Amp (AMP) Smart Contract Risk

ERC777 Transfer Hooks (Reentrancy Risk)

⚠ HIGH severity

Vulnerability

AMP implements ERC777 transfer hooks (tokensReceived/tokensToSend), enabling reentrancy attacks on every token transfer. The infamous imBTC/Uniswap reentrancy exploit used this vector.

Related: Reentrancy Attack

Safe integration

Apply reentrancy guards (nonReentrant modifier) on all functions that interact with ERC777-compatible tokens. Use checks-effects-interactions pattern.

Contract addresses

ChainAddress
Ethereum 0xff20817765cb7f73d4bde2e66e067e58d11095c2

Audit any contract that interacts with AMP: SmartContract.us automatically detects AMP integration risks →

← Back to Token Risk Profiles