Replies: 19 comments 14 replies
-
This is the #1 highest priority IMO, as in it should be implemented yesterday. Based on my experience this is the #1 reason keeping all the independent NFT builders (like generative art NFTs and what not) from adopting Rarible protocol. They want to be able to control the supply, and Rarible protocol currently doesn't provide this. Simply adding this feature should act as the tipping point to bring many creators to Rarible protocol. |
Beta Was this translation helpful? Give feedback.
-
+1 from the cocoNFT side of things as well. We originally created a collection through the Rarible UI and as we started to gain traction random people started adding NFTs to it. We had no ability to remove them from the collection and couldn't stop more from coming in. Most people don't want other people's stuff added to their collection. This will be critical for projects and developers building on the protocol. |
Beta Was this translation helpful? Give feedback.
-
Is this issue regarding lazy minting or the usual minting? |
Beta Was this translation helpful? Give feedback.
-
Would also be cool to explore if we can have the contract check an allowlist of some kind that is external. That way the "list" of users doesn't have to be on chain and use transactions to add each users. Ideally we only want our users to be able to upload. So it would be nice to only give those users the ability to mint. Bad actors could still get by this if they are added to the list, they technically could still mint anything to the contract, even not using our product. |
Beta Was this translation helpful? Give feedback.
-
Hey guys!
I think, 2nd is relatively easy to implement, pretty useful and consistent with current contracts. |
Beta Was this translation helpful? Give feedback.
-
possible to start with simpler scenario if it makes sense and is a more incremental approach? that is all public or only private to original creator of collection. a true whitelist scenario probably more sophisticated and time intensive to implement. just a suggestion. |
Beta Was this translation helpful? Give feedback.
-
Is there a severity/priority status that can be set for this issue? If I were in production - this would be one of the top priorities as it is 1) is actively being exploited and 2) affects the security integrity of the NFT project. Maybe not drop everything, as there is a manual workaround to clean up items.. but really this is a problem. I would expect it to be included in a security vulnerability list (which might have a limited distribution) - since there effectively is no access control at the moment. You could argue that this is out of spec for now, that's fine. Just understand it is a production showstopper for me. I can beta with this, but not realistic for production. As the team/process evolves I can help you with this (how to manage bugs/customers and security vulnerabilities.) Workaround? |
Beta Was this translation helpful? Give feedback.
-
Dear Team, I just want to share our experience. This is somewhat of an emergency for us, as we're getting lots of traction. We were not aware of this and were right about to do another wave of 100 Cybergoats (our NFTs lazy minted on Rarible's token factory contract), when somebody minted some weird image and sunglasses to our collection. Our users brought it to my attention. Naturally, we didn't give our permission for this to happen, and we don't know who did it. We had to emergency stop the drop, and now we can't sell any more NFTs until this is resolved. Our immediate plan was to drop 10,000 pieces, but if anyone can just randomly mint spam to our collection and potentially impersonate us by minting NFTs that look like ours, etc., then we cannot sell any more NFTs until this is resolved. It would be a mess, and buyers would be upset. Please help, we have lots of people waiting for an answer/impatiently waiting to buy from us, and we would love to get them to use the protocol, but this is a complete blocker. Please help. @evgenynacu @eduardstal, or anyone who knows about this, is there any quick fix for this that you would recommend, at least a temporary one? Thank you for your time. |
Beta Was this translation helpful? Give feedback.
-
I've also had random items appear in our collections. IMO, this is a serious problem and should be given high priority. Anyone using Rarible protocol is susceptible to this right now. Is there a more concrete roadmap for how this will be addressed from a protocol or contract standpoint? Are there any known workarounds? |
Beta Was this translation helpful? Give feedback.
-
We are starting to work on this with Liteflow. We made a proposal to fix this issue that has been accepted.
The goal is to have these features in the token created by the factory already in the rarible protocol. This way, any new token will have these features (that will be opt-in with public collection by default as it is right now). This should also work for any already deployed tokens from the factory. We will be working on the development part, but the deployment will depend on the rarible team. The code will be pushed on Github and reviewed by the rarible team. |
Beta Was this translation helpful? Give feedback.
-
There is now a contract where only the owner can mint. We will have the possibility to deploy private contracts via the SDK, this feature is in the backlog. The release can be expected Monday / Tuesday next week (first week of November) Any collection that has already been released won't be able to benefit from this. |
Beta Was this translation helpful? Give feedback.
-
Looks like gas prices have come down a bit. Any chance of merging today? |
Beta Was this translation helpful? Give feedback.
-
Thank you for the hard work. We are also waiting for this. An update would be much appreciated. Gas was in the 70s last night. Is this in the mempool already? What is the number we are waiting for? |
Beta Was this translation helpful? Give feedback.
-
Aiming to deploy either Saturday (6th of Nov) or Monday (8th of Nov). |
Beta Was this translation helpful? Give feedback.
-
Thanks so much for deploying the new contracts Eugene! Can you please provide the new contract factory addresses (mainnet and rinkeby)? |
Beta Was this translation helpful? Give feedback.
-
So does this upgrade allow users of the Rarible SDK to let only some creators mint? Is it implemented? |
Beta Was this translation helpful? Give feedback.
-
Hey guys. Pull request to implement the suggestion of this discussion created: rarible/protocol-contracts#105 |
Beta Was this translation helpful? Give feedback.
-
@NicolasMahe There's a pending change requested here rarible/protocol-contracts#105. Just letting you know in case you missed it. |
Beta Was this translation helpful? Give feedback.
-
Closing this as the PR is merged. |
Beta Was this translation helpful? Give feedback.
-
Currently, the tokens can be created by anyone. This is a valid use case for a public platform like rarible.com but makes the solution unsuitable for more restrictive business that wants only a certain subset of users to create new tokens.
I can see many use cases where a platform would want to limit user access:
OpenZeppelin already has a role-based access control that would be perfect as it became quite standard.
This should, of course, be combined with an option to have role-based access or public access.
With that, a mint function like this one for ERC1155 could use a modifier like that (really simple example):
The default would still be public, but
hasAccessControl
could be set totrue
and limit access to only users withMINTER_ROLE.
Beta Was this translation helpful? Give feedback.
All reactions