Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Re -creation attack in ERC -1155 -Ackee Blockchain
HACKING NEWS

Re -creation attack in ERC -1155 -Ackee Blockchain

By Crypto FlexsAugust 14, 20252 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Re -creation attack in ERC -1155 -Ackee Blockchain
Share
Facebook Twitter LinkedIn Pinterest Email

Find out how an attacker can use the re-creation vulnerabilities in the ERC-1155 implementation to discharge the Vault Agreement. This practical example shows a real attack scenario.

ERC-1155 is a multi-point standard for managing multiple tokens in a single contract. This flexibility is powerful but creates potential attack vectors through external currencies.

Understanding vulnerable contracts

We will review the simplified safe agreement that shows the re -creation vulnerability. The method of working is as follows.

  • The user creates an etk through the THE create function
  • This NFT can be freely transmitted between users.
  • User payEth function
  • Then NFT holders can do it. withdraw Eth by burning NFT

Below is a vulnerable safe agreement.

Vulnerability exploits

The vulnerability mint External call of function IERC1155Receiver(to).onERC1155Received(). This call occurs before the update fnftsCreated Create a counter and re -creation opportunity.

Attack vector

The attacker uses two main contract functions.

  • that id_to_required_eth(nft_id) Mapping controls the amount of ETH.
  • that nft_price(nft_id) Set the price per individual NFT

Attack stage

1. Telephone create big nftAmount But it’s small value
2. Ree center with small things in Mint Callback nftAmount But big value
3. This is set high nft_price(nft_id) For all NFT
4. withdraw the reception. total_nfts * high_price ETH

Detailed attack flow

Let’s classify the attack stage step by step.

  1. Early creation
    • Attacker create(1000, 1 wei)
    • Vault Mints 1000 nfts ID = k (getNextId()))
  2. Re -creation attack
    • during onERC1155Received() Callback:
    • Attacker create(1, 1 ether)
    • same nft_id (k) Is used (not updated in the counter)
    • set nft_price(k) = 1 ether
  3. Profit extraction
    • The attacker is unlocked with 1 eth
    • Withdraw all 1001 NFT
    • 1001 ETH (1001 NFTS * 1 ETH price) received

Attacker

Concept proof

Below is a complete attack using Wake Testing Framework.

If you run this exploitation, the safe will be successfully drained.

Prevention of attack

Two main approaches can prevent these vulnerabilities.

  1. Inspection effect interaction pattern
    • Update the status variable before making an external call
    • This is a recommended approach.
  2. Re -creation guard
    • Use ReENTRANCYGUARD of Openzeppelin
    • Add a modifier to prevent re -entry call

The fixing implementation is as follows.

Main takeout

  • The external currency of the ERC standard can create an unexpected recreational vector.
  • The main variable shared over the contract requires careful handling.
  • Always update your condition before external currency
  • Consider using REENTRANTRANTRANCY Guards as an additional safety measure

Additional reading

Navigate the ReEntrancy example repository for more attack vectors.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Why the Unleash Protocol hack occurred due to governance failure

February 20, 2026

Solana Schools 2025 Summary

February 16, 2026

Cryptocurrency Inheritance Update: January 2026

February 14, 2026
Add A Comment

Comments are closed.

Recent Posts

Best Altcoins to Buy Now as Bitcoin Is Watching Important Moving Averages

February 22, 2026

As privacy talk heats up, Dash integrates Zcash privacy pool.

February 22, 2026

Cardano (ADA) Bears Active — Token Risks Another Downside

February 21, 2026

Spot Bitcoin ​ETF records total net withdrawals of $3.8 billion over 5 weeks

February 21, 2026

Why the Unleash Protocol hack occurred due to governance failure

February 20, 2026

IP Strategy Announces Share Repurchase Program of Up to 1 Million Shares

February 20, 2026

Phemex Completes Full Integration Of Ondo Finance Tokenized Equity Suite

February 20, 2026

Unicity Labs Raises $3M To Scale Autonomous Agentic Marketplaces

February 19, 2026

Web3 Advertising Grows Up What Brands Will Demand In 2026

February 19, 2026

Are Sweeps Coins A Cryptocurrency Or Something Else?

February 19, 2026

XRP gains momentum as Arizona adds XRP to state cryptocurrency reserves.

February 19, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Best Altcoins to Buy Now as Bitcoin Is Watching Important Moving Averages

February 22, 2026

As privacy talk heats up, Dash integrates Zcash privacy pool.

February 22, 2026

Cardano (ADA) Bears Active — Token Risks Another Downside

February 21, 2026
Most Popular

Staking vs. Yield Farming: Which Strategy is Right for You?

September 8, 2024

Coinbase (COIN), Marathon (MARA), and Riot fell nearly 10% as the price of Bitcoin fell to $42,000.

December 29, 2023

The Ethereum Foundation and Wanxiang Blockchain Labs announced a blockbuster event combining Devcon2 and the 2nd Global Blockchain Summit in Shanghai from September 19-24, 2016.

April 13, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.