Applying ERC-20 Extension Patterns To Reduce Approval And Transfer Vulnerabilities