Q1 2026 Security & Compliance Report44 incidents, $482M in losses, insights from 11 industry leaders.
Read the report

Audit name:

[SCA] Digbi2121 | Digbi2121-Audit | Apr2026

Date:

Apr 30, 2026

Table of Content

Introduction
Audit Summary
System Overview
Potential Risks
Findings
Appendix 1. Definitions
Appendix 2. Scope
Appendix 3. Additional Valuables
Disclaimer

Want a comprehensive audit report like this?

Introduction

We express our gratitude to the Digbi2121 team for the collaborative engagement that enabled the execution of this Smart Contract Security Assessment.

Digbi2121 is a blind-mint ERC-721A NFT collection with reveal mechanism, on-chain royalties (ERC2981), and admin controls.

Document

NameSmart Contract Code Review and Security Analysis Report for Digbi2121
Audited ByKhrystyna Tkachuk
Approved ByKornel Światłowski
Website-
Changelog21/04/2026 - Preliminary Report
30/04/2026 - Final Report
PlatformEthereum
LanguageSolidity
TagsNon-fungible Token, ERC721, Token Sales, Centralization
Methodologyhttps://docs.hacken.io/methodologies/smart-contracts
  • Document

    Name
    Smart Contract Code Review and Security Analysis Report for Digbi2121
    Audited By
    Khrystyna Tkachuk
    Approved By
    Kornel Światłowski
    Website
    -
    Changelog
    21/04/2026 - Preliminary Report
    30/04/2026 - Final Report
    Platform
    Ethereum
    Language
    Solidity
    Tags
    Non-fungible Token, ERC721, Token Sales, Centralization

Review Scope

Repositoryhttps://github.com/digbiworld/digbi2121-audit
Commit5dc83f3
Final Commit63bf613

Audit Summary

6Total Findings
6Resolved
0Accepted
0Mitigated

The system users should acknowledge all the risks summed up in the risks section of the report

{Finding_Table?columns=title,severity,status&setting.filter.type=Vulnerability}

Documentation quality

  • Functional requirements are provided.

  • Technical description is provided.

    • Run instructions are provided.

    • Technical specification is provided.

  • The NatSpec documentation is sufficient.

Code quality

  • The code leverages OpenZeppelin contracts and follows established patterns.

  • The development environment is configured.

Test coverage

Code coverage of the project is 0%.

  • Test cases are not provided.

System Overview

DIGBI2121 is a blind-mint NFT collection protocol with the following contract:

Digbi2121 — an ERC-721A NFT contract that implements a fixed-supply, blind-mint drop with a delayed-reveal mechanism, on-chain royalties via ERC-2981, and owner-controlled administrative operations.

It has the following attributes:

  • Name: DIGBI 2121

  • Symbol: DIGBI2121

  • Max supply: 2121 tokens

The contract follows a standard NFT drop lifecycle. After deployment, all tokens display a shared hidden metadata URI. The owner activates the public sale, allowing users to mint at the fixed price (0.06 ETH) up to the per-wallet cap (3 tokens). The owner may also mint tokens for free via a separate function at any time, regardless of sale state or pause, with no per-wallet restriction. Once the collection is ready, the owner calls a one-time reveal function that switches all token URIs from the hidden placeholder to real per-token metadata. The owner may then permanently lock the base URI and the royalty configuration independently, making each immutable.

The owner additionally controls pausing and unpausing public minting, withdrawing collected ETH to an arbitrary recipient, rescuing accidentally sent ERC-20 tokens, and setting a provenance hash as a one-time write to prove metadata integrity, setting royalty recipient and fee (up to 15%).

Privileged roles

The protocol uses OpenZeppelin’s Ownable pattern with a single privileged owner role. The contract owner has the following capabilities:

  • Can mint up to the full MAX_SUPPLY through ownerMint() to arbitrary recipient addresses.

  • Can enable or disable public minting at any time through setSaleActive().

  • Can pause or unpause the contract, although the pause only disables public mint() and does not restrict ownerMint() or token transfers.

  • Can set the hidden metadata URI through setHiddenUri().

  • Can reveal the collection metadata through reveal(), which acts as a one-way switch from hidden metadata to revealed metadata.

  • Can update the base URI through setBaseUri(), allowing metadata changes until the URI is locked.

  • Can permanently lock the base URI through lockBaseUri(), making the metadata configuration immutable.

  • Can set the provenance hash through setProvenance(), which may only be called once.

  • Can update royalty settings through setRoyalty(), including both the royalty receiver and fee, up to the configured 15% cap, until royalties are locked.

  • Can permanently lock royalty settings through lockRoyalty(), making the royalty configuration immutable.

  • Can withdraw ETH through withdraw(), sending the entire contract ETH balance to an arbitrary recipient chosen by the owner.

  • Can withdraw ERC-20 tokens through withdrawERC20(), transferring any ERC-20 tokens held by the contract to an arbitrary recipient chosen by the owner.

Potential Risks

Owner's Unrestricted State Modification: The absence of restrictions on state variable modifications by the owner leads to arbitrary changes, affecting contract integrity and user trust, especially during critical operations like minting phases.

Single Points of Failure and Control: The project is fully or partially centralized, introducing single points of failure and control. This centralization can lead to vulnerabilities in decision-making and operational processes, making the system more susceptible to targeted attacks or manipulation.

Uncapped Free Owner Minting: The owner can mint any number of tokens for free via ownerMint() up to the maximum supply of 2121, with no per-wallet limit, no payment requirement, and no restriction by sale state or pause. This function bypasses every constraint applied to public minting. The owner could allocate the entire collection to a single address before or after the public sale, leaving no supply for public participants.

Metadata Mutability Before Lock: The hidden URI can be changed at any time before reveal, and the base URI can be changed at any time before the owner calls the permanent lock. Until the base URI is explicitly locked, the owner retains full control over what metadata each token resolves to.

Royalty Enforcement Off-Chain: The contract implements ERC-2981 to signal royalty information on-chain, but this standard is advisory only. Marketplaces and secondary sale platforms are not required to query or honor the returned royalty data, meaning royalty collection cannot be enforced at the contract level.

Per-Wallet Limit Bypass via Sybil Addresses: The MAX_PER_WALLET limit is enforced using _numberMinted(msg.sender), so it applies as a lifetime mint cap per address and cannot be bypassed by transferring NFTs out. However, this restriction is address-based only and can still be bypassed through the use of multiple Sybil addresses controlled by the same user.

Limited Pause Scope: The contract inherits pausing functionality, but whenNotPaused is only enforced on the public mint() function. While paused, ownerMint() and standard token transfers can still proceed, so the pause does not provide a full emergency stop for token issuance or movement.

Scope Definition and Security Guarantees: The repository includes a flattened contract instance (flat/Digbi2121_flat.sol) that was not included in the audit scope. Contracts outside the audit scope may introduce vulnerabilities, potentially impacting the overall security due to the interconnected nature of smart contracts if that flattened version is accidentally used for production deployment.

Findings

Code
Title
Status
Severity
F-2026-1622Provenance Hash Can Be Set After Minting
fixed

Medium
F-2026-1619baseUriLocked Bypass via reveal() Allows Post-Freeze _baseURI Mutation
fixed

Low
F-2026-1622Missing Input Validation in Metadata and Provenance Setters
fixed

Observation
F-2026-1621Redundant totalMinted() Function Duplicates Existing Functionality
fixed

Observation
F-2026-1621Owner Mint Function Bypasses the Per-Wallet Mint Limit
fixed

Observation
F-2026-1619Floating Pragma
fixed

Observation
1-6 of 6 findings

Identify vulnerabilities in your smart contracts.

Appendix 1. Definitions

Severities

When auditing smart contracts, Hacken is using a risk-based approach that considers Likelihood, Impact, Exploitability and Complexity metrics to evaluate findings and score severities.

Reference on how risk scoring is done is available through the repository in our Github organization:

Severity

Description

Critical
Critical vulnerabilities are usually straightforward to exploit and can lead to the loss of user funds or contract state manipulation.

High
High vulnerabilities are usually harder to exploit, requiring specific conditions, or have a more limited scope, but can still lead to the loss of user funds or contract state manipulation.

Medium
Medium vulnerabilities are usually limited to state manipulations and, in most cases, cannot lead to asset loss. Contradictions and requirements violations. Major deviations from best practices are also in this category.

Low
Major deviations from best practices or major Gas inefficiency. These issues will not have a significant impact on code execution.
  • Severity

    Critical

    Description

    Critical vulnerabilities are usually straightforward to exploit and can lead to the loss of user funds or contract state manipulation.

    Severity

    High

    Description

    High vulnerabilities are usually harder to exploit, requiring specific conditions, or have a more limited scope, but can still lead to the loss of user funds or contract state manipulation.

    Severity

    Medium

    Description

    Medium vulnerabilities are usually limited to state manipulations and, in most cases, cannot lead to asset loss. Contradictions and requirements violations. Major deviations from best practices are also in this category.

    Severity

    Low

    Description

    Major deviations from best practices or major Gas inefficiency. These issues will not have a significant impact on code execution.

Potential Risks

The "Potential Risks" section identifies issues that are not direct security vulnerabilities but could still affect the project’s performance, reliability, or user trust. These risks arise from design choices, architectural decisions, or operational practices that, while not immediately exploitable, may lead to problems under certain conditions. Additionally, potential risks can impact the quality of the audit itself, as they may involve external factors or components beyond the scope of the audit, leading to incomplete assessments or oversight of key areas. This section aims to provide a broader perspective on factors that could affect the project's long-term security, functionality, and the comprehensiveness of the audit findings.

Appendix 2. Scope

The scope of the project includes the following smart contracts from the provided repository:

Scope Details

Repositoryhttps://github.com/digbiworld/digbi2121-audit
Commit5dc83f37361e3674b0ed0e6c81054c92f6532eaf
Final Commit63bf613c36cb9b4a647ff3a5b1d95451b099eaf2
Whitepaper-
Requirementshttps://github.com/digbiworld/digbi2121-audit/PRE_AUDIT
Technical Requirementshttps://github.com/digbiworld/digbi2121-audit/PRE_AUDIT

Assets in Scope

src
Digbi2121.sol - src › Digbi2121.sol

Appendix 3. Additional Valuables

Additional Recommendations

The smart contracts in the scope of this audit could benefit from the introduction of automatic emergency actions for critical activities, such as unauthorized operations like ownership changes or proxy upgrades, as well as unexpected fund manipulations, including large withdrawals or minting events. Adding such mechanisms would enable the protocol to react automatically to unusual activity, ensuring that the contract remains secure and functions as intended.

To improve functionality, these emergency actions could be designed to trigger under specific conditions, such as:

  • Detecting changes to ownership or critical permissions.

  • Monitoring large or unexpected transactions and minting events.

  • Pausing operations when irregularities are identified.

These enhancements would provide an added layer of security, making the contract more robust and better equipped to handle unexpected situations while maintaining smooth operations.

Frameworks and Methodologies

This security assessment was conducted in alignment with recognised penetration testing standards, methodologies and guidelines, including the NIST SP 800-115 – Technical Guide to Information Security Testing and Assessment , and the Penetration Testing Execution Standard (PTES) , These assets provide a structured foundation for planning, executing, and documenting technical evaluations such as vulnerability assessments, exploitation activities, and security code reviews. Hacken’s internal penetration testing methodology extends these principles to Web2 and Web3 environments to ensure consistency, repeatability, and verifiable outcomes.

Disclaimer