
        uint256 value
    ) internal {
        (bool success, bytes memory data) = token.call(abi.encodeWithSelector(IERC20.transfer.selector, to, value));
        require(success && (data.length == 0 || abi.decode(data, (bool))), 'ST');
    }

    /// @notice Approves the stipulated contract to spend the given allowance in the given token
    /// @dev Errors with 'SA' if transfer fails
    /// @param token The contract address of the token to be approved
    /// @param to The target of the approval
    /// @param value The amount of the given token the target will be allowed to spend
    function safeApprove(
        address token,
        address to,
        uint256 value
    ) internal {
        (bool success, bytes memory data) = token.call(abi.encodeWithSelector(IERC20.approve.selector, to, value));
        require(success && (data.length == 0 || abi.decode(data, (bool))), 'SA');
    }

    /// @notice Transfers ETH to the recipient address
    /// @dev Fails with `STE`
    /// @param to The destination of the transfer
    /// @param value The value to be transferred
    function safeTransferETH(address to, uint256 value) internal {
        (bool success, ) = to.call{value: value}(new bytes(0));
        require(success, 'STE');
    }
}

File 3 of 10 : AccessControl.sol
// SPDX-License-Identifier: MIT
// OpenZeppelin Contracts (last updated v5.0.0) (access/AccessControl.sol)

pragma solidity ^0.8.20;

import {IAccessControl} from "./IAccessControl.sol";
import {Context} from "../utils/Context.sol";
import {ERC165} from "../utils/introspection/ERC165.sol";

/**
 * @dev Contract module that allows children to implement role-based access
 * control mechanisms. This is a lightweight version that doesn't allow enumerating role
 * members except through off-chain means by accessing the contract event logs. Some
 * applications may benefit from on-chain enumerability, for those cases see
 * {AccessControlEnumerable}.
 *
 * Roles are referred to by their `bytes32` identifier. These should be exposed
 * in the external API and be unique. The best way to achieve this is by
 * using `public constant` hash digests:
 *
 * ```solidity
 * bytes32 public constant MY_ROLE = keccak256("MY_ROLE");
 * ```
 *
 * Roles can be used to represent a set of permissions. To restrict access to a
 * function call, use {hasRole}:
 *
 * ```solidity
 * function foo() public {
 *     require(hasRole(MY_ROLE, msg.sender));
 *     ...
 * }
 * ```
 *
 * Roles can be granted and revoked dynamically via the {grantRole} and
 * {revokeRole} functions. Each role has an associated admin role, and only
 * accounts that have a role's admin role can call {grantRole} and {revokeRole}.
 *
 * By default, the admin role for all roles is `DEFAULT_ADMIN_ROLE`, which means
 * that only accounts with this role will be able to grant or revoke other
 * roles. More complex role relationships can be created by using
 * {_setRoleAdmin}.
 *
 * WARNING: The `DEFAULT_ADMIN_ROLE` is also its own admin: it has permission to
 * grant and revoke this role. Extra precautions should be taken to secure
 * accounts that have been granted it. We recommend using {AccessControlDefaultAdminRules}
 * to enforce additional security measures for this role.
 */
abstract contract AccessControl is Context, IAccessControl, ERC165 {
    struct RoleData {
        mapping(address account => bool) hasRole;
        bytes32 adminRole;
    }

    mapping(bytes32 role => RoleData) private _roles;

    bytes32 public constant DEFAULT_ADMIN_ROLE = 0x00;

    /**
     * @dev Modifier that checks that an account has a specific role. Reverts
     * with an {AccessControlUnauthorizedAccount} error including the required role.
     */
    modifier onlyRole(bytes32 role) {
        _checkRole(role);
        _;
    }

    /**
     * @dev See {IERC165-supportsInterface}.
     */
    function supportsInterface(bytes4 interfaceId) public view virtual override returns (bool) {
        return interfaceId == type(IAccessControl).interfaceId || super.supportsInterface(interfaceId);
    }

    /**
     * @dev Returns `true` if `account` has been granted `role`.
     */
    function hasRole(bytes32 role, address account) public view virtual returns (bool) {
        return _roles[role].hasRole[account];
    }

    /**
     * @dev Reverts with an {AccessControlUnauthorizedAccount} error if `_msgSender()`
     * is missing `role`. Overriding this function changes the behavior of the {onlyRole} modifier.
     */
    function _checkRole(bytes32 role) internal view virtual {
        _checkRole(role, _msgSender());
    }

    /**
     * @dev Reverts with an {AccessControlUnauthorizedAccount} error if `account`
     * is missing `role`.
     */
    function _checkRole(bytes32 role, address account) internal view virtual {
        if (!hasRole(role, account)) {
            revert AccessControlUnauthorizedAccount(account, role);
        }
    }

    /**
     * @dev Returns the admin role that controls `role`. See {grantRole} and
     * {revokeRole}.
     *
     * To change a role's admin, use {_setRoleAdmin}.
     */
    function getRoleAdmin(bytes32 role) public view virtual returns (bytes32) {
        return _roles[role].adminRole;
    }

    /**
     * @dev Grants `role` to `account`.
     *
     * If `account` had not been already granted `role`, emits a {RoleGranted}
     * event.
     *
     * Requirements:
     *
     * - the caller must have ``role``'s admin role.
     *
     * May emit a {RoleGranted} event.
     */
    function grantRole(bytes32 role, address account) public virtual onlyRole(getRoleAdmin(role)) {
        _grantRole(role, account);
    }

    /**
     * @dev Revokes `role` from `account`.
     *
     * If `account` had been granted `role`, emits a {RoleRevoked} event.
     *
     * Requirements:
     *
     * - the caller must have ``role``'s admin role.
     *
     * May emit a {RoleRevoked} event.
     */
    function revokeRole(bytes32 role, address account) public virtual onlyRole(getRoleAdmin(role)) {
        _revokeRole(role, account);
    }

    /**
     * @dev Revokes `role` from the calling account.
     *
     * Roles are often managed via {grantRole} and {revokeRole}: this function's
     * purpose is to provide a mechanism for accounts to lose their privileges
     * if they are compromised (such as when a trusted device is misplaced).
     *
     * If the calling account had been revoked `role`, emits a {RoleRevoked}
     * event.
     *
     * Requirements:
     *
     * - the caller must be `callerConfirmation`.
     *
     * May emit a {RoleRevoked} event.
     */
    function renounceRole(bytes32 role, address callerConfirmation) public virtual {
        if (callerConfirmation != _msgSender()) {
            revert AccessControlBadConfirmation();
        }

        _revokeRole(role, callerConfirmation);
    }

    /**
     * @dev Sets `adminRole` as ``role``'s admin role.
     *
     * Emits a {RoleAdminChanged} event.
     */
    function _setRoleAdmin(bytes32 role, bytes32 adminRole) internal virtual {
        bytes32 previousAdminRole = getRoleAdmin(role);
        _roles[role].adminRole = adminRole;
        emit RoleAdminChanged(role, previousAdminRole, adminRole);
    }

    /**
     * @dev Attempts to grant `role` to `account` and returns a boolean indicating if `role` was granted.
     *
     * Internal function without access restriction.
     *
     * May emit a {RoleGranted} event.
     */
    function _grantRole(bytes32 role, address account) internal virtual returns (bool) {
        if (!hasRole(role, account)) {
            _roles[role].hasRole[account] = true;
            emit RoleGranted(role, account, _msgSender());
            return true;
        } else {
            return false;
        }
    }

    /**
     * @dev Attempts to revoke `role` to `account` and returns a boolean indicating if `role` was revoked.
     *
     * Internal function without access restriction.
     *
     * May emit a {RoleRevoked} event.
     */
    function _revokeRole(bytes32 role, address account) internal virtual returns (bool) {
        if (hasRole(role, account)) {
            _roles[role].hasRole[account] = false;
            emit RoleRevoked(role, account, _msgSender());
            return true;
        } else {
            return false;
        }
    }
}

File 4 of 10 : IERC20.sol
// SPDX-License-Identifier: MIT
// OpenZeppelin Contracts (last updated v5.1.0) (token/ERC20/IERC20.sol)

pragma solidity ^0.8.20;

/**
 * @dev Interface of the ERC-20 standard as defined in the ERC.
 */
interface IERC20 {
    /**
     * @dev Emitted when `value` tokens are moved from one account (`from`) to
     * another (`to`).
     *
     * Note that `value` may be zero.
     */
    event Transfer(address indexed from, address indexed to, uint256 value);

    /**
     * @dev Emitted when the allowance of a `spender` for an `owner` is set by
     * a call to {approve}. `value` is the new allowance.
     */
    event Approval(address indexed owner, address indexed spender, uint256 value);

    /**
     * @dev Returns the value of tokens in existence.
     */
    function totalSupply() external view returns (uint256);

    /**
     * @dev Returns the value of tokens owned by `account`.
     */
    function balanceOf(address account) external view returns (uint256);

    /**
     * @dev Moves a `value` amount of tokens from the caller's account to `to`.
     *
     * Returns a boolean value indicating whether the operation succeeded.
     *
     * Emits a {Transfer} event.
     */
    function transfer(address to, uint256 value) external returns (bool);

    /**
     * @dev Returns the remaining number of tokens that `spender` will be
     * allowed to spend on behalf of `owner` through {transferFrom}. This is
     * zero by default.
     *
     * This value changes when {approve} or {transferFrom} are called.
     */
    function allowance(address owner, address spender) external view returns (uint256);

    /**
     * @dev Sets a `value` amount of tokens as the allowance of `spender` over the
     * caller's tokens.
     *
     * Returns a boolean value indicating whether the operation succeeded.
     *
     * IMPORTANT: Beware that changing an allowance with this method brings the risk
     * that someone may use both the old and the new allowance by unfortunate
     * transaction ordering. One possible solution to mitigate this race
     * condition is to first reduce the spender's allowance to 0 and set the
     * desired value afterwards:
     * https://github.com/ethereum/EIPs/issues/20#issuecomment-263524729
     *
     * Emits an {Approval} event.
     */
    function approve(address spender, uint256 value) external returns (bool);

    /**
     * @dev Moves a `value` amount of tokens from `from` to `to` using the
     * allowance mechanism. `value` is then deducted from the caller's
     * allowance.
     *
     * Returns a boolean value indicating whether the operation succeeded.
     *
     * Emits a {Transfer} event.
     */
    function transferFrom(address from, address to, uint256 value) external returns (bool);
}

File 5 of 10 : MerkleProof.sol
// SPDX-License-Identifier: MIT
// OpenZeppelin Contracts (last updated v5.1.0) (utils/cryptography/MerkleProof.sol)
// This file was procedurally generated from scripts/generate/templates/MerkleProof.js.

pragma solidity ^0.8.20;

import {Hashes} from "./Hashes.sol";

/**
 * @dev These functions deal with verification of Merkle Tree proofs.
 *
 * The tree and the proofs can be generated using our
 * https://github.com/OpenZeppelin/merkle-tree[JavaScript library].
 * You will find a quickstart guide in the readme.
 *
 * WARNING: You should avoid using leaf values that are 64 bytes long prior to
 * hashing, or use a hash function other than keccak256 for hashing leaves.
 * This is because the concatenation of a sorted pair of internal nodes in
 * the Merkle tree could be reinterpreted as a leaf value.
 * OpenZeppelin's JavaScript library generates Merkle trees that are safe
 * against this attack out of the box.
 *
 * IMPORTANT: Consider memory side-effects when using custom hashing functions
 * that access memory in an unsafe way.
 *
 * NOTE: This library supports proof verification for merkle trees built using
 * custom _commutative_ hashing functions (i.e. `H(a, b) == H(b, a)`). Proving
 * leaf inclusion in trees built using non-commutative hashing functions requires
 * additional logic that is not supported by this library.
 */
library MerkleProof {
    /**
     *@dev The multiproof provided is not valid.
     */
    error MerkleProofInvalidMultiproof();

    /**
     * @dev Returns true if a `leaf` can be proved to be a part of a Merkle tree
     * defined by `root`. For this, a `proof` must be provided, containing
     * sibling hashes on the branch from the leaf to the root of the tree. Each
     * pair of leaves and each pair of pre-images are assumed to be sorted.
     *
     * This version handles proofs in memory with the default hashing function.
     */
    function verify(bytes32[] memory proof, bytes32 root, bytes32 leaf) internal pure returns (bool) {
        return processProof(proof, leaf) == root;
    }

    /**
     * @dev Returns the rebuilt hash obtained by traversing a Merkle tree up
     * from `leaf` using `proof`. A `proof` is valid if and only if the rebuilt
     * hash matches the root of the tree. When processing the proof, the pairs
     * of leaves & pre-images are assumed to be sorted.
     *
     * This version handles proofs in memory with the default hashing function.
     */
    function processProof(bytes32[] memory proof, bytes32 leaf) internal pure returns (bytes32) {
        bytes32 computedHash = leaf;
        for (uint256 i = 0; i < proof.length; i++) {
            computedHash = Hashes.commutativeKeccak256(computedHash, proof[i]);
        }
        return computedHash;
    }

    /**
     * @dev Returns true if a `leaf` can be proved to be a part of a Merkle tree
     * defined by `root`. For this, a `proof` must be provided, containing
     * sibling hashes on the branch from the leaf to the root of the tree. Each
     * pair of leaves and each pair of pre-images are assumed to be sorted.
     *
     * This version handles proofs in memory with a custom hashing function.
     */
    function verify(
        bytes32[] memory proof,
        bytes32 root,
        bytes32 leaf,
        function(bytes32, bytes32) view returns (bytes32) hasher
    ) internal view returns (bool) {
        return processProof(proof, leaf, hasher) == root;
    }

    /**
     * @dev Returns the rebuilt hash obtained by traversing a Merkle tree up
     * from `leaf` using `proof`. A `proof` is valid if and only if the rebuilt
     * hash matches the root of the tree. When processing the proof, the pairs
     * of leaves & pre-images are assumed to be sorted.
     *
     * This version handles proofs in memory with a custom hashing function.
     */
    function processProof(
        bytes32[] memory proof,
        bytes32 leaf,
        function(bytes32, bytes32) view returns (bytes32) hasher
    ) internal view returns (bytes32) {
        bytes32 computedHash = leaf;
        for (uint256 i = 0; i < proof.length; i++) {
            computedHash = hasher(computedHash, proof[i]);
        }
        return computedHash;
    }

    /**
     * @dev Returns true if a `leaf` can be proved to be a part of a Merkle tree
     * defined by `root`. For this, a `proof` must be provided, containing
     * sibling hashes on the branch from the leaf to the root of the tree. Each
     * pair of leaves and each pair of pre-images are assumed to be sorted.
     *
     * This version handles proofs in calldata with the default hashing function.
     */
    function verifyCalldata(bytes32[] calldata proof, bytes32 root, bytes32 leaf) internal pure returns (bool) {
        return processProofCalldata(proof, leaf) == root;
    }

    /**
     * @dev Returns the rebuilt hash obtained by traversing a Merkle tree up
     * from `leaf` using `proof`. A `proof` is valid if and only if the rebuilt
     * hash matches the root of the tree. When processing the proof, the pairs
     * of leaves & pre-images are assumed to be sorted.
     *
     * This version handles proofs in calldata with the default hashing function.
     */
    function processProofCalldata(bytes32[] calldata proof, bytes32 leaf) internal pure returns (bytes32) {
        bytes32 computedHash = leaf;
        for (uint256 i = 0; i < proof.length; i++) {
            computedHash = Hashes.commutativeKeccak256(computedHash, proof[i]);
        }
        return computedHash;
    }

    /**
     * @dev Returns true if a `leaf` can be proved to be a part of a Merkle tree
     * defined by `root`. For this, a `proof` must be provided, containing
     * sibling hashes on the branch from the leaf to the root of the tree. Each
     * pair of leaves and each pair of pre-images are assumed to be sorted.
     *
     * This version handles proofs in calldata with a custom hashing function.
     */
    function verifyCalldata(
        bytes32[] calldata proof,
        bytes32 root,
        bytes32 leaf,
        function(bytes32, bytes32) view returns (bytes32) hasher
    ) internal view returns (bool) {
        return processProofCalldata(proof, leaf, hasher) == root;
    }

    /**
     * @dev Returns the rebuilt hash obtained by traversing a Merkle tree up
     * from `leaf` using `proof`. A `proof` is valid if and only if the rebuilt
     * hash matches the root of the tree. When processing the proof, the pairs
     * of leaves & pre-images are assumed to be sorted.
     *
     * This version handles proofs in calldata with a custom hashing function.
     */
    function processProofCalldata(
        bytes32[] calldata proof,
        bytes32 leaf,
        function(bytes32, bytes32) view returns (bytes32) hasher
    ) internal view returns (bytes32) {
        bytes32 computedHash = leaf;
        for (uint256 i = 0; i < proof.length; i++) {
            computedHash = hasher(computedHash, proof[i]);
        }
        return computedHash;
    }

    /**
     * @dev Returns true if the `leaves` can be simultaneously proven to be a part of a Merkle tree defined by
     * `root`, according to `proof` and `proofFlags` as described in {processMultiProof}.
     *
     * This version handles multiproofs in memory with the default hashing function.
     *
     * CAUTION: Not all Merkle trees admit multiproofs. See {processMultiProof} for details.
     *
     * NOTE: Consider the case where `root == proof[0] && leaves.length == 0` as it will return `true`.
     * The `leaves` must be validated independently. See {processMultiProof}.
     */
    function multiProofVerify(
        bytes32[] memory proof,
        bool[] memory proofFlags,
        bytes32 root,
        bytes32[] memory leaves
    ) internal pure returns (bool) {
        return processMultiProof(proof, proofFlags, leaves) == root;
    }

    /**
     * @dev Returns the root of a tree reconstructed from `leaves` and sibling nodes in `proof`. The reconstruction
     * proceeds by incrementally reconstructing all inner nodes by combining a leaf/inner node with either another
     * leaf/inner node or a proof sibling node, depending on whether each `proofFlags` item is true or false
     * respectively.
     *
     * This version handles multiproofs in memory with the default hashing function.
     *
     * CAUTION: Not all Merkle trees admit multiproofs. To use multiproofs, it is sufficient to ensure that: 1) the tree
     * is complete (but not necessarily perfect), 2) the leaves to be proven are in the opposite order they are in the
     * tree (i.e., as seen from right to left starting at the deepest layer and continuing at the next layer).
     *
     * NOTE: The _empty set_ (i.e. the case where `proof.length == 1 && leaves.length == 0`) is considered a no-op,
     * and therefore a valid multiproof (i.e. it returns `proof[0]`). Consider disallowing this case if you're not
     * validating the leaves elsewhere.
     */
    function processMultiProof(
        bytes32[] memory proof,
        bool[] memory proofFlags,
        bytes32[] memory leaves
    ) internal pure returns (bytes32 merkleRoot) {
        // This function rebuilds the root hash by traversing the tree up from the leaves. The root is rebuilt by
        // consuming and producing values on a queue. The queue starts with the `leaves` array, then goes onto the
        // `hashes` array. At the end of the process, the last hash in the `hashes` array should contain the root of
        // the Merkle tree.
        uint256 leavesLen = leaves.length;
        uint256 proofFlagsLen = proofFlags.length;

        // Check proof validity.
        if (leavesLen + proof.length != proofFlagsLen + 1) {
            revert MerkleProofInvalidMultiproof();
        }

        // The xxxPos values are "pointers" to the next value to consume in each array. All accesses are done using
        // `xxx[xxxPos++]`, which return the current value and increment the pointer, thus mimicking a queue's "pop".
        bytes32[] memory hashes = new bytes32[](proofFlagsLen);
        uint256 leafPos = 0;
        uint256 hashPos = 0;
        uint256 proofPos = 0;
        // At each step, we compute the next hash using two values:
        // - a value from the "main queue". If not all leaves have been consumed, we get the next leaf, otherwise we
        //   get the next hash.
        // - depending on the flag, either another value from the "main queue" (merging branches) or an element from the
        //   `proof` array.
        for (uint256 i = 0; i < proofFlagsLen; i++) {
            bytes32 a = leafPos < leavesLen ? leaves[leafPos++] : hashes[hashPos++];
            bytes32 b = proofFlags[i]
                ? (leafPos < leavesLen ? leaves[leafPos++] : hashes[hashPos++])
                : proof[proofPos++];
            hashes[i] = Hashes.commutativeKeccak256(a, b);
        }

        if (proofFlagsLen > 0) {
            if (proofPos != proof.length) {
                revert MerkleProofInvalidMultiproof();
            }
            unchecked {
                return hashes[proofFlagsLen - 1];
            }
        } else if (leavesLen > 0) {
            return leaves[0];
        } else {
            return proof[0];
        }
    }

    /**
     * @dev Returns true if the `leaves` can be simultaneously proven to be a part of a Merkle tree defined by
     * `root`, according to `proof` and `proofFlags` as described in {processMultiProof}.
     *
     * This version handles multiproofs in memory with a custom hashing function.
     *
     * CAUTION: Not all Merkle trees admit multiproofs. See {processMultiProof} for details.
     *
     * NOTE: Consider the case where `root == proof[0] && leaves.length == 0` as it will return `true`.
     * The `leaves` must be validated independently. See {processMultiProof}.
     */
    function multiProofVerify(
        bytes32[] memory proof,
        bool[] memory proofFlags,
        bytes32 root,
        bytes32[] memory leaves,
        function(bytes32, bytes32) view returns (bytes32) hasher
    ) internal view returns (bool) {
        return processMultiProof(proof, proofFlags, leaves, hasher) == root;
    }

    /**
     * @dev Returns the root of a tree reconstructed from `leaves` and sibling nodes in `proof`. The reconstruction
     * proceeds by incrementally reconstructing all inner nodes by combining a leaf/inner node with either another
     * leaf/inner node or a proof sibling node, depending on whether each `proofFlags` item is true or false
     * respectively.
     *
     * This version handles multiproofs in memory with a custom hashing function.
     *
     * CAUTION: Not all Merkle trees admit multiproofs. To use multiproofs, it is sufficient to ensure that: 1) the tree
     * is complete (but not necessarily perfect), 2) the leaves to be proven are in the opposite order they are in the
     * tree (i.e., as seen from right to left starting at the deepest layer and continuing at the next layer).
     *
     * NOTE: The _empty set_ (i.e. the case where `proof.length == 1 && leaves.length == 0`) is considered a no-op,
     * and therefore a valid multiproof (i.e. it returns `proof[0]`). Consider disallowing this case if you're not
     * validating the leaves elsewhere.
     */
    function processMultiProof(
        bytes32[] memory proof,
        bool[] memory proofFlags,
        bytes32[] memory leaves,
        function(bytes32, bytes32) view returns (bytes32) hasher
    ) internal view returns (bytes32 merkleRoot) {
        // This function rebuilds the root hash by traversing the tree up from the leaves. The root is rebuilt by
        // consuming and producing values on a queue. The queue starts with the `leaves` array, then goes onto the
        // `hashes` array. At the end of the process, the last hash in the `hashes` array should contain the root of
        // the Merkle tree.
        uint256 leavesLen = leaves.length;
        uint256 proofFlagsLen = proofFlags.length;

        // Check proof validity.
        if (leavesLen + proof.length != proofFlagsLen + 1) {
            revert MerkleProofInvalidMultiproof();
        }

        // The xxxPos values are "pointers" to the next value to consume in each array. All accesses are done using
        // `xxx[xxxPos++]`, which return the current value and increment the pointer, thus mimicking a queue's "pop".
        bytes32[] memory hashes = new bytes32[](proofFlagsLen);
        uint256 leafPos = 0;
        uint256 hashPos = 0;
        uint256 proofPos = 0;
        // At each step, we compute the next hash using two values:
        // - a value from the "main queue". If not all leaves have been consumed, we get the next leaf, otherwise we
        //   get the next hash.
        // - depending on the flag, either another value from the "main queue" (merging branches) or an element from the
        //   `proof` array.
        for (uint256 i = 0; i < proofFlagsLen; i++) {
            bytes32 a = leafPos < leavesLen ? leaves[leafPos++] : hashes[hashPos++];
            bytes32 b = proofFlags[i]
                ? (leafPos < leavesLen ? leaves[leafPos++] : hashes[hashPos++])
                : proof[proofPos++];
            hashes[i] = hasher(a, b);
        }

        if (proofFlagsLen > 0) {
            if (proofPos != proof.length) {
                revert MerkleProofInvalidMultiproof();
            }
            unchecked {
                return hashes[proofFlagsLen - 1];
            }
        } else if (leavesLen > 0) {
            return leaves[0];
        } else {
            return proof[0];
        }
    }

    /**
     * @dev Returns true if the `leaves` can be simultaneously proven to be a part of a Merkle tree defined by
     * `root`, according to `proof` and `proofFlags` as described in {processMultiProof}.
     *
     * This version handles multiproofs in calldata with the default hashing function.
     *
     * CAUTION: Not all Merkle trees admit multiproofs. See {processMultiProof} for details.
     *
     * NOTE: Consider the case where `root == proof[0] && leaves.length == 0` as it will return `true`.
     * The `leaves` must be validated independently. See {processMultiProofCalldata}.
     */
    function multiProofVerifyCalldata(
        bytes32[] calldata proof,
        bool[] calldata proofFlags,
        bytes32 root,
        bytes32[] memory leaves
    ) internal pure returns (bool) {
        return processMultiProofCalldata(proof, proofFlags, leaves) == root;
    }

    /**
     * @dev Returns the root of a tree reconstructed from `leaves` and sibling nodes in `proof`. The reconstruction
     * proceeds by incrementally reconstructing all inner nodes by combining a leaf/inner node with either another
     * leaf/inner node or a proof sibling node, depending on whether each `proofFlags` item is true or false
     * respectively.
     *
     * This version handles multiproofs in calldata with the default hashing function.
     *
     * CAUTION: Not all Merkle trees admit multiproofs. To use multiproofs, it is sufficient to ensure that: 1) the tree
     * is complete (but not necessarily perfect), 2) the leaves to be proven are in the opposite order they are in the
     * tree (i.e., as seen from right to left starting at the deepest layer and continuing at the next layer).
     *
     * NOTE: The _empty set_ (i.e. the case where `proof.length == 1 && leaves.length == 0`) is considered a no-op,
     * and therefore a valid multiproof (i.e. it returns `proof[0]`). Consider disallowing this case if you're not
     * validating the leaves elsewhere.
     */
    function processMultiProofCalldata(
        bytes32[] calldata proof,
        bool[] calldata proofFlags,
        bytes32[] memory leaves
    ) internal pure returns (bytes32 merkleRoot) {
        // This function rebuilds the root hash by traversing the tree up from the leaves. The root is rebuilt by
        // consuming and producing values on a queue. The queue starts with the `leaves` array, then goes onto the
        // `hashes` array. At the end of the process, the last hash in the `hashes` array should contain the root of
        // the Merkle tree.
        uint256 leavesLen = leaves.length;
        uint256 proofFlagsLen = proofFlags.length;

        // Check proof validity.
        if (leavesLen + proof.length != proofFlagsLen + 1) {
            revert MerkleProofInvalidMultiproof();
        }

        // The xxxPos values are "pointers" to the next value to consume in each array. All accesses are done using
        // `xxx[xxxPos++]`, which return the current value and increment the pointer, thus mimicking a queue's "pop".
        bytes32[] memory hashes = new bytes32[](proofFlagsLen);
        uint256 leafPos = 0;
        uint256 hashPos = 0;
        uint256 proofPos = 0;
        // At each step, we compute the next hash using two values:
        // - a value from the "main queue". If not all leaves have been consumed, we get the next leaf, otherwise we
        //   get the next hash.
        // - depending on the flag, either another value from the "main queue" (merging branches) or an element from the
        //   `proof` array.
        for (uint256 i = 0; i < proofFlagsLen; i++) {
            bytes32 a = leafPos < leavesLen ? leaves[leafPos++] : hashes[hashPos++];
            bytes32 b = proofFlags[i]
                ? (leafPos < leavesLen ? leaves[leafPos++] : hashes[hashPos++])
                : proof[proofPos++];
            hashes[i] = Hashes.commutativeKeccak256(a, b);
        }

        if (proofFlagsLen > 0) {
            if (proofPos != proof.length) {
                revert MerkleProofInvalidMultiproof();
            }
            unchecked {
                return hashes[proofFlagsLen - 1];
            }
        } else if (leavesLen > 0) {
            return leaves[0];
        } else {
            return proof[0];
        }
    }

    /**
     * @dev Returns true if the `leaves` can be simultaneously proven to be a part of a Merkle tree defined by
     * `root`, according to `proof` and `proofFlags` as described in {processMultiProof}.
     *
     * This version handles multiproofs in calldata with a custom hashing function.
     *
     * CAUTION: Not all Merkle trees admit multiproofs. See {processMultiProof} for details.
     *
     * NOTE: Consider the case where `root == proof[0] && leaves.length == 0` as it will return `true`.
     * The `leaves` must be validated independently. See {processMultiProofCalldata}.
     */
    function multiProofVerifyCalldata(
        bytes32[] calldata proof,
        bool[] calldata proofFlags,
        bytes32 root,
        bytes32[] memory leaves,
        function(bytes32, bytes32) view returns (bytes32) hasher
    ) internal view returns (bool) {
        return processMultiProofCalldata(proof, proofFlags, leaves, hasher) == root;
    }

    /**
     * @dev Returns the root of a tree reconstructed from `leaves` and sibling nodes in `proof`. The reconstruction
     * proceeds by incrementally reconstructing all inner nodes by combining a leaf/inner node with either another
     * leaf/inner node or a proof sibling node, depending on whether each `proofFlags` item is true or false
     * respectively.
     *
     * This version handles multiproofs in calldata with a custom hashing function.
     *
     * CAUTION: Not all Merkle trees admit multiproofs. To use multiproofs, it is sufficient to ensure that: 1) the tree
     * is complete (but not necessarily perfect), 2) the leaves to be proven are in the opposite order they are in the
     * tree (i.e., as seen from right to left starting at the deepest layer and continuing at the next layer).
     *
     * NOTE: The _empty set_ (i.e. the case where `proof.length == 1 && leaves.length == 0`) is considered a no-op,
     * and therefore a valid multiproof (i.e. it returns `proof[0]`). Consider disallowing this case if you're not
     * validating the leaves elsewhere.
     */
    function processMultiProofCalldata(
        bytes32[] calldata proof,
        bool[] calldata proofFlags,
        bytes32[] memory leaves,
        function(bytes32, bytes32) view returns (bytes32) hasher
    ) internal view returns (bytes32 merkleRoot) {
        // This function rebuilds the root hash by traversing the tree up from the leaves. The root is rebuilt by
        // consuming and producing values on a queue. The queue starts with the `leaves` array, then goes onto the
        // `hashes` array. At the end of the process, the last hash in the `hashes` array should contain the root of
        // the Merkle tree.
        uint256 leavesLen = leaves.length;
        uint256 proofFlagsLen = proofFlags.length;

        // Check proof validity.
        if (leavesLen + proof.length != proofFlagsLen + 1) {
            revert MerkleProofInvalidMultiproof();
        }

        // The xxxPos values are "pointers" to the next value to consume in each array. All accesses are done using
        // `xxx[xxxPos++]`, which return the current value and increment the pointer, thus mimicking a queue's "pop".
        bytes32[] memory hashes = new bytes32[](proofFlagsLen);
        uint256 leafPos = 0;
        uint256 hashPos = 0;
        uint256 proofPos = 0;
        // At each step, we compute the next hash using two values:
        // - a value from the "main queue". If not all leaves have been consumed, we get the next leaf, otherwise we
        //   get the next hash.
        // - depending on the flag, either another value from the "main queue" (merging branches) or an element from the
        //   `proof` array.
        for (uint256 i = 0; i < proofFlagsLen; i++) {
            bytes32 a = leafPos < leavesLen ? leaves[leafPos++] : hashes[hashPos++];
            bytes32 b = proofFlags[i]
                ? (leafPos < leavesLen ? leaves[leafPos++] : hashes[hashPos++])
                : proof[proofPos++];
            hashes[i] = hasher(a, b);
        }

        if (proofFlagsLen > 0) {
            if (proofPos != proof.length) {
                revert MerkleProofInvalidMultiproof();
            }
            unchecked {
                return hashes[proofFlagsLen - 1];
            }
        } else if (leavesLen > 0) {
            return leaves[0];
        } else {
            return proof[0];
        }
    }
}

File 6 of 10 : IAccessControl.sol
// SPDX-License-Identifier: MIT
// OpenZeppelin Contracts (last updated v5.1.0) (access/IAccessControl.sol)

pragma solidity ^0.8.20;

/**
 * @dev External interface of AccessControl declared to support ERC-165 detection.
 */
interface IAccessControl {
    /**
     * @dev The `account` is missing a role.
     */
    error AccessControlUnauthorizedAccount(address account, bytes32 neededRole);

    /**
     * @dev The caller of a function is not the expected one.
     *
     * NOTE: Don't confuse with {AccessControlUnauthorizedAccount}.
     */
    error AccessControlBadConfirmation();

    /**
     * @dev Emitted when `newAdminRole` is set as ``role``'s admin role, replacing `previousAdminRole`
     *
     * `DEFAULT_ADMIN_ROLE` is the starting admin for all roles, despite
     * {RoleAdminChanged} not being emitted signaling this.
     */
    event RoleAdminChanged(bytes32 indexed role, bytes32 indexed previousAdminRole, bytes32 indexed newAdminRole);

    /**
     * @dev Emitted when `account` is granted `role`.
     *
     * `sender` is the account that originated the contract call. This account bears the admin role (for the granted role).
     * Expected in cases where the role was granted using the internal {AccessControl-_grantRole}.
     */
    event RoleGranted(bytes32 indexed role, address indexed account, address indexed sender);

    /**
     * @dev Emitted when `account` is revoked `role`.
     *
     * `sender` is the account that originated the contract call:
     *   - if using `revokeRole`, it is the admin role bearer
     *   - if using `renounceRole`, it is the role bearer (i.e. `account`)
     */
    event RoleRevoked(bytes32 indexed role, address indexed account, address indexed sender);

    /**
     * @dev Returns `true` if `account` has been granted `role`.
     */
    function hasRole(bytes32 role, address account) external view returns (bool);

    /**
     * @dev Returns the admin role that controls `role`. See {grantRole} and
     * {revokeRole}.
     *
     * To change a role's admin, use {AccessControl-_setRoleAdmin}.
     */
    function getRoleAdmin(bytes32 role) external view returns (bytes32);

    /**
     * @dev Grants `role` to `account`.
     *
     * If `account` had not been already granted `role`, emits a {RoleGranted}
     * event.
     *
     * Requirements:
     *
     * - the caller must have ``role``'s admin role.
     */
    function grantRole(bytes32 role, address account) external;

    /**
     * @dev Revokes `role` from `account`.
     *
     * If `account` had been granted `role`, emits a {RoleRevoked} event.
     *
     * Requirements:
     *
     * - the caller must have ``role``'s admin role.
     */
    function revokeRole(bytes32 role, address account) external;

    /**
     * @dev Revokes `role` from the calling account.
     *
     * Roles are often managed via {grantRole} and {revokeRole}: this function's
     * purpose is to provide a mechanism for accounts to lose their privileges
     * if they are compromised (such as when a trusted device is misplaced).
     *
     * If the calling account had been granted `role`, emits a {RoleRevoked}
     * event.
     *
     * Requirements:
     *
     * - the caller must be `callerConfirmation`.
     */
    function renounceRole(bytes32 role, address callerConfirmation) external;
}

File 7 of 10 : Context.sol
// SPDX-License-Identifier: MIT
// OpenZeppelin Contracts (last updated v5.0.1) (utils/Context.sol)

pragma solidity ^0.8.20;

/**
 * @dev Provides information about the current execution context, including the
 * sender of the transaction and its data. While these are generally available
 * via msg.sender and msg.data, they should not be accessed in such a direct
 * manner, since when dealing with meta-transactions the account sending and
 * paying for execution may not be the actual sender (as far as an application
 * is concerned).
 *
 * This contract is only required for intermediate, library-like contracts.
 */
abstract contract Context {
    function _msgSender() internal view virtual returns (address) {
        return msg.sender;
    }

    function _msgData() internal view virtual returns (bytes calldata) {
        return msg.data;
    }

    function _contextSuffixLength() internal view virtual returns (uint256) {
        return 0;
    }
}

File 8 of 10 : ERC165.sol
// SPDX-License-Identifier: MIT
// OpenZeppelin Contracts (last updated v5.1.0) (utils/introspection/ERC165.sol)

pragma solidity ^0.8.20;

import {IERC165} from "./IERC165.sol";

/**
 * @dev Implementation of the {IERC165} interface.
 *
 * Contracts that want to implement ERC-165 should inherit from this contract and override {supportsInterface} to check
 * for the additional interface id that will be supported. For example:
 *
 * ```solidity
 * function supportsInterface(bytes4 interfaceId) public view virtual override returns (bool) {
 *     return interfaceId == type(MyInterface).interfaceId || super.supportsInterface(interfaceId);
 * }
 * ```
 */
abstract contract ERC165 is IERC165 {
    /**
     * @dev See {IERC165-supportsInterface}.
     */
    function supportsInterface(bytes4 interfaceId) public view virtual returns (bool) {
        return interfaceId == type(IERC165).interfaceId;
    }
}

File 9 of 10 : Hashes.sol
// SPDX-License-Identifier: MIT
// OpenZeppelin Contracts (last updated v5.1.0) (utils/cryptography/Hashes.sol)

pragma solidity ^0.8.20;

/**
 * @dev Library of standard hash functions.
 *
 * _Available since v5.1._
 */
library Hashes {
    /**
     * @dev Commutative Keccak256 hash of a sorted pair of bytes32. Frequently used when working with merkle proofs.
     *
     * NOTE: Equivalent to the `standardNodeHash` in our https://github.com/OpenZeppelin/merkle-tree[JavaScript library].
     */
    function commutativeKeccak256(bytes32 a, bytes32 b) internal pure returns (bytes32) {
        return a < b ? _efficientKeccak256(a, b) : _efficientKeccak256(b, a);
    }

    /**
     * @dev Implementation of keccak256(abi.encode(a, b)) that doesn't allocate or expand memory.
     */
    function _efficientKeccak256(bytes32 a, bytes32 b) private pure returns (bytes32 value) {
        assembly ("memory-safe") {
            mstore(0x00, a)
            mstore(0x20, b)
            value := keccak256(0x00, 0x40)
        }
    }
}

File 10 of 10 : IERC165.sol
// SPDX-License-Identifier: MIT
// OpenZeppelin Contracts (last updated v5.1.0) (utils/introspection/IERC165.sol)

pragma solidity ^0.8.20;

/**
 * @dev Interface of the ERC-165 standard, as defined in the
 * https://eips.ethereum.org/EIPS/eip-165[ERC].
 *
 * Implementers can declare support of contract interfaces, which can then be
 * queried by others ({ERC165Checker}).
 *
 * For an implementation, see {ERC165}.
 */
interface IERC165 {
    /**
     * @dev Returns true if this contract implements the interface defined by
     * `interfaceId`. See the corresponding
     * https://eips.ethereum.org/EIPS/eip-165#how-interfaces-are-identified[ERC section]
     * to learn more about how these ids are created.
     *
     * This function call must use less than 30 000 gas.
     */
    function supportsInterface(bytes4 interfaceId) external view returns (bool);
}

Settings
{
  "remappings": [
    "@openzeppelin/contracts/=lib/openzeppelin-contracts/contracts/",
    "@uniswap/v3-periphery/contracts/=lib/v3-periphery/contracts/",
    "ds-test/=lib/openzeppelin-contracts/lib/forge-std/lib/ds-test/src/",
    "forge-std/=lib/forge-std/src/",
    "erc4626-tests/=lib/openzeppelin-contracts/lib/erc4626-tests/",
    "halmos-cheatcodes/=lib/openzeppelin-contracts/lib/halmos-cheatcodes/src/",
    "openzeppelin-contracts/=lib/openzeppelin-contracts/",
    "v3-periphery/=lib/v3-periphery/contracts/"
  ],
  "optimizer": {
    "enabled": true,
    "runs": 200
  },
  "metadata": {
    "useLiteralContent": false,
    "bytecodeHash": "ipfs",
    "appendCBOR": true
  },
  "outputSelection": {
    "*": {
      "*": [
        "evm.bytecode",
        "evm.deployedBytecode",
        "devdoc",
        "userdoc",
        "metadata",
        "abi"
      ]
    }
  },
  "evmVersion": "paris",
  "viaIR": false,
  "libraries": {}
}

Contract Security Audit

Contract ABI

API
[{"inputs":[],"stateMutability":"nonpayable","type":"constructor"},{"inputs":[],"name":"AccessControlBadConfirmation","type":"error"},{"inputs":[{"internalType":"address","name":"account","type":"address"},{"internalType":"bytes32","name":"neededRole","type":"bytes32"}],"name":"AccessControlUnauthorizedAccount","type":"error"},{"anonymous":false,"inputs":[{"indexed":true,"internalType":"bytes32","name":"role","type":"bytes32"},{"indexed":true,"internalType":"bytes32","name":"previousAdminRole","type":"bytes32"},{"indexed":true,"internalType":"bytes32","name":"newAdminRole","type":"bytes32"}],"name":"RoleAdminChanged","type":"event"},{"anonymous":false,"inputs":[{"indexed":true,"internalType":"bytes32","name":"role","type":"bytes32"},{"indexed":true,"internalType":"address","name":"account","type":"address"},{"indexed":true,"internalType":"address","name":"sender","type":"address"}],"name":"RoleGranted","type":"event"},{"anonymous":false,"inputs":[{"indexed":true,"internalType":"bytes32","name":"role","type":"bytes32"},{"indexed":true,"internalType":"address","name":"account","type":"address"},{"indexed":true,"internalType":"address","name":"sender","type":"address"}],"name":"RoleRevoked","type":"event"},{"inputs":[],"name":"DEFAULT_ADMIN_ROLE","outputs":[{"internalType":"bytes32","name":"","type":"bytes32"}],"stateMutability":"view","type":"function"},{"inputs":[],"name":"SETTER_ROLE","outputs":[{"internalType":"bytes32","name":"","type":"bytes32"}],"stateMutability":"view","type":"function"},{"inputs":[{"internalType":"bytes32[][]","name":"_proof","type":"bytes32[][]"},{"internalType":"address[]","name":"_token","type":"address[]"},{"internalType":"uint256[]","name":"_totalClaimableAmount","type":"uint256[]"},{"internalType":"uint256[]","name":"_claimAmount","type":"uint256[]"}],"name":"claim","outputs":[],"stateMutability":"nonpayable","type":"function"},{"inputs":[{"internalType":"address","name":"","type":"address"},{"internalType":"address","name":"","type":"address"}],"name":"claimed","outputs":[{"internalType":"uint256","name":"","type":"uint256"}],"stateMutability":"view","type":"function"},{"inputs":[{"internalType":"address[]","name":"_tokens","type":"address[]"}],"name":"finalTerminate","outputs":[],"stateMutability":"nonpayable","type":"function"},{"inputs":[{"internalType":"bytes32","name":"role","type":"bytes32"}],"name":"getRoleAdmin","outputs":[{"internalType":"bytes32","name":"","type":"bytes32"}],"stateMutability":"view","type":"function"},{"inputs":[{"internalType":"bytes32","name":"role","type":"bytes32"},{"internalType":"address","name":"account","type":"address"}],"name":"grantRole","outputs":[],"stateMutability":"nonpayable","type":"function"},{"inputs":[{"internalType":"bytes32","name":"role","type":"bytes32"},{"internalType":"address","name":"account","type":"address"}],"name":"hasRole","outputs":[{"internalType":"bool","name":"","type":"bool"}],"stateMutability":"view","type":"function"},{"inputs":[{"internalType":"bytes32","name":"role","type":"bytes32"},{"internalType":"address","name":"callerConfirmation","type":"address"}],"name":"renounceRole","outputs":[],"stateMutability":"nonpayable","type":"function"},{"inputs":[{"internalType":"bytes32","name":"role","type":"bytes32"},{"internalType":"address","name":"account","type":"address"}],"name":"revokeRole","outputs":[],"stateMutability":"nonpayable","type":"function"},{"inputs":[],"name":"root","outputs":[{"internalType":"bytes32","name":"","type":"bytes32"}],"stateMutability":"view","type":"function"},{"inputs":[{"internalType":"bytes32","name":"_root","type":"bytes32"}],"name":"setRoot","outputs":[],"stateMutability":"nonpayable","type":"function"},{"inputs":[],"name":"startTerminate","outputs":[],"stateMutability":"nonpayable","type":"function"},{"inputs":[{"internalType":"bytes4","name":"interfaceId","type":"bytes4"}],"name":"supportsInterface","outputs":[{"internalType":"bool","name":"","type":"bool"}],"stateMutability":"view","type":"function"},{"inputs":[],"name":"terminated","outputs":[{"internalType":"bool","name":"","type":"bool"}],"stateMutability":"view","type":"function"},{"inputs":[],"name":"terminatingStartTime","outputs":[{"internalType":"uint256","name":"","type":"uint256"}],"stateMutability":"view","type":"function"}]

6080604052348015600f57600080fd5b506019600033601e565b5060c7565b6000828152602081815260408083206001600160a01b038516845290915281205460ff1660bd576000838152602081815260408083206001600160a01b03861684529091529020805460ff1916600117905560763390565b6001600160a01b0316826001600160a01b0316847f2f8788117e7eff1d82e926ec794901d17c78024a50270940304540a733656f0d60405160405180910390a450600160c1565b5060005b92915050565b610e92806100d66000396000f3fe608060405234801561001057600080fd5b50600436106101005760003560e01c806391d1485411610097578063d547741f11610066578063d547741f14610212578063d84ab3a214610225578063dab5f34014610238578063ebf0c7171461024b57600080fd5b806391d14854146101d9578063a2011b3f146101ec578063a217fddf14610201578063bfe73ec31461020957600080fd5b8063248a9ca3116100d3578063248a9ca3146101885780632f2ff15d146101ab57806336568abe146101be5780633e38ed76146101d157600080fd5b806301ffc9a7146101055780630c9cbf0e1461012d578063194307bf146101665780631b7be5a014610173575b600080fd5b6101186101133660046109b8565b610254565b60405190151581526020015b60405180910390f35b61015861013b3660046109fe565b600460209081526000928352604080842090915290825290205481565b604051908152602001610124565b6003546101189060ff1681565b610186610181366004610b6e565b61028b565b005b610158610196366004610d07565b60009081526020819052604090206001015490565b6101866101b9366004610d20565b6104be565b6101866101cc366004610d20565b6104e9565b610186610521565b6101186101e7366004610d20565b610540565b610158600080516020610e3d83398151915281565b610158600081565b61015860025481565b610186610220366004610d20565b610569565b610186610233366004610d43565b61058e565b610186610246366004610d07565b6106c8565b61015860015481565b60006001600160e01b03198216637965db0b60e01b148061028557506301ffc9a760e01b6001600160e01b03198316145b92915050565b60035460ff16156102d65760405162461bcd60e51b815260206004820152601060248201526f10db185a5b481d195c9b5a5b985d195960821b60448201526064015b60405180910390fd5b835160005b818110156104b65760008582815181106102f7576102f7610d80565b60200260200101519050600085838151811061031557610315610d80565b60200260200101519050600085848151811061033357610333610d80565b6020908102919091018101516040805133938101939093526001600160a01b0386169083015260608201849052915060009060800160408051601f19818403018152828252805160209182012090830152016040516020818303038152906040528051906020012090506103c38a86815181106103b2576103b2610d80565b6020026020010151600154836106e6565b6103ff5760405162461bcd60e51b815260206004820152600d60248201526c24b73b30b634b210383937b7b360991b60448201526064016102cd565b3360009081526004602090815260408083206001600160a01b038816845290915281208054849290610432908490610dac565b90915550503360009081526004602090815260408083206001600160a01b038816845290915290205483101561049b5760405162461bcd60e51b815260206004820152600e60248201526d125b9d985b1a5908185b5bdd5b9d60921b60448201526064016102cd565b6104a68433846106fc565b5050600190920191506102db9050565b505050505050565b6000828152602081905260409020600101546104d9816107fc565b6104e38383610809565b50505050565b6001600160a01b03811633146105125760405163334bd91960e11b815260040160405180910390fd5b61051c828261089b565b505050565b600080516020610e3d833981519152610539816107fc565b5042600255565b6000918252602082815260408084206001600160a01b0393909316845291905290205460ff1690565b600082815260208190526040902060010154610584816107fc565b6104e3838361089b565b600080516020610e3d8339815191526105a6816107fc565b62278d00600254426105b89190610dbf565b116105f95760405162461bcd60e51b81526020600482015260116024820152705374696c6c207465726d696e6174696e6760781b60448201526064016102cd565b60005b82518110156106b6576106ae83828151811061061a5761061a610d80565b60200260200101513385848151811061063557610635610d80565b60209081029190910101516040516370a0823160e01b81523060048201526001600160a01b03909116906370a0823190602401602060405180830381865afa158015610685573d6000803e3d6000fd5b505050506040513d601f19601f820116820180604052508101906106a99190610dd2565b6106fc565b6001016105fc565b50506003805460ff1916600117905550565b600080516020610e3d8339815191526106e0816107fc565b50600155565b6000826106f38584610906565b14949350505050565b604080516001600160a01b038481166024830152604480830185905283518084039091018152606490920183526020820180516001600160e01b031663a9059cbb60e01b17905291516000928392908716916107589190610deb565b6000604051808303816000865af19150503d8060008114610795576040519150601f19603f3d011682016040523d82523d6000602084013e61079a565b606091505b50915091508180156107c45750805115806107c45750808060200190518101906107c49190610e1a565b6107f55760405162461bcd60e51b815260206004820152600260248201526114d560f21b60448201526064016102cd565b5050505050565b6108068133610949565b50565b60006108158383610540565b610893576000838152602081815260408083206001600160a01b03861684529091529020805460ff1916600117905561084b3390565b6001600160a01b0316826001600160a01b0316847f2f8788117e7eff1d82e926ec794901d17c78024a50270940304540a733656f0d60405160405180910390a4506001610285565b506000610285565b60006108a78383610540565b15610893576000838152602081815260408083206001600160a01b0386168085529252808320805460ff1916905551339286917ff6391f5c32d9c69d2a47ea670b442974b53935d1edc7fd64eb21e047a839171b9190a4506001610285565b600081815b8451811015610941576109378286838151811061092a5761092a610d80565b6020026020010151610986565b915060010161090b565b509392505050565b6109538282610540565b6109825760405163e2517d3f60e01b81526001600160a01b0382166004820152602481018390526044016102cd565b5050565b60008183106109a25760008281526020849052604090206109b1565b60008381526020839052604090205b9392505050565b6000602082840312156109ca57600080fd5b81356001600160e01b0319811681146109b157600080fd5b80356001600160a01b03811681146109f957600080fd5b919050565b60008060408385031215610a1157600080fd5b610a1a836109e2565b9150610a28602084016109e2565b90509250929050565b634e487b7160e01b600052604160045260246000fd5b604051601f8201601f1916810167ffffffffffffffff81118282101715610a7057610a70610a31565b604052919050565b600067ffffffffffffffff821115610a9257610a92610a31565b5060051b60200190565b600082601f830112610aad57600080fd5b8135610ac0610abb82610a78565b610a47565b8082825260208201915060208360051b860101925085831115610ae257600080fd5b602085015b83811015610b0657610af8816109e2565b835260209283019201610ae7565b5095945050505050565b600082601f830112610b2157600080fd5b8135610b2f610abb82610a78565b8082825260208201915060208360051b860101925085831115610b5157600080fd5b602085015b83811015610b06578035835260209283019201610b56565b60008060008060808587031215610b8457600080fd5b843567ffffffffffffffff811115610b9b57600080fd5b8501601f81018713610bac57600080fd5b8035610bba610abb82610a78565b8082825260208201915060208360051b850101925089831115610bdc57600080fd5b602084015b83811015610c7d57803567ffffffffffffffff811115610c0057600080fd5b8501603f81018c13610c1157600080fd5b6020810135610c22610abb82610a78565b808282526020820191506020808460051b8601010192508e831115610c4657600080fd5b6040840193505b82841015610c68578335825260209384019390910190610c4d565b86525050602093840193919091019050610be1565b509650505050602085013567ffffffffffffffff811115610c9d57600080fd5b610ca987828801610a9c565b935050604085013567ffffffffffffffff811115610cc657600080fd5b610cd287828801610b10565b925050606085013567ffffffffffffffff811115610cef57600080fd5b610cfb87828801610b10565b91505092959194509250565b600060208284031215610d1957600080fd5b5035919050565b60008060408385031215610d3357600080fd5b82359150610a28602084016109e2565b600060208284031215610d5557600080fd5b813567ffffffffffffffff811115610d6c57600080fd5b610d7884828501610a9c565b949350505050565b634e487b7160e01b600052603260045260246000fd5b634e487b7160e01b600052601160045260246000fd5b8082018082111561028557610285610d96565b8181038181111561028557610285610d96565b600060208284031215610de457600080fd5b5051919050565b6000825160005b81811015610e0c5760208186018101518583015201610df2565b506000920191825250919050565b600060208284031215610e2c57600080fd5b815180151581146109b157600080fdfe61c92169ef077349011ff0b1383c894d86c5f0b41d986366b58a6cf31e93bedaa2646970667358221220b007d95bd977d2f614aa6b9af7e1fecad59735bcb2e9bdf4f2766cd33b355e4d64736f6c634300081a0033

Deployed Bytecode

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

Block Transaction Difficulty Gas Used Reward
View All Blocks Produced

Block Uncle Number Difficulty Gas Used Reward
View All Uncles
Loading...
Loading
Loading...
Loading

Validator Index Block Amount
View All Withdrawals

Transaction Hash Block Value Eth2 PubKey Valid
View All Deposits
Loading...
Loading
[ Download: CSV Export  ]

A contract address hosts a smart contract, which is a set of code stored on the blockchain that runs when predetermined conditions are met. Learn more about addresses in our Knowledge Base.