Section VII: Ethereum Framework
April 9, 2026
Foundations — What is a token? The on-chain primitive, its anatomy, and the fungible vs. non-fungible distinction.
Token-Based Communities — How token ownership enforces membership, access, and governance — with real-world case studies.
Minting — How tokens are created on-chain, contract patterns, metadata storage, soulbound credentials, and the permissioned contrast.
Adversarial & Failure Cases — Rug pull forensics, the Decentralized Autonomous Organization (DAO)s re-entrancy attack, and centralisation chokepoints hiding inside decentralised systems.
Operational Implications — Five capabilities this infrastructure enables — and why each one cuts in two directions.
| Standard | Token Type | What the contract tracks | Transfer unit | Typical use |
|---|---|---|---|---|
| ERC-20 | Fungible | Balances per address | Any amount | Governance token, stablecoin, social currency |
| ERC-721 | Non-Fungible | Owner per token ID | One whole token | Art, deed, membership pass, supply chain record |
| ERC-1155 | Multi-token | Balance per (address, ID) pair | Amounts per ID | Gaming inventory, enterprise asset catalogue |
Standards are social and technical contracts — wallets, markets, and indexers all speak them.
Choosing the wrong standard is an architectural decision — it constrains what the system can ever do.
The chain verifies: signatures, balance changes, contract execution, event logs.
The chain does not verify: file contents, legal ownership, identity of the wallet holder, or meaning of metadata.
tokenURI points to a JSON file — that file lives somewhere else, with its own integrity model.
A token on an immutable chain pointing to a mutable server is only as trustworthy as the server operator.
A token-based community enforces membership, access, and/or governance through token ownership.
Three things token ownership can gate: who gets in, who gets to speak, who gets to decide.
The chain enforces the gate; humans supply the community, culture, and purpose behind it.
Key question: what exactly does the token enforce — and what does it merely signal?
Decentralized Autonomous Organization - DAOs — token-weighted control of a shared treasury and protocol; governance is the core function.
Membership NFTs — access control; the NFT is a key that unlocks content, events, or community spaces.
Social tokens — community currency; rewards contribution and aligns incentives around participation.
These patterns mix freely — most real communities combine elements of all three.
| Community | Pattern | Token | What it enforces | Notable feature |
|---|---|---|---|---|
| Friends With Benefits | Social + DAO | FWB (ERC-20) | Discord membership threshold | Token price creates plutocratic entry barrier |
| Bored Ape Yacht Club | Membership NFT + DAO | BAYC (ERC-721) + APE (ERC-20) | Event access, IP rights, ApeCoin governance | Layered: NFT = identity; APE = treasury control |
| Doodles | Membership NFT + DAO | Doodles (ERC-721) | Doodlebank treasury voting | Community launchpad funded $300K+ in grants |
| Gitcoin | DAO | GTC (ERC-20) | Quadratic funding allocation | Open-source grant funding; sybil resistance required |
Each community answers: what does holding this token actually let you do?
Each also illustrates a structural tension that token governance alone cannot resolve.
Flow: user connects wallet → signs a message (no gas) → contract checks token balance → access granted or denied.
Implementations: Discord bots (Collab.Land, Guild.xyz), web apps (wallet auth), physical events (FWB Gatekeeper).
No passwords. No accounts. No central database. Ownership is the credential.
Analytical split: membership list is public (on-chain); community content is private (off-chain).
Minting is a state-writing transaction that produces a new token ID and assigns an initial owner.
On Ethereum: a function call to a smart contract; the contract emits a Transfer event from address zero.
The minter controls: who can mint, how many exist, what metadata the token points to.
After minting: the token enters the standard ownership and transfer lifecycle.
Public mint — anyone can call mint(); supply cap is the only control. Risk: bot front-running.
Allowlist (Merkle proof) — a hash tree commits allowed addresses; callers prove membership without storing the list on-chain.
Signature-based (lazy) mint — deployer signs a voucher off-chain; buyer submits voucher + payment to mint on demand.
Royalty signaling (EIP-2981) — contract declares royalty recipient and basis points; marketplace enforcement varies.
At mint, tokenURI is set — a string pointing to a JSON file containing name, image URL, and traits.
Content addressing (IPFS CID, Arweave TX ID): address is a hash of the content — change the file, address changes.
Location addressing (HTTP URL): address is a server location — server operator can change or delete the content silently.
| Storage | Address type | Mutable? | Permanent? | Trust model |
|---|---|---|---|---|
| On-chain | State variable | No | Yes | Chain consensus |
| IPFS | Content hash (CID) | No (hash changes) | Only if pinned | Pinning network |
| Arweave | Content hash (TX ID) | No | Paid permanence | Arweave protocol |
| HTTP URL | Location | Yes | Server-dependent | Server operator |
A Soulbound Token (SBT) is minted with transfer disabled — bound to one wallet permanently.
Use cases: identity attestations, academic credentials, membership records, on-chain reputation.
Two standards: ERC-5192 (locks ERC-721 transfer functions) and ERC-4973 (account-bound; holder can relinquish).
The open problem: non-transferability binds the credential to a wallet, not a person.
On Fabric, asset creation is chaincode execution within a consortium — identity is known at the protocol layer.
Asset = composite key (type:id) + JSON value (owner MSP, metadata hash, URI).
Endorsement policy defines which organizations must co-sign a mint — governance is explicit.
Fabric adds: known identities, multi-org sign-off, private data. It removes: permissionlessness, public verifiability.
The same minting primitives that enable open creation also enable rug pulls — projects that launch, collect mint funds, then abandon, sending value to zero.
Frosties (Jan 2022): 8,888 NFTs sold at 0.04 ETH each — $1.1M raised and drained within hours of sellout. Website deactivated, Discord deleted, Twitter posted “I’m sorry.”
Operators transferred proceeds through multiple wallets designed to obfuscate the source — but every transfer was publicly recorded on-chain.
When arrested, the same operators were preparing a second project (“Embers”) expected to raise $1.5M — the wallet reuse was the forensic link.
Broader pattern: study of 758 rug pulls across 10 marketplaces found wallet reuse is the dominant forensic signal; one cluster attempted 37 rug pulls in three months.
April 2016: Christoph Jentzsch launches The DAO on Ethereum — a decentralized investment fund. $150M raised from 11,000+ investors in history’s largest crowdfund at the time, representing ~14% of all ETH in circulation.
June 12: Stephan Tual, a DAO creator, announces a “recursive call bug” has been found — but claims “no DAO funds at risk.” Programmers begin working on a fix. Over 50 project proposals are awaiting token-holder votes.
June 17: An unknown attacker exploits the unfixed flaw. The withdraw() function sent ETH before updating the caller’s balance — the attacker’s contract used its fallback function to re-enter withdraw() recursively. 3.6 million ETH (~$60M) drained into a “child DAO” before anyone could intervene. ETH price crashes from $20+ to under $13 in a day.
The response: A “white hat” counter-strike group used the same exploit to race the attacker and rescue remaining funds. But the back-and-forth could have continued indefinitely — so the community voted to hard fork on July 20, 2016 (block 192,000), rewriting history to return stolen funds. A minority refused — that chain became Ethereum Classic (ETC), which still runs today.
The lesson: The cryptography held. The chain worked as designed. The contract code was wrong. And when it mattered most, the community proved that blockchain immutability is a social commitment, not a physical law.
FIX — Checks-Effects-Interactions: Set balances[msg.sender] = 0 before sending ETH. Re-entry hits zero balance → reverts. Order of operations is the entire vulnerability.
Most users reach Ethereum through Infura or Alchemy — two centralized API providers. When Infura experienced an outage in 2020, dApps failed; the chain did not.
Bridges are controlled by multisigs far smaller than L1 consensus — the 2023 Multichain collapse proved it.
Oracles aggregate off-chain data through networks with their own, weaker security assumptions.
Although Ethereum L1 operates in a decentralized manner, the infrastructure layers many users actually depend on — RPC providers, bridges, and oracles — reintroduce the single points of failure that decentralization was designed to eliminate.
NFT secondary market volume fell ~37% year-over-year by late 2025 — the speculative layer collapsed.
Simultaneously: over 40% of Fortune 500 companies integrated token infrastructure for operations.
Institutional use cases: Digital Product Passports (EU mandate), supply chain traceability, tokenized loyalty, fractional real estate.
The speculative layer and the utility layer have decoupled — most analysts are watching the wrong one.
Open membership enumeration — any token-gated community’s membership list is publicly readable on-chain; no special access required.
Pseudonymous coordination at scale — token-based governance enables decision-making and value transfer among parties who never identify themselves.
Permanent, auditable financial records — every token transfer is timestamped, signed, and immutable; the forensic substrate is always present.
Credential and identity systems outside traditional institutions — SBTs and on-chain attestations create verifiable records with no central issuing authority.
Infrastructure concentration as leverage point — RPC providers, bridges, and oracles are concentrated dependencies; disruption or compromise has outsized downstream effects.
Each capability cuts in two directions: it enables legitimate coordination and adversarial coordination with the same mechanism.

Token-Based Communities & NFTs in Practice — Army Cyber Institute — April 9, 2026