The Standoff Digital Art is a simulation of a gallery of NFT paintings dedicated to the city of the future and a person in the digital world. Each painting is presented as a unique NFT token that will be tested by security researchers from around the world.
To capture the picture, participants will have to find vulnerabilities in smart contracts by analyzing the source code. Smart contracts written in the Solidity language will be published on the test network of the Ethereum blockchain. Each vulnerability can only be exploited once. Those who are the first to successfully implement an attack on a smart contract will receive 🎁🎉 valuable prizes from Positive Technologies and Innostage Group of Companies.
The competition to hack the NFT digital art collection will be held online. Join 👉🏻 the stream on standoff365.com to see it.
UPD: the analysis of tasks from the competition is already ready!
“NFT is a token that is implemented according to the ERC721 or ERC1155 standards,” says Arseniy Reutov, the organizer of the competition, head of the Positive Technologies application security research department. – These standards are just a prescription for what functions should be in a smart contract. At the same time, the standard does not regulate the code itself – hence the problems arise. Of course, there are libraries in which everything has already been implemented and tested, but nothing prevents you from changing this code or adding your own. As a rule, this is the source of all vulnerabilities.
An ordinary work of art can be stolen under the cover of night, armed to the teeth with special equipment and ingenuity, by deceit in broad daylight and even in front of visitors. And in all cases, the “vulnerabilities” familiar to us are to blame: ill-conceived security, the lack of proper technical means, and the usual human factor. But can a digital painting be stolen? Learn about it at The Standoff Digital Art.
“We are already accustomed to the idea that everything can be hacked – from a smart kettle to a Tesla,” comments Victoria Alekseeva, producer of Positive Hack Days. – On the one hand, this suggests that industries of various calibers should be involved in security issues, and on the other hand, that hackers follow trends, go from simple to complex, and all the latest technologies instantly fall into their field of vision. Having “played enough” with a smart kettle, the hacker will not stop and, most likely, will be drawn to Tesla, and then to something even more trendy and expensive. NFT is an unconditional trend of our time, and NFT-pictures can cost fabulous money in this sense, not to be inferior in cost to analog ones. But how much is known about the security of NFT tokens? Here we will find out! What if there is still something left in our world that cannot be hacked? .. ”