Token-Based Communities & NFTs in Practice

Section VII: Ethereum Framework

Army Cyber Institute

April 9, 2026

Agenda

  1. Foundations — What is a token? The on-chain primitive, its anatomy, and the fungible vs. non-fungible distinction.

  2. Token-Based Communities — How token ownership enforces membership, access, and governance — with real-world case studies.

  3. Minting — How tokens are created on-chain, contract patterns, metadata storage, soulbound credentials, and the permissioned contrast.

  4. Adversarial & Failure Cases — Rug pull forensics, the Decentralized Autonomous Organization (DAO)s re-entrancy attack, and centralisation chokepoints hiding inside decentralised systems.

  5. Operational Implications — Five capabilities this infrastructure enables — and why each one cuts in two directions.

What Is a Token?

  • A token is a programmable claim enforced by code on a shared ledger — not a coin, not an image.
  • Three properties every token carries: unique or fungible ID, verifiable ownership, immutable transfer history.
  • The ledger enforces the rules; humans and institutions supply the meaning behind those rules.
  • Same primitive, radically different applications: stablecoin, supply chain record, membership pass.

token_anatomy TOKEN TOKEN ───────────────────────── A programmable claim on a shared ledger ID Identifier ───────────────────────── Unique (NFT) or fungible (interchangeable units) Enforced by the contract TOKEN->ID  has a OWN Owner ───────────────────────── A wallet address Verifiable by anyone Immutably recorded TOKEN->OWN  has an HIST Transfer History ───────────────────────── Every prior owner Timestamped on-chain Cannot be altered TOKEN->HIST  carries MEAN Meaning ───────────────────────── Art · Deed · Vote · Key Credential · Currency NOT enforced by the chain TOKEN->MEAN  acquires

Fungible vs. Non-Fungible

Standard Token Type What the contract tracks Transfer unit Typical use
ERC-20 Fungible Balances per address Any amount Governance token, stablecoin, social currency
ERC-721 Non-Fungible Owner per token ID One whole token Art, deed, membership pass, supply chain record
ERC-1155 Multi-token Balance per (address, ID) pair Amounts per ID Gaming inventory, enterprise asset catalogue
  • Standards are social and technical contracts — wallets, markets, and indexers all speak them.

  • Choosing the wrong standard is an architectural decision — it constrains what the system can ever do.

Token Standard Design Considerations

token_design Q1 Are all instances interchangeable? Q2 Do you need both fungible and unique tokens in one system? Q1->Q2  No ERC20 ERC-20  —  Fungible ───────────────────────────── Tracks: balance per address Transfer unit: any amount Constraint: no individual identity Use: governance, stablecoin, currency Q1->ERC20  Yes ERC721 ERC-721  —  Non-Fungible ───────────────────────────── Tracks: one owner per token ID Transfer unit: one whole token Constraint: no batch efficiency Use: art, deed, membership, credential Q2->ERC721  No — unique only ERC1155 ERC-1155  —  Multi-Token ───────────────────────────── Tracks: balance per (address, ID) pair Transfer unit: amounts per ID Constraint: larger attack surface Use: gaming inventory, enterprise catalogue Q2->ERC1155  Yes — mixed WARN Standard choice is an architectural commitment — it constrains every downstream wallet, market, and indexer.

What Tokens Don’t Guarantee

  • The chain verifies: signatures, balance changes, contract execution, event logs.

  • The chain does not verify: file contents, legal ownership, identity of the wallet holder, or meaning of metadata.

  • tokenURI points to a JSON file — that file lives somewhere else, with its own integrity model.

  • A token on an immutable chain pointing to a mutable server is only as trustworthy as the server operator.

On-Chain vs. Off-Chain

onchain_offchain cluster_onchain On-Chain  —  Enforced by Consensus cluster_offchain Off-Chain  —  NOT Enforced by Chain TID Token ID OWN Owner Address HIST Transfer History URI tokenURI (pointer) META Metadata JSON (name, description, traits) URI->META  points to  (not enforced) IMG Image / File META->IMG  links to LEG Legal Rights ID Real-World Identity of Wallet Holder

Token-Based Communities

  • A token-based community enforces membership, access, and/or governance through token ownership.

  • Three things token ownership can gate: who gets in, who gets to speak, who gets to decide.

  • The chain enforces the gate; humans supply the community, culture, and purpose behind it.

  • Key question: what exactly does the token enforce — and what does it merely signal?

Two-Layer Community Architecture

tbc_layers cluster_enforced Enforced On-Chain cluster_social Social Layer  —  Off-Chain ACC Access Control (token gate) COMS Communication (Discord, Telegram, Forums) ACC->COMS gates entry to GOV Governance Votes (token-weighted) TRES Treasury Disbursement (contract execution) GOV->TRES authorises CULT Culture / Norms (trust, reputation) MOD Moderation & Curation CULT->MOD shapes

Three Patterns: DAOs, Membership NFTs, and Social Tokens

  • Decentralized Autonomous Organization - DAOs — token-weighted control of a shared treasury and protocol; governance is the core function.

  • Membership NFTs — access control; the NFT is a key that unlocks content, events, or community spaces.

  • Social tokens — community currency; rewards contribution and aligns incentives around participation.

  • These patterns mix freely — most real communities combine elements of all three.

community_patterns DAO DAO ────────── Token: ERC-20 Enforces: votes, treasury, upgrades Example: Gitcoin HYB Hybrid ────────── NFT = identity Fungible = budget Example: FWB + DAO DAO->HYB add identity layer MEM Membership NFT ────────── Token: ERC-721 Enforces: access to content/events Example: BAYC MEM->HYB add governance layer SOC Social Token ────────── Token: ERC-20 Enforces: balance; signals status/role Example: FWB SOC->HYB add treasury control

Token Community Examples

Community Pattern Token What it enforces Notable feature
Friends With Benefits Social + DAO FWB (ERC-20) Discord membership threshold Token price creates plutocratic entry barrier
Bored Ape Yacht Club Membership NFT + DAO BAYC (ERC-721) + APE (ERC-20) Event access, IP rights, ApeCoin governance Layered: NFT = identity; APE = treasury control
Doodles Membership NFT + DAO Doodles (ERC-721) Doodlebank treasury voting Community launchpad funded $300K+ in grants
Gitcoin DAO GTC (ERC-20) Quadratic funding allocation Open-source grant funding; sybil resistance required
  • Each community answers: what does holding this token actually let you do?

  • Each also illustrates a structural tension that token governance alone cannot resolve.

How Token Gating Works

  • Flow: user connects wallet → signs a message (no gas) → contract checks token balance → access granted or denied.

  • Implementations: Discord bots (Collab.Land, Guild.xyz), web apps (wallet auth), physical events (FWB Gatekeeper).

  • No passwords. No accounts. No central database. Ownership is the credential.

  • Analytical split: membership list is public (on-chain); community content is private (off-chain).

Token Gating: Access Flow

token_gate_flow S1 (1) User Wallet Connect wallet to bot / dApp S2 (2) Gate Bot / dApp Issues off-chain signature challenge (no gas, no on-chain record) S1->S2 S3 (3) User Wallet Signs message — proves key control (still off-chain) S2->S3 S4 (4) Token Contract  ·  ON-CHAIN balanceOf(wallet)  or  ownerOf(tokenId) S3->S4 S5 (5) Gate Bot / dApp Receives confirmed / denied result S4->S5 DENY (6a)  Access Denied S5->DENY no token   GRANT (6b)  Access Granted Role assigned — resource unlocked S5->GRANT  token held

What Is Minting?

  • Minting is a state-writing transaction that produces a new token ID and assigns an initial owner.

  • On Ethereum: a function call to a smart contract; the contract emits a Transfer event from address zero.

  • The minter controls: who can mint, how many exist, what metadata the token points to.

  • After minting: the token enters the standard ownership and transfer lifecycle.

minting_flow CALL mint() call signed tx from authorized address CHECK Contract checks mint conditions allowlist? supply cap? payment? CALL->CHECK WRITE State written ───────────── tokenId → owner Transfer emitted from 0x0 CHECK->WRITE  conditions met REV Transaction reverts (nothing written) CHECK->REV  conditions  not met META tokenURI set ───────────── pointer to metadata (off-chain storage) WRITE->META DONE Token exists on-chain META->DONE

Minting on Ethereum

  • Public mint — anyone can call mint(); supply cap is the only control. Risk: bot front-running.

  • Allowlist (Merkle proof) — a hash tree commits allowed addresses; callers prove membership without storing the list on-chain.

  • Signature-based (lazy) mint — deployer signs a voucher off-chain; buyer submits voucher + payment to mint on demand.

  • Royalty signaling (EIP-2981) — contract declares royalty recipient and basis points; marketplace enforcement varies.

mint_patterns Q Who can mint? PUB Public Mint ───────────── Anyone, any time Control: supply cap only Risk: bot front-running Q->PUB Anyone AL Allowlist — Merkle Proof ───────────── Merkle root stored on-chain Caller submits inclusion proof Risk: proof generation backend Q->AL Pre-approved list SIG Lazy Mint — Signed Voucher ───────────── Deployer backend signs voucher Buyer pays gas to mint on demand Risk: voucher replay w/o nonce Q->SIG Voucher holders DEL Delegated Minter Role ───────────── Trusted address has MINTER_ROLE Used for bridges / off-chain issuance Risk: key compromise = unlimited mint Q->DEL Operator / bridge

Metadata, IPFS, and the Pointer Problem

  • At mint, tokenURI is set — a string pointing to a JSON file containing name, image URL, and traits.

  • Content addressing (IPFS CID, Arweave TX ID): address is a hash of the content — change the file, address changes.

  • Location addressing (HTTP URL): address is a server location — server operator can change or delete the content silently.

Storage Address type Mutable? Permanent? Trust model
On-chain State variable No Yes Chain consensus
IPFS Content hash (CID) No (hash changes) Only if pinned Pinning network
Arweave Content hash (TX ID) No Paid permanence Arweave protocol
HTTP URL Location Yes Server-dependent Server operator

Soulbound Tokens

  • A Soulbound Token (SBT) is minted with transfer disabled — bound to one wallet permanently.

  • Use cases: identity attestations, academic credentials, membership records, on-chain reputation.

  • Two standards: ERC-5192 (locks ERC-721 transfer functions) and ERC-4973 (account-bound; holder can relinquish).

  • The open problem: non-transferability binds the credential to a wallet, not a person.

sbt_flow ISSUER Issuer ───────────── Institution / DAO / Peer signs mint transaction MINT Mint SBT ───────────── Transfer functions locked at contract level (ERC-5192 or ERC-4973) ISSUER->MINT  signs mint tx WALLET Recipient Wallet ───────────── CAN: hold, display, use for access CANNOT: sell or transfer MINT->WALLET  token created  transfer disabled PERSON Real Person? ───────────── Binding ONLY IF person controls the private key Key sale = credential sale Key compromise = identity theft WALLET->PERSON  assumed — NOT enforced  by any contract

Minting on Hyperledger Fabric

  • On Fabric, asset creation is chaincode execution within a consortium — identity is known at the protocol layer.

  • Asset = composite key (type:id) + JSON value (owner MSP, metadata hash, URI).

  • Endorsement policy defines which organizations must co-sign a mint — governance is explicit.

  • Fabric adds: known identities, multi-org sign-off, private data. It removes: permissionlessness, public verifiability.

fabric_vs_eth cluster_fab Hyperledger Fabric — Permissioned Consortium cluster_eth Ethereum — Public, Permissionless ETX Any wallet calls mint() (no CA, no identity) ECON EVM executes contract code (deterministic, public) ETX->ECON EPUB State written publicly (anyone can read) ECON->EPUB FID X.509 Identity (CA-issued cert) known at protocol level FEND Endorsing Peers run chaincode multi-org sign-off required FID->FEND  authenticated  proposal FORD Orderer sequences block committed to channel ledger FEND->FORD  endorsed  read/write set FPRIV Private Data Collection (optional) hash on channel data off-channel FORD->FPRIV  if PDC used

The Frosties Rug Pull

  • The same minting primitives that enable open creation also enable rug pulls — projects that launch, collect mint funds, then abandon, sending value to zero.

  • Frosties (Jan 2022): 8,888 NFTs sold at 0.04 ETH each — $1.1M raised and drained within hours of sellout. Website deactivated, Discord deleted, Twitter posted “I’m sorry.”

  • Operators transferred proceeds through multiple wallets designed to obfuscate the source — but every transfer was publicly recorded on-chain.

  • When arrested, the same operators were preparing a second project (“Embers”) expected to raise $1.5M — the wallet reuse was the forensic link.

  • Broader pattern: study of 758 rug pulls across 10 marketplaces found wallet reuse is the dominant forensic signal; one cluster attempted 37 rug pulls in three months.

Rug Pull Operator Wallet Graph

rugpull_frosties S1 (1)  8,888 Frosties Mint — Jan 9 2022 Public sale at 0.04 ETH each — raises ~$1.1M S2 (2)  Rug Pull — Hours After Sellout Website deactivated · Discord deleted · Twitter: 'I'm sorry' S1->S2  sell out, abandon S3 (3)  Frosties Wallet → Operator Wallet 356.56 ETH transferred — visible on-chain to all holders S2->S3  ETH drained S4 (4)  Funds Scattered Across Multiple Wallets Transactions designed to obfuscate source of funds S3->S4  obfuscation attempt SIGNAL FORENSIC SIGNAL On-chain transfer was publicly visible — holders spotted it immediately. IRS-CI + HSI traced wallets to Nguyen & Llacuna S3->SIGNAL  key evidence S5 (5)  'Embers' — New Project Announced Same operators, new brand — expected $1.5M raise Arrested before March 26 pre-sale S4->S5  fund next project

The DAO Re-Entrancy Attack

  • April 2016: Christoph Jentzsch launches The DAO on Ethereum — a decentralized investment fund. $150M raised from 11,000+ investors in history’s largest crowdfund at the time, representing ~14% of all ETH in circulation.

  • June 12: Stephan Tual, a DAO creator, announces a “recursive call bug” has been found — but claims “no DAO funds at risk.” Programmers begin working on a fix. Over 50 project proposals are awaiting token-holder votes.

  • June 17: An unknown attacker exploits the unfixed flaw. The withdraw() function sent ETH before updating the caller’s balance — the attacker’s contract used its fallback function to re-enter withdraw() recursively. 3.6 million ETH (~$60M) drained into a “child DAO” before anyone could intervene. ETH price crashes from $20+ to under $13 in a day.

  • The response: A “white hat” counter-strike group used the same exploit to race the attacker and rescue remaining funds. But the back-and-forth could have continued indefinitely — so the community voted to hard fork on July 20, 2016 (block 192,000), rewriting history to return stolen funds. A minority refused — that chain became Ethereum Classic (ETC), which still runs today.

  • The lesson: The cryptography held. The chain worked as designed. The contract code was wrong. And when it mattered most, the community proved that blockchain immutability is a social commitment, not a physical law.

Re-Entrancy Drain Loop

reentrancy A1 (1) Attacker calls withdraw(amount) D1 (2) DAO checks balance → passes balance was never decremented A1->D1 D2 (3) DAO sends ETH to attacker balance STILL not updated D1->D2 A2 (4) Attacker fallback() fires → calls withdraw() again D2->A2 D3 (6) balances[msg.sender] -= amount NEVER REACHED during the loop D2->D3 should run next — never reached A2->D1 RE-ENTRY → back to ② balance still unchanged DRAIN (5) Gas runs out → loop stops 3.6M ETH ($60M) drained A2->DRAIN eventually

FIX — Checks-Effects-Interactions: Set balances[msg.sender] = 0 before sending ETH. Re-entry hits zero balance → reverts. Order of operations is the entire vulnerability.

Centralization Chokepoints

  • Most users reach Ethereum through Infura or Alchemy — two centralized API providers. When Infura experienced an outage in 2020, dApps failed; the chain did not.

  • Bridges are controlled by multisigs far smaller than L1 consensus — the 2023 Multichain collapse proved it.

  • Oracles aggregate off-chain data through networks with their own, weaker security assumptions.

  • Although Ethereum L1 operates in a decentralized manner, the infrastructure layers many users actually depend on — RPC providers, bridges, and oracles — reintroduce the single points of failure that decentralization was designed to eliminate.

Hidden Infrastructure Growth

  • NFT secondary market volume fell ~37% year-over-year by late 2025 — the speculative layer collapsed.

  • Simultaneously: over 40% of Fortune 500 companies integrated token infrastructure for operations.

  • Institutional use cases: Digital Product Passports (EU mandate), supply chain traceability, tokenized loyalty, fractional real estate.

  • The speculative layer and the utility layer have decoupled — most analysts are watching the wrong one.

decoupling SPEC Speculative Layer ────────── PFP collections Secondary market trading Price speculation STATUS: Collapsed -37% YoY UTIL Utility Layer ────────── Digital Product Passports Supply chain records Tokenized loyalty SBT credentials STATUS: Growing quietly SPEC->UTIL same primitive different application ANA Most analysts watching here ↑ ANA->SPEC OPS Operational reality building here ↑ OPS->UTIL

Analyst Implications

  1. Open membership enumeration — any token-gated community’s membership list is publicly readable on-chain; no special access required.

  2. Pseudonymous coordination at scale — token-based governance enables decision-making and value transfer among parties who never identify themselves.

  3. Permanent, auditable financial records — every token transfer is timestamped, signed, and immutable; the forensic substrate is always present.

  4. Credential and identity systems outside traditional institutions — SBTs and on-chain attestations create verifiable records with no central issuing authority.

  5. Infrastructure concentration as leverage point — RPC providers, bridges, and oracles are concentrated dependencies; disruption or compromise has outsized downstream effects.

Each capability cuts in two directions: it enables legitimate coordination and adversarial coordination with the same mechanism.

References

[1]
G. Wang and M. Nixon, SoK: Tokenization on blockchain,” in Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion, Leicester United Kingdom: ACM, Dec. 2021, pp. 1–9. doi: 10.1145/3492323.3495577.
[2]
Ethereum.org, “What are NFTs?” Accessed: Mar. 18, 2026. [Online]. Available: https://ethereum.org/en/nft/
[3]
P. Tierno, “Tokenized Assets,” Congressional Research Service, Washington, D.C., In Focus IF12670.3, Jan. 2025. Accessed: Sep. 12, 2025. [Online]. Available: https://www.congress.gov/crs_external_products/IF/PDF/IF12670/IF12670.3.pdf
[4]
F. Vogelsteller and V. Buterin, EIP-20: Token Standard.” Accessed: Oct. 27, 2025. [Online]. Available: https://eips.ethereum.org/EIPS/eip-20
[5]
B. Hammi, S. Zeadally, and A. J. Perez, “Non-fungible tokens: A review,” IEEE Internet of Things Magazine, vol. 6, no. 1, pp. 46–50, Mar. 2023, doi: 10.1109/IOTM.001.2200244.
[6]
IPFS, “IPFS.” Accessed: Mar. 18, 2026. [Online]. Available: https://ipfs.tech
[7]
Collab.Land, “Collab.land Token Gating Tutorial.” Accessed: Mar. 27, 2026. [Online]. Available: https://docs.collab.land/docs/tutorials/token-gating-tutorial
[8]
L. Ante, “The Non-Fungible Token (NFT) Market and Its Relationship with Bitcoin and Ethereum,” FinTech, vol. 1, no. 3, pp. 216–224, Sep. 2022, doi: 10.3390/fintech1030017.
[9]
P. Ohlhaver, E. G. Weyl, and V. Buterin, “Decentralized Society: Finding Web3’s Soul,” SSRN Electronic Journal, 2022, doi: 10.2139/ssrn.4105763.
[10]
J. Scharfman, “Non-fungible token (NFT) fraud, hacks, and controversies,” vol. 2. in Springer books, vol. 2. pp. 307–325, Dec. 2024. doi: 10.1007/978-3-031-60836-0_11.
[11]
U.S. Department of Justice, United States v. Ethan Nguyen and Andre Llacuna: Complaint,” United States District Court, Southern District of New York, Mar. 2022. Accessed: Mar. 27, 2026. [Online]. Available: https://www.justice.gov/d9/press-releases/attachments/2022/03/24/us_v._ethan_nguyen_andre_llacuna_complaint.pdf
[12]
Y. Zhou, J. Sun, F. Ma, Y. Chen, Z. Yan, and Y. Jiang, “Stop Pulling my Rug: Exposing Rug Pull Risks in Crypto Token to Investors,” in Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice, Lisbon Portugal: ACM, Apr. 2024, pp. 228–239. doi: 10.1145/3639477.3639722.
[13]
D. A. Siegel, “Understanding the DAO Attack.” 2016. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3014782
[14]
M. Mehar et al., “Understanding a Revolutionary and Flawed Grand Experiment in Blockchain: The DAO Attack.” Accessed: Oct. 21, 2025. [Online]. Available: https://papers.ssrn.com/abstract=3014782
[15]
Ethereum Foundation, “Critical update re: DAO vulnerability.” Accessed: Mar. 23, 2026. [Online]. Available: https://blog.ethereum.org/2016/06/17/critical-update-re-dao-vulnerability
[16]
Infura, “Ethereum API.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.infura.io/product/ethereum
[17]
Alchemy, “Alchemy documentation.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.alchemy.com/docs
[18]
CoinDesk, “As multichain wobbles, some fantom-based DeFi projects flee bridged tokens.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.coindesk.com/business/2023/06/01/as-multichain-wobbles-some-fantom-based-defi-projects-flee-bridged-tokens
[19]
Bank for International Settlements, “The crypto ecosystem: Key elements and risks.” Accessed: Mar. 23, 2026. [Online]. Available: https://www.bis.org/publ/othp72.htm
[20]
C2PA, “C2PA.” Accessed: Mar. 23, 2026. [Online]. Available: https://c2pa.org/
[21]
U.S. Food and Drug Administration, “FSMA final rule on requirements for additional traceability records for certain foods.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.fda.gov/food/food-safety-modernization-act-fsma/fsma-final-rule-requirements-additional-traceability-records-certain-foods
[22]
T. Sharma, R. Agarwal, and S. K. Shukla, “Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators.” Accessed: Oct. 17, 2025. [Online]. Available: http://arxiv.org/abs/2304.07598
[23]
G. Zhu, D. He, H. An, M. Luo, and C. Peng, “The governance technology for blockchain systems: A survey,” Front. Comput. Sci., vol. 18, no. 2, p. 182813, Apr. 2024, doi: 10.1007/s11704-023-3113-x.