Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Re -creation attack in ERC -1155 -Ackee Blockchain
HACKING NEWS

Re -creation attack in ERC -1155 -Ackee Blockchain

By Crypto FlexsAugust 14, 20252 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Re -creation attack in ERC -1155 -Ackee Blockchain
Share
Facebook Twitter LinkedIn Pinterest Email

Find out how an attacker can use the re-creation vulnerabilities in the ERC-1155 implementation to discharge the Vault Agreement. This practical example shows a real attack scenario.

ERC-1155 is a multi-point standard for managing multiple tokens in a single contract. This flexibility is powerful but creates potential attack vectors through external currencies.

Understanding vulnerable contracts

We will review the simplified safe agreement that shows the re -creation vulnerability. The method of working is as follows.

  • The user creates an etk through the THE create function
  • This NFT can be freely transmitted between users.
  • User payEth function
  • Then NFT holders can do it. withdraw Eth by burning NFT

Below is a vulnerable safe agreement.

Vulnerability exploits

The vulnerability mint External call of function IERC1155Receiver(to).onERC1155Received(). This call occurs before the update fnftsCreated Create a counter and re -creation opportunity.

Attack vector

The attacker uses two main contract functions.

  • that id_to_required_eth(nft_id) Mapping controls the amount of ETH.
  • that nft_price(nft_id) Set the price per individual NFT

Attack stage

1. Telephone create big nftAmount But it’s small value
2. Ree center with small things in Mint Callback nftAmount But big value
3. This is set high nft_price(nft_id) For all NFT
4. withdraw the reception. total_nfts * high_price ETH

Detailed attack flow

Let’s classify the attack stage step by step.

  1. Early creation
    • Attacker create(1000, 1 wei)
    • Vault Mints 1000 nfts ID = k (getNextId()))
  2. Re -creation attack
    • during onERC1155Received() Callback:
    • Attacker create(1, 1 ether)
    • same nft_id (k) Is used (not updated in the counter)
    • set nft_price(k) = 1 ether
  3. Profit extraction
    • The attacker is unlocked with 1 eth
    • Withdraw all 1001 NFT
    • 1001 ETH (1001 NFTS * 1 ETH price) received

Attacker

Concept proof

Below is a complete attack using Wake Testing Framework.

If you run this exploitation, the safe will be successfully drained.

Prevention of attack

Two main approaches can prevent these vulnerabilities.

  1. Inspection effect interaction pattern
    • Update the status variable before making an external call
    • This is a recommended approach.
  2. Re -creation guard
    • Use ReENTRANCYGUARD of Openzeppelin
    • Add a modifier to prevent re -entry call

The fixing implementation is as follows.

Main takeout

  • The external currency of the ERC standard can create an unexpected recreational vector.
  • The main variable shared over the contract requires careful handling.
  • Always update your condition before external currency
  • Consider using REENTRANTRANTRANCY Guards as an additional safety measure

Additional reading

Navigate the ReEntrancy example repository for more attack vectors.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

BNB Chain Launches New Stablecoin for Large-Scale Applications

January 9, 2026

Wake Arena: The AI-Driven Audit Service

January 7, 2026

Cryptocurrency Wills and Trusts – Vault12

January 5, 2026
Add A Comment

Comments are closed.

Recent Posts

BNB Chain Launches New Stablecoin for Large-Scale Applications

January 9, 2026

Rain Raises $250M Series C To Scale Stablecoin-Powered Payments Infrastructure For Global Enterprises

January 9, 2026

Truebit protocol hack exposes DeFi security risks as TRU token collapses

January 9, 2026

Impact of ECC team withdrawal on Zcash (ZEC)

January 8, 2026

Binance and Coinbase Suddenly Add Support for New ZK Proof Altcoins

January 8, 2026

BitMEX Launches Equity Perps for 24/7 Stock Trading

January 8, 2026

Bitcoin price plummets to $90,000 as New Year bounce falters

January 7, 2026

Wake Arena: The AI-Driven Audit Service

January 7, 2026

7 Best DeFi Dashboards for 2026 (DeFi Portfolio Tracking)

January 7, 2026

When You Look Into The Transition To New Crypto-based Projects

January 7, 2026

How To Choose The App For Crypto Trading In Bitcoin And Trade Safely

January 7, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

BNB Chain Launches New Stablecoin for Large-Scale Applications

January 9, 2026

Rain Raises $250M Series C To Scale Stablecoin-Powered Payments Infrastructure For Global Enterprises

January 9, 2026

Truebit protocol hack exposes DeFi security risks as TRU token collapses

January 9, 2026
Most Popular

Pro-Crypto SEC Commissioner Challenges Agency’s ‘Come in and Register’ Petition for Companies

March 7, 2024

Tiny Pepe, Big Dreams: Memecoin explodes and snow dominates the doghouse.

May 23, 2024

Ethereum could target $3,400 if it breaks bullish pattern – Details

October 16, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.