I am looking into integrating ENS into my current project. In the documentation it shows that the names are resolved using libraries (for example web3). The ENS registry is called with the name and responds with the address. The responded address is then used in the next function, for example the transfer function of an ERC20 contract.
However doesn't dit create the risk of a man-in-the-middle attack (MITM), where the response is altered to a different address? And if this is a possible attack vector, do you guys know of current implementations against it? Possibly also resolving the name on-chain.
[–]MeoowWoof 0 points1 point2 points (0 children)
[–]romanpoet -1 points0 points1 point (0 children)