Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • HACKING
  • SLOT
  • CASINO
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • HACKING
  • SLOT
  • CASINO
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Cross chain re -creation attack -Ackee Blockchain
HACKING NEWS

Cross chain re -creation attack -Ackee Blockchain

By Crypto FlexsMarch 19, 20253 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Cross chain re -creation attack -Ackee Blockchain
Share
Facebook Twitter LinkedIn Pinterest Email

Cross chain re -creation attacks are used to call smart contract functions across different chains and cause money loss in smart contracts. Learn more about this vulnerabilities for example to keep the code open to the attacker.

Vulnerability

The events emitted from the inappropriate position of the code can create a crosschain re -creation vulnerability. These events are still incomplete in the original chain, but can be used to trigger the calls of other chains. You can find an example code to run in the environment.

Example contract

This is an example of a vulnerable contract. You can place it in multiple chains. Meeting only one designated chain while enabling transmission tokens between chains. This means only one token of the same tokenId It must exist in several chains.

By phone crossChainTransfer Function, users can transfer tokens. This burns the token in the source chain. Movement emits messages relayed by the validated test machine off chain. Then this validation machine calls the function of the target chain to finish the designated token. tokenId.

Attack example

The vulnerability is in the mining process. There is an external call when warning _safeMint Check the possibility of locked tokens. yes, tokenIds++; later _safeMint Function call.

Attackers can exploit it by performing:

While in an external call, that is onERC721Received Functions, they can call crossChainTransfer Function and phone mint again.

This creates a situation tokenIds++; Run twice to make the same tokenId Tokens in various chains.

Attacker

Wake code

In the test environment, there are two chains: chain1 and chain2. at test_expected_usage Functions, we are sending tokens from Chain 1 to Chain2 via the relay. The relay captures the events emitted from the chain1 and delivers the event to Chain2 by message. This call is only allowed by an effective test device, so it is used to use it through the validation test of each chain using use. from_=validator_chain1 etc.

Wake output

We can make the same tokenId Two chains tokens.

prevention

Inspection effect interaction

This preventive method allows the status change to be completed before the external call.

Re -creation guard

REENTRANTRANTRANTRANCY Guards offers additional protection for this type of attack.

Post -call verification

You can check the value tokenIds after _safeMint The function call is completed and the transaction is reversed tokenIds Although unexpectedly changed, this approach adds complexity.

conclusion

It is important to recognize the external call of the function. Because they make a door for re -creation attacks. Always consider which features can be triggered during these external calls.

For more examples, read the reentrancy example GitHub repository. There are other types of re -creation attacks and protocol re -opening, and blogs have a deep dive for some of them.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Green Hood Contracts Thanksgiving Summary -Ackee Blockchain

September 17, 2025

Binance’s new Defi Initiative sparked Rollish Momentum, and BNB hit a new ATH of more than $ 900.

September 13, 2025

Manual guide: beginner guide

September 11, 2025
Add A Comment

Comments are closed.

Recent Posts

Green Hood Contracts Thanksgiving Summary -Ackee Blockchain

September 17, 2025

BetFury Is At SBC Summit Lisbon 2025: Affiliate Growth In Focus

September 17, 2025

FED Mining’s Cloud Mining Platform Is Helping Users Earn $8,800 Per Day, And XRP’s Growth Is Driving Market Enthusiasm.

September 17, 2025

Stablecoin Holdings Drop As Investors Pivot To SOL, XRP, And Altcoins

September 17, 2025

Flipster Partners With WLFI To Advance Global Stablecoin Adoption Through USD1 Integration

September 17, 2025

Zircuit Launches $495K Grants Program To Accelerate Web3 Super Apps

September 16, 2025

Kintsu Launches SHYPE On Hyperliquid

September 16, 2025

New Cryptocurrency Mutuum Finance (MUTM) Raises $15.8M As Phase 6 Reaches 40%

September 16, 2025

How XRP Enthusiasts Can Earn $15k/Day

September 16, 2025

Bringing 1R0R To R0AR Chain Unlocks New Incentives

September 16, 2025

As the Air drop recipient is sold, the infinite price is 46% conflict after Binance listing.

September 16, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Green Hood Contracts Thanksgiving Summary -Ackee Blockchain

September 17, 2025

BetFury Is At SBC Summit Lisbon 2025: Affiliate Growth In Focus

September 17, 2025

FED Mining’s Cloud Mining Platform Is Helping Users Earn $8,800 Per Day, And XRP’s Growth Is Driving Market Enthusiasm.

September 17, 2025
Most Popular

AI-Based Robotic Surgery: A Revolution in Autonomous Operations

December 11, 2024

VENOM FOUNDATION achieved 150K TPS in the closed network stress test and opened a way for 2025 Mainnet upgrade.

May 23, 2025

Within a week, Donald Trump will decide Ross Ulbricht’s fate

January 14, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.