Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Re -creation attack in ERC -1155 -Ackee Blockchain
HACKING NEWS

Re -creation attack in ERC -1155 -Ackee Blockchain

By Crypto FlexsAugust 14, 20252 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Re -creation attack in ERC -1155 -Ackee Blockchain
Share
Facebook Twitter LinkedIn Pinterest Email

Find out how an attacker can use the re-creation vulnerabilities in the ERC-1155 implementation to discharge the Vault Agreement. This practical example shows a real attack scenario.

ERC-1155 is a multi-point standard for managing multiple tokens in a single contract. This flexibility is powerful but creates potential attack vectors through external currencies.

Understanding vulnerable contracts

We will review the simplified safe agreement that shows the re -creation vulnerability. The method of working is as follows.

  • The user creates an etk through the THE create function
  • This NFT can be freely transmitted between users.
  • User payEth function
  • Then NFT holders can do it. withdraw Eth by burning NFT

Below is a vulnerable safe agreement.

Vulnerability exploits

The vulnerability mint External call of function IERC1155Receiver(to).onERC1155Received(). This call occurs before the update fnftsCreated Create a counter and re -creation opportunity.

Attack vector

The attacker uses two main contract functions.

  • that id_to_required_eth(nft_id) Mapping controls the amount of ETH.
  • that nft_price(nft_id) Set the price per individual NFT

Attack stage

1. Telephone create big nftAmount But it’s small value
2. Ree center with small things in Mint Callback nftAmount But big value
3. This is set high nft_price(nft_id) For all NFT
4. withdraw the reception. total_nfts * high_price ETH

Detailed attack flow

Let’s classify the attack stage step by step.

  1. Early creation
    • Attacker create(1000, 1 wei)
    • Vault Mints 1000 nfts ID = k (getNextId()))
  2. Re -creation attack
    • during onERC1155Received() Callback:
    • Attacker create(1, 1 ether)
    • same nft_id (k) Is used (not updated in the counter)
    • set nft_price(k) = 1 ether
  3. Profit extraction
    • The attacker is unlocked with 1 eth
    • Withdraw all 1001 NFT
    • 1001 ETH (1001 NFTS * 1 ETH price) received

Attacker

Concept proof

Below is a complete attack using Wake Testing Framework.

If you run this exploitation, the safe will be successfully drained.

Prevention of attack

Two main approaches can prevent these vulnerabilities.

  1. Inspection effect interaction pattern
    • Update the status variable before making an external call
    • This is a recommended approach.
  2. Re -creation guard
    • Use ReENTRANCYGUARD of Openzeppelin
    • Add a modifier to prevent re -entry call

The fixing implementation is as follows.

Main takeout

  • The external currency of the ERC standard can create an unexpected recreational vector.
  • The main variable shared over the contract requires careful handling.
  • Always update your condition before external currency
  • Consider using REENTRANTRANTRANCY Guards as an additional safety measure

Additional reading

Navigate the ReEntrancy example repository for more attack vectors.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Message signatures in wake tests: EIP-712, EIP-191, and hashes

December 14, 2025

Ghouls can be guardians too

December 12, 2025

Silk Road cryptocurrency activity has resurfaced as dormant Bitcoin wallets become active again.

December 10, 2025
Add A Comment

Comments are closed.

Recent Posts

Gensyn Launches $AI Token Sale On Sonar

December 15, 2025

Aster Launches Shield Mode, A Protected High-Performance Trading Mode For On-Chain Traders

December 15, 2025

Geode Lists GEODE Coin On BitMart.com As Part Of Ongoing Decentralized Infrastructure Expansion

December 15, 2025

METH Protocol Accelerates Fast, On-Demand ETH Redemptions And Yield Deployment Via Buffer Pool Enhancement

December 15, 2025

Esports Betting with Cryptocurrency: Bitcoin Betting Platform Built for CS2, LoL, and Valorant

December 15, 2025

Cryptocurrency Regulation Enters the “Banking Era” With the Emergence of Trust Banks, How Can Ordinary People Seize the Next Wave of Compliance Benefits?

December 15, 2025

What is stability? – Bitfinex Blog

December 14, 2025

Solana price is stuck in a narrow range awaiting a clear catalyst.

December 14, 2025

Message signatures in wake tests: EIP-712, EIP-191, and hashes

December 14, 2025

New Pre-Market Phase Ahead Of TGE

December 14, 2025

Phantom integrates the Kalshi prediction market as cryptocurrency wallets expand into event trading.

December 14, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Gensyn Launches $AI Token Sale On Sonar

December 15, 2025

Aster Launches Shield Mode, A Protected High-Performance Trading Mode For On-Chain Traders

December 15, 2025

Geode Lists GEODE Coin On BitMart.com As Part Of Ongoing Decentralized Infrastructure Expansion

December 15, 2025
Most Popular

BNB rally faltered. Is $500 the next downside target?

June 30, 2024

Visually Memorable Seed Phrases – Bitcoin Stack Exchange

June 8, 2024

The innovative sequencing model aims to redistribute MEV from the blockchain.

March 20, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.