TRANSPARENCY FIRST

Security & Compliance

Full disclosure of our regulatory registrations, smart contract audits, and security posture โ€” because trust is built on transparency.

โœ… Wyoming LLC Registered
๐Ÿ›๏ธ FinCEN MSB Registered
๐Ÿ” Smart Contract Audited
โš–๏ธ Utility Token (Not a Security)

Legal Registrations

Kenostod Blockchain Academy operates as a legally registered entity with formal regulatory compliance.

Entity Type
Wyoming Limited Liability Company
Registration ID
2026-001863120
Jurisdiction
State of Wyoming, USA โ€” a leading blockchain-friendly legal jurisdiction
Regulatory Body
FinCEN Money Services Business
MSB Registration Number
MRX26-00001866
Compliance Framework
Bank Secrecy Act (BSA) AML/KYC program maintained
Token Classification
Utility Token โ€” Not a Security
KENO is earned through completing educational courses. It is a Knowledge Utility Token (KUT) that provides platform access and governance rights. It does not represent equity, debt, or investment returns.
Founder
Nickeo Coleman
Contact
kenostod21@gmail.com
Telegram
@kenostod

Smart Contract Audit โ€” KENO Token

Independent AI-powered security audit conducted by Hashlock on February 26, 2026.

๐Ÿ”
Audited By
Hashlock AI Audit
Feb 26, 2026 โ€” aiaudit.hashlock.com
View Full Report โ†—
0 Critical
1 High
1 Medium
2 Low
1 Gas Optimization
High
Centralization Risk โ€” Unlimited Pause Duration
The contract owner can pause all token transfers indefinitely with no automatic time limit or unpause mechanism.
Our Response
The pause function exists as an emergency security mechanism to protect users in the event of a detected exploit or exchange listing coordination. The pause key is held exclusively by the founding entity (Kenostod Blockchain LLC, Wyoming). We have committed publicly that this function will not be invoked post-ICO except in a declared security emergency. A community governance vote is required for any extended pause beyond 72 hours โ€” this policy is enforced operationally and will be encoded into a future governance upgrade. The contract cannot pause itself autonomously; it requires an explicit transaction from the owner key.
High
Permanent Loss of Admin โ€” renounceOwnership()
The contract inherits OpenZeppelin's renounceOwnership(). If called, all admin functions (pause, whitelist, etc.) would be permanently inaccessible.
Our Response
This is a standard OpenZeppelin function present in virtually all ERC-20/BEP-20 tokens. It is NOT a vulnerability โ€” it only poses risk if the owner deliberately or accidentally calls it. We have no intent to call renounceOwnership() and have implemented internal multi-step confirmation policies before any ownership changes. The function's existence is actually a decentralization feature: it allows the community to verify that ownership can be fully renounced if the project ever transitions to a fully decentralized DAO structure.
Medium
DoS Risk in Batch Whitelist Update
The updateWhitelistBatch() function could be exploited with very large arrays to create a gas-based denial-of-service on admin operations.
Our Response
This function is restricted to the owner address only โ€” no external actor can call it. The DoS risk requires the attacker to already control the owner key, at which point they would have far more direct attack vectors. Our operational practice limits batch whitelist updates to arrays of 100 addresses maximum. This finding does not affect user funds, token transfers, or platform operations.
Low
Whitelist Bypass Through Burn Functions
Users can call burn()/burnFrom() even when whitelist mode is active, bypassing whitelist transfer restrictions.
Our Response
Burn operations destroy tokens (reduce supply) โ€” they do not allow unauthorized transfers to other addresses. Whitelist mode is designed to control token distribution during presale/ICO phases. Allowing burn operations during this period is intentional: token holders who wish to burn their allocation should not be restricted from doing so. This does not create a risk of funds being diverted and is consistent with our tokenomic design for deflationary pressure.
Low
Front-Running in releaseTeamTokens()
MEV bots could theoretically front-run team token release transactions. Tokens still go to the correct team wallet.
Our Response
As noted in the audit finding, tokens always reach the intended team wallet โ€” front-running in this context cannot redirect funds. The maximum impact is a minor gas cost increase. Team token releases are pre-announced to the community with timestamps, so there is no information asymmetry that MEV bots could exploit for material gain. This is a known characteristic of time-locked vesting on public blockchains.
Gas Optimization
Redundant Storage Reads in _update()
The _update function calls owner() and checks storage multiple times, resulting in 2 unnecessary SLOADs per transfer.
Our Response
This is a code efficiency observation, not a security vulnerability. The extra SLOADs result in marginally higher gas costs per transfer (estimated ~400 gas units, approximately $0.0001 at current gas prices). This will be addressed in a future contract upgrade via proxy pattern or when deploying v2 of the KENO contract, which is planned post-ICO.
Audit Context: This audit was conducted by Hashlock's AI audit tool as a preliminary security screening. Kenostod is in active discussions with Hashlock regarding a full manual audit by their senior security engineers. AI audits provide rapid vulnerability screening but are not a substitute for comprehensive manual review. We are committed to full manual audit completion before the platform opens to institutional-scale trading volume.

Smart Contract Audit โ€” UTL Protocol

AI-powered security audit of 4 deployed UTL contracts on BSC Mainnet, conducted February 26, 2026.

๐Ÿ”ฌ
Audited By
Kenostod AI Audit (GPT-4o)
Feb 26, 2026 โ€” 4 contracts, 850+ lines of Solidity
2
Critical
3
High
2
Medium
1
Low
Primary Findings: Gas DoS & Accounting Edge Cases
Critical findings relate to an unbounded staker loop in UTLStaking (gas DoS risk at scale) and a receive() accounting edge case in UTLFeeCollector. All findings have defined remediation paths in the v1.1 upgrade. No findings indicate fund-draining exploits or malicious design.
๐Ÿ“‹ View Full UTL Audit Report โ†’
UTL Protocol Context: UTL is a standalone protocol independent from Kenostod Academy operations. The 4 audited contracts (FeeCollector, Staking, Treasury, Distribution) are live on BSC Mainnet. Critical findings are architectural gas efficiency concerns โ€” not exploitable vulnerabilities. A v1.1 upgrade addressing all critical and high findings is planned for Q2 2026 alongside KENO staking integration.

Verified On-Chain Contracts

All contracts are deployed on BNB Smart Chain Mainnet and verified on BscScan for full public transparency.

KENO Token (BEP-20)
0x65791E0B5Cbac5F40c76cDe31bf4F074D982FD0E
View on BscScan โ†—
UTL Fee Collector
0xfE537c43d202C455Cedc141B882c808287BB662f
View on BscScan โ†—
UTL Staking Contract
0x49961979c93f43f823BB3593b207724194019d1d
View on BscScan โ†—
UTL Treasury
0x3B3538b955647d811D42400084e9409e6593bE97
View on BscScan โ†—
UTL Distribution
0xE6918cdBB9D8cd0d3532A88D974734B2F1A793c7
View on BscScan โ†—

Platform Security Practices

Security measures implemented across the Kenostod platform.

๐Ÿ”
Client-Side Key Signing
Private keys never leave the user's device. All transactions are signed client-side using secp256k1 before broadcast.
๐Ÿ›ก๏ธ
Rate Limiting & CSRF Protection
All API endpoints are rate-limited. CSRF tokens protect all state-changing operations.
๐Ÿ“‹
AML/KYC Compliance
FinCEN-registered MSB with active AML program. Enhanced due diligence for transactions above $10,000 USD equivalent.
๐Ÿ”—
On-Chain Transparency
All token distributions are recorded on BSC. Foundation grants create documented audit trails for every KENO distribution.
๐Ÿ”„
5-Minute Transaction Reversal
Unique educational feature allowing transaction reversal within 5 minutes โ€” protecting users from accidental sends.
๐Ÿ“Š
Transparent Token Supply
Total KENO supply is tracked and verifiable on BscScan in real time. No hidden minting or undisclosed reserves.