#mint
#nft
#reenter
Is the Check Effects Interactions pattern followed correctly?
An attacker can reenter the MinterContract::mint function and mint the entire collection supply. Exploitation Steps: 1. Attacker calls MinterContract::mint with a malicious contract as the receiver. 2. The malicious contract executes a crafted onERC721Received(). 3. MinterContract::mint invokes NextGenCore::mint, which uses _safeMint() internally. 4. _safeMint() calls _recipient.onERC721Received(), leading to the minting of the complete collection supply.
by RareSkills
by Jeiwan
by RareSkills
by RareSkills
by Andreas M. Antonopoulos, Gavin Wood
by Micah Dameron
Compare execution layer differences between chains
Dive deep into the storage of any contract