Switch branches/tags
Nothing to show
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
81 lines (40 sloc) 2.34 KB


contract LinkToken is StandardToken, Ownable {

    string public   name =           "Link Platform";    // Name of the Token
    string public   symbol =         "LNK";              // ERC20 compliant Token code
    uint public     decimals =       18;                 // Token has 18 digit precision
    uint public     totalSupply;    			         // Total supply

    function mint(address _spender, uint _value)
        onlyOwner {

        balances[_spender] += _value;
        totalSupply += _value;

The LNK token could be arbitrary minted by its creator in function mint(). The balances[_spender] and ) _value are a defined as uint, so oprator '+' would definitely result in an integer overflow.

Simulated on Remix:

The owner of the contract could mint arbitary amout of (for example 0x8000000000000000000000000000000000000000000000000000000000000000 Wei) subconcurrency LNK to an arbitary user.

If the owner of the contract mint another 0x8000000000000000000000000000000000000000000000000000000000000000 LNK to the user again, integer overflow happened which make balanceOf this user to be 0.

And actually the owner of the contract could control the balance of an arbitary user to be an aribitary value.

This is a serious problem for digital assets. Not a good thing for an organization who has a poor code but fancy website(

Similar Vulnerabilities



GVToken Genesis Vision (GVT)

Etherty Token (ETY)

Bitotal (TFUND)


SP8DE PreSale Token (DSPX)