Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Re -creation attack in ERC -1155 -Ackee Blockchain
HACKING NEWS

Re -creation attack in ERC -1155 -Ackee Blockchain

By Crypto FlexsAugust 14, 20252 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Re -creation attack in ERC -1155 -Ackee Blockchain
Share
Facebook Twitter LinkedIn Pinterest Email

Find out how an attacker can use the re-creation vulnerabilities in the ERC-1155 implementation to discharge the Vault Agreement. This practical example shows a real attack scenario.

ERC-1155 is a multi-point standard for managing multiple tokens in a single contract. This flexibility is powerful but creates potential attack vectors through external currencies.

Understanding vulnerable contracts

We will review the simplified safe agreement that shows the re -creation vulnerability. The method of working is as follows.

  • The user creates an etk through the THE create function
  • This NFT can be freely transmitted between users.
  • User payEth function
  • Then NFT holders can do it. withdraw Eth by burning NFT

Below is a vulnerable safe agreement.

Vulnerability exploits

The vulnerability mint External call of function IERC1155Receiver(to).onERC1155Received(). This call occurs before the update fnftsCreated Create a counter and re -creation opportunity.

Attack vector

The attacker uses two main contract functions.

  • that id_to_required_eth(nft_id) Mapping controls the amount of ETH.
  • that nft_price(nft_id) Set the price per individual NFT

Attack stage

1. Telephone create big nftAmount But it’s small value
2. Ree center with small things in Mint Callback nftAmount But big value
3. This is set high nft_price(nft_id) For all NFT
4. withdraw the reception. total_nfts * high_price ETH

Detailed attack flow

Let’s classify the attack stage step by step.

  1. Early creation
    • Attacker create(1000, 1 wei)
    • Vault Mints 1000 nfts ID = k (getNextId()))
  2. Re -creation attack
    • during onERC1155Received() Callback:
    • Attacker create(1, 1 ether)
    • same nft_id (k) Is used (not updated in the counter)
    • set nft_price(k) = 1 ether
  3. Profit extraction
    • The attacker is unlocked with 1 eth
    • Withdraw all 1001 NFT
    • 1001 ETH (1001 NFTS * 1 ETH price) received

Attacker

Concept proof

Below is a complete attack using Wake Testing Framework.

If you run this exploitation, the safe will be successfully drained.

Prevention of attack

Two main approaches can prevent these vulnerabilities.

  1. Inspection effect interaction pattern
    • Update the status variable before making an external call
    • This is a recommended approach.
  2. Re -creation guard
    • Use ReENTRANCYGUARD of Openzeppelin
    • Add a modifier to prevent re -entry call

The fixing implementation is as follows.

Main takeout

  • The external currency of the ERC standard can create an unexpected recreational vector.
  • The main variable shared over the contract requires careful handling.
  • Always update your condition before external currency
  • Consider using REENTRANTRANTRANCY Guards as an additional safety measure

Additional reading

Navigate the ReEntrancy example repository for more attack vectors.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

BNB Chain Launches New Stablecoin for Large-Scale Applications

January 9, 2026

Wake Arena: The AI-Driven Audit Service

January 7, 2026

Cryptocurrency Wills and Trusts – Vault12

January 5, 2026
Add A Comment

Comments are closed.

Recent Posts

Onchain Perps Hit $12 Trillion, Hyperliquid and Rivals Redefine 2025

January 10, 2026

Best Cryptocurrency Betting Platforms in 2026: Sports, Esports and Live Markets

January 10, 2026

Asset manager VanEck explains how one Bitcoin could be worth $2.9 million by 2050.

January 10, 2026

BNB Chain Launches New Stablecoin for Large-Scale Applications

January 9, 2026

Rain Raises $250M Series C To Scale Stablecoin-Powered Payments Infrastructure For Global Enterprises

January 9, 2026

Truebit protocol hack exposes DeFi security risks as TRU token collapses

January 9, 2026

Impact of ECC team withdrawal on Zcash (ZEC)

January 8, 2026

Binance and Coinbase Suddenly Add Support for New ZK Proof Altcoins

January 8, 2026

BitMEX Launches Equity Perps for 24/7 Stock Trading

January 8, 2026

Bitcoin price plummets to $90,000 as New Year bounce falters

January 7, 2026

Wake Arena: The AI-Driven Audit Service

January 7, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Onchain Perps Hit $12 Trillion, Hyperliquid and Rivals Redefine 2025

January 10, 2026

Best Cryptocurrency Betting Platforms in 2026: Sports, Esports and Live Markets

January 10, 2026

Asset manager VanEck explains how one Bitcoin could be worth $2.9 million by 2050.

January 10, 2026
Most Popular

The best resource for traders to improve their knowledge

December 31, 2024

Mt. Gox, Bitcoin, BCH Near 2024 Lows: Analysts Still Say ‘HODL’

July 8, 2024

Solana Rally Sol Token Lock and Memecoin Debline

May 30, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.