Open hats-bug-reporter[bot] opened 2 months ago
Thank you for your report on the potential Denial-of-Service (DoS) vulnerability in the ERC1155 token minting process. After careful review, we've determined that this is not an issue.
The behavior you've described is actually a core feature of the ERC1155 standard. Contracts need to actively acknowledge their ability to handle ERC1155 tokens. If an avatar (human, organization, or group) is not ERC1155 compatible, it simply won't be able to interact with these tokens. This is not a vulnerability, but a safeguard built into the standard.
We appreciate your attention to potential security risks in our system. Your thorough examination of our token minting process contributes to the overall security review of our platform. Thank you for your diligence in helping ensure the robustness of our system.
Github username: @Jelev123 Twitter username: zhulien_zhelev Submission hash (on-chain): 0xb2e380e01ac8dafd1d9dac580b4228eab144d453065df9c67ae016c9a902cb54 Severity: medium
Description: Description\ The function _mintAndUpdateTotalSupply call _mint. The code depends on
onERC1155Received
callback being implemented by the receiving contract to check ERC1155 implementation, if the receiver contract doesn't implementonERC1155Received
the transaction will revert.Attack Scenario\ A user with bad intentions can cause
Dos
Recommendation
There are many ways to handle this issue