Home

Awesome

NFT Attack Vectors:

The ERC-721 introduces a standard for NFT, in other words, this type of Token is unique and can have different value than another Token from the same Smart Contract, maybe due to its age, rarity or even something else. Read more about NFT here.

This Repository contains a list of NFT Attack Vectors. The recent rise in popularity of these NFTs is due to a lack of information available both offline and online, making them a popular target for scammers and hackers. Below are some NFT attack vectors which hackers/scammers generally use to exploit. This repository will be actively maintained and updated by QuillAudits.

If you find any attack vectors missing, you can create a pull request and be a contributor of the project.


Serial No.Attack Vectors
1NFT Swap Scams
2'Trojan Horse' NFTs
3Impersonation Scams
4Rug Pull
5NFT Duplicity
6Recovery Scams
7Wash Trading
8Flash Loans
9Spoofing
10Ramping the Market
11Fake News
12Bots
13Bugs in Platforms
14Influencer/ Shilling
15Unlimited Permission on Token Approval
16Unsafe ERC721 Operations
17Reward Not Updated
18Code Exploits
19Private Key Compromise
20Airdrop Exploits
21API Exploits
22NFT Social Media Hack
23Phishing Scams
24Frontend Attacks

References:

Elliptic's Nft and Financial Crime Report