Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SLOT
  • CASINO
  • SPORTSBET
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SLOT
  • CASINO
  • SPORTSBET
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Re -creation attack in ERC -1155 -Ackee Blockchain
HACKING NEWS

Re -creation attack in ERC -1155 -Ackee Blockchain

By Crypto FlexsAugust 14, 20252 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Re -creation attack in ERC -1155 -Ackee Blockchain
Share
Facebook Twitter LinkedIn Pinterest Email

Find out how an attacker can use the re-creation vulnerabilities in the ERC-1155 implementation to discharge the Vault Agreement. This practical example shows a real attack scenario.

ERC-1155 is a multi-point standard for managing multiple tokens in a single contract. This flexibility is powerful but creates potential attack vectors through external currencies.

Understanding vulnerable contracts

We will review the simplified safe agreement that shows the re -creation vulnerability. The method of working is as follows.

  • The user creates an etk through the THE create function
  • This NFT can be freely transmitted between users.
  • User payEth function
  • Then NFT holders can do it. withdraw Eth by burning NFT

Below is a vulnerable safe agreement.

Vulnerability exploits

The vulnerability mint External call of function IERC1155Receiver(to).onERC1155Received(). This call occurs before the update fnftsCreated Create a counter and re -creation opportunity.

Attack vector

The attacker uses two main contract functions.

  • that id_to_required_eth(nft_id) Mapping controls the amount of ETH.
  • that nft_price(nft_id) Set the price per individual NFT

Attack stage

1. Telephone create big nftAmount But it’s small value
2. Ree center with small things in Mint Callback nftAmount But big value
3. This is set high nft_price(nft_id) For all NFT
4. withdraw the reception. total_nfts * high_price ETH

Detailed attack flow

Let’s classify the attack stage step by step.

  1. Early creation
    • Attacker create(1000, 1 wei)
    • Vault Mints 1000 nfts ID = k (getNextId()))
  2. Re -creation attack
    • during onERC1155Received() Callback:
    • Attacker create(1, 1 ether)
    • same nft_id (k) Is used (not updated in the counter)
    • set nft_price(k) = 1 ether
  3. Profit extraction
    • The attacker is unlocked with 1 eth
    • Withdraw all 1001 NFT
    • 1001 ETH (1001 NFTS * 1 ETH price) received

Attacker

Concept proof

Below is a complete attack using Wake Testing Framework.

If you run this exploitation, the safe will be successfully drained.

Prevention of attack

Two main approaches can prevent these vulnerabilities.

  1. Inspection effect interaction pattern
    • Update the status variable before making an external call
    • This is a recommended approach.
  2. Re -creation guard
    • Use ReENTRANCYGUARD of Openzeppelin
    • Add a modifier to prevent re -entry call

The fixing implementation is as follows.

Main takeout

  • The external currency of the ERC standard can create an unexpected recreational vector.
  • The main variable shared over the contract requires careful handling.
  • Always update your condition before external currency
  • Consider using REENTRANTRANTRANCY Guards as an additional safety measure

Additional reading

Navigate the ReEntrancy example repository for more attack vectors.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Lombard Liquid Bitcoin Summary Summary

October 3, 2025

UXLINK attackers mix stolen assets and have drained $ 43 million by phishing

September 29, 2025

YouTube Star MR BEAST Scoops 3 Days Purchase SPREE ASTER in SPREE

September 27, 2025
Add A Comment

Comments are closed.

Recent Posts

Solana Future Surge as the institution induces the open interest for the best record.

October 4, 2025

Free bitcoin.in app withdrawal request My satoshi

October 3, 2025

If this happens, you can see a huge price of $ 1.9.

October 3, 2025

Lombard Liquid Bitcoin Summary Summary

October 3, 2025

Easily Earn $5588+ In Passive Income Every Day With PlanMining Cloud Mining

October 3, 2025

The reason why hyper clicade wins aster with Perp DEX, which can be most invested.

October 3, 2025

Psy Protocol Testnet Combines Internet Scale And Speed With Bitcoin-Level Security

October 2, 2025

Eightco Holdings Inc. ($ORBS) Expands Investor Access With Options Trading

October 2, 2025

How To Use A Bitcoin Heatmap For Smarter Trading Decisions

October 2, 2025

Pioneer the future of digital innovation throughout Web2 and Web3

October 2, 2025

Codego Launches Whitelabel Devices Bringing Tokens Into Daily Life

October 2, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Solana Future Surge as the institution induces the open interest for the best record.

October 4, 2025

Free bitcoin.in app withdrawal request My satoshi

October 3, 2025

If this happens, you can see a huge price of $ 1.9.

October 3, 2025
Most Popular

Coinbase partners with payments company Stripe

June 27, 2024

25% profit as XRP price ‘cup and handle’ hint leak is returned

February 17, 2025

Crypto Analyst Says Big Ethereum Competitor Is on the Verge of a Massive Selloff – Here’s Why

September 26, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.