Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/safful/nft-attack-vectors

List of Common NFT Attack Vectors.
https://github.com/safful/nft-attack-vectors

defi nft nft-marketplace solidity solidity-codes solidity-contracts

Last synced: 26 days ago
JSON representation

List of Common NFT Attack Vectors.

Awesome Lists containing this project

README

        

# NFT Attack Vectors

The ERC-721 introduces a standard for NFT, in other words, this type of Token is unique and can have different value than another Token from the same Smart Contract, maybe due to its age, rarity or even something else. Read more about NFT [here](https://ethereum.org/en/nft/).

This Repository contains a list of NFT Attack Vectors. The recent rise in popularity of these NFTs is due to a lack of information available both offline and online, making them a popular target for scammers and hackers. Below are some NFT attack vectors which hackers/scammers generally use to exploit.

#### If you find any attack vectors missing, you can create a pull request and be a contributor of the project.

| Serial No. | Attack Vectors |
| ---------- | ---------------------------------------------------- |
| **1** | [NFT Swap Scams](data/1.md) |
| **2** | ['Trojan Horse' NFTs](data/2.md) |
| **3** | [Impersonation Scams](data/3.md) |
| **4** | [Rug Pull](data/4.md) |
| **5** | [NFT Duplicity](data/5.md) |
| **6** | [Recovery Scams](data/6.md) |
| **7** | [Wash Trading](data/7.md) |
| **8** | [Flash Loans](data/8.md) |
| **9** | [Spoofing](data/9.md) |
| **10** | [Ramping the Market](data/10.md) |
| **11** | [Fake News](data/11.md) |
| **12** | [Bots](data/12.md) |
| **13** | [Bugs in Platforms](data/13.md) |
| **14** | [Influencer/ Shilling](data/14.md) |
| **15** | [Unlimited Permission on Token Approval](data/15.md) |
| **16** | [Unsafe ERC721 Operations](data/16.md) |
| **17** | [Reward Not Updated](data/17.md) |
| **18** | [Code Exploits](data/18.md) |
| **19** | [Private Key Compromise](data/19.md) |
| **20** | [Airdrop Exploits](data/20.md) |
| **21** | [API Exploits](data/21.md) |
| **22** | [NFT Social Media Hack](data/22.md) |
| **23** | [Phishing Scams](data/23.md) |
| **24** | [Frontend Attacks](data/24.md) |

---

## References:

[Elliptic's Nft and Financial Crime Report](https://www.elliptic.co/hubfs/NFT%20Report%202022.pdf)