Skip to content

Latest commit

 

History

History
executable file
·
40 lines (17 loc) · 1.16 KB

IADOWR.md

File metadata and controls

executable file
·
40 lines (17 loc) · 1.16 KB

IADOWR

https://etherscan.io/address/0xc1e2097d788d33701ba3cc2773bf67155ec93fc4#code

    function mintToken(address target, uint256 mintedAmount) onlyOwner public {
        balanceOf[target] += mintedAmount;
        totalSupply += mintedAmount;
        Transfer(0, this, mintedAmount);
        Transfer(this, target, mintedAmount);
    }

The IADOWR token could be arbitrary minted by its creator in function mintToken(). The balanceOf[target] and mintedAmount are a defined as uint, so oprator '+' would definitely result in an integer overflow.

Simulated on Remix:

The owner of the contract could mintToken arbitary amout of (for example 0x8000000000000000000000000000000000000000000000000000000000000000 Wei) subconcurrency IADOWR to an arbitary user.

If the owner of the contract mintToken another 0x8000000000000000000000000000000000000000000000000000000000000000 IADOWR to the user again, integer overflow happened which make balanceOf this user to be 0.

And actually the owner of the contract could control the balance of an arbitary user to be an aribitary value.