Skip to content

Latest commit

 

History

History
43 lines (35 loc) · 1.87 KB

README.md

File metadata and controls

43 lines (35 loc) · 1.87 KB

NFT Attack Vectors:

The ERC-721 introduces a standard for NFT, in other words, this type of Token is unique and can have different value than another Token from the same Smart Contract, maybe due to its age, rarity or even something else. Read more about NFT here.

This Repository contains a list of NFT Attack Vectors. The recent rise in popularity of these NFTs is due to a lack of information available both offline and online, making them a popular target for scammers and hackers. Below are some NFT attack vectors which hackers/scammers generally use to exploit. This repository will be actively maintained and updated by QuillAudits.

If you find any attack vectors missing, you can create a pull request and be a contributor of the project.


Serial No. Attack Vectors
1 NFT Swap Scams
2 'Trojan Horse' NFTs
3 Impersonation Scams
4 Rug Pull
5 NFT Duplicity
6 Recovery Scams
7 Wash Trading
8 Flash Loans
9 Spoofing
10 Ramping the Market
11 Fake News
12 Bots
13 Bugs in Platforms
14 Influencer/ Shilling
15 Unlimited Permission on Token Approval
16 Unsafe ERC721 Operations
17 Reward Not Updated
18 Code Exploits
19 Private Key Compromise
20 Airdrop Exploits
21 API Exploits
22 NFT Social Media Hack
23 Phishing Scams
24 Frontend Attacks

References:

Elliptic's Nft and Financial Crime Report