🔵 Audita’s Vulnerability Highlights: Part 3

Audita
1 min readJul 28, 2023

--

Learn about notable Web3 vulnerabilities found by our experts ⬇️

CRITICAL: NFT Marketplace argument manipulation

Marketplace addresses can be provided by anyone.
If there is setApprovalForAll, a hacker could create his own fake market in order to steal NFTs.

đź’ˇ This malicious market implementation could override the listItem function to do safeTransferFrom to his address.

Because the contract pre-approves what market is provided to it, the fake market could steal the NFTs.

Refer to the hack simulation below using HardHat and TypeScript:

Hack Simulation

There is a very simple fix to this attack vector:

Provide marketPlace in the constructor so no one can manipulate it.
An attacker can no longer steal NFTs through a malicious fake market!

We hope you find PART 3 useful for your safety quest đź‘€

PART 4 of Audita’s Vulnerability Highlights will be out soon.
Tune in on our Twitter @AuditaSecurity 🔥

Stay safu!
Audita’s Team

--

--