A well-known sports digital collectibles project has exposed a serious vulnerability in smart contracts, warning the industry's safety awareness.

robot
Abstract generation in progress

Recently, a significant sports digital collectible issuance has attracted widespread attention in the industry. However, some security experts have discovered serious vulnerabilities in the project's smart contracts, which could be exploited by malicious actors for costless minting and profit.

This vulnerability mainly stems from improper design of the signature verification mechanism for whitelist users. The contract failed to ensure the exclusivity and one-time use of whitelist signatures. As a result, potential attackers may reuse the signatures of other whitelist users to mint collectibles.

From the publicly available contract code, it is clear that the verify function has obvious design flaws. First, it does not include the address of the transaction sender in the signature verification process. Second, it lacks a mechanism to prevent signature reuse. These should be basic security practices in smart contract development and are considered entry-level knowledge in software security.

Surprisingly, such a fundamental security vulnerability has appeared in a highly publicized large project. This not only exposes the project's negligence in contract security auditing but also highlights that the entire industry still has a long way to go in standardizing smart contract development and raising security awareness.

This event serves as a reminder that regardless of the scale and influence of a project, security is always the primary consideration in the blockchain and digital collectibles space. For developers, it is essential to strictly adhere to security best practices, conduct comprehensive code audits, and perform vulnerability testing. For users, it is also important to remain vigilant about the security of any digital collectibles project before participating and to conduct necessary investigations and assessments.

In the future, as the industry continues to mature, we hope to see more project parties, developers, and security experts working together to establish more robust standards for smart contracts development and auditing, to ensure the security and sustainable development of the digital collectibles ecosystem.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 7
  • Share
Comment
0/400
TheMemefathervip
· 11h ago
play people for suckers and run, users have seen through it early.
View OriginalReply0
DefiPlaybookvip
· 11h ago
According to extensive project analysis samples, re-signing issues can lead to a loss of funds of up to 65.8%.
View OriginalReply0
RugpullSurvivorvip
· 11h ago
It got dark again, but good days are still ahead.
View OriginalReply0
MetaMiseryvip
· 11h ago
This security awareness is really too low.
View OriginalReply0
ReverseFOMOguyvip
· 11h ago
Allowlist signatures can exploit vulnerabilities, like trying to lift a wall made of mud.
View OriginalReply0
ShibaOnTheRunvip
· 12h ago
Another flash crash is scheduled, right?
View OriginalReply0
Hash_Banditvip
· 12h ago
just like mining in 2013... zero hashrate security smh
Reply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)