A malicious user can mint similar profiles multiple times making it difficult to build genuine connection.
In contract SoulboundProfileNFT
, the function mintProfile()
lets anyone to mint their profile without checking if the profile Image is used or not.
Which can lead to Identity Theft for original user.
The protocol's goal is to make sure that every connection build is genuine and meaningful commitment.
But due to possibility of Identity Theft, the goal cannot be fulfilled every time.
It can also damages the reputation of protocol.
We are trying to mint same profile with different addresses to demonstrate Identity Theft.
Here we are adding a mapping profileTracking
which track the state of profile image
if the profile is used then we will make it true so that same image cannot be used again.
Scamming/phishing is not the protocol problem, that's a user mistake. NFT are unique, even if someone does a copy of your profile (which is also possible in web2), I consider it informational. Injection is a problem for the web2 part of the protocol, not a bug here. For the age, it depends on the countries law and future medicine. Anyways, that's more an ethical/political problem, not a bug.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.