尽管在通常情况下编写一个按照预期运行的软件很简单, 但想要确保没有人能够以出乎意料的方式使用它就困难多了。
在 Solidity 中,这一点尤为重要,因为智能合约可以用来处理通证,甚至有可能是更有价值的东西。 除此之外,智能合约的每一次执行都是公开的,而且源代码也通常是容易获得的。
当然,你总是需要考虑有多大的风险: 你可以将智能合约与公开的(当然也对恶意用户开放)、甚至是开源的网络服务相比较。 如果你只是在某个网络服务上存储你的购物清单,则可能不必太在意, 但如果你使用那个网络服务管理你的银行帐户, 那就需要特别当心了。
本节将列出一些陷阱和一般性的安全建议,但这绝对不全面。 另外,请时刻注意的是即使你的智能合约代码没有 bug, 但编译器或者平台本身可能存在 bug。 一个已知的编译器安全相关的 bug 列表可以在 :ref:`已知bug列表<known_bugs>` 找到, 这个列表也可以用程序读取。 请注意其中有一个涵盖了 Solidity 编译器的代码生成器的 bug 悬赏项目。
我们的文档是开源的,请一如既往地帮助我们扩展这一节的内容(何况其中一些例子并不会造成损失)!
在智能合约中你所用的一切都是公开可见的,即便是局部变量和被标记成 private
的状态变量也是如此。
如果不想让矿工作弊的话,在智能合约中使用随机数会很棘手 (译者注:在智能合约中使用随机数很难保证节点不作弊, 这是因为智能合约中的随机数一般要依赖计算节点的本地时间得到, 而本地时间是可以被恶意节点伪造的,因此这种方法并不安全。 通行的做法是采用 |off_chain| 的第三方服务,比如 Oraclize 来获取随机数)。
任何从合约 A 到合约 B 的交互以及任何从合约 A 到合约 B 的 |ether| 的转移,都会将控制权交给合约 B。 这使得合约 B 能够在交互结束前回调 A 中的代码。 举个例子,下面的代码中有一个 bug(这只是一个代码段,不是完整的合约):
// SPDX-License-Identifier: GPL-3.0 pragma solidity >=0.6.0 <0.9.0; // 不要使用这个合约,其中包含一个 bug。 contract Fund { /// 合约中 |ether| 分成的映射。 mapping(address => uint) shares; /// 提取你的分成。 function withdraw() public { if (payable(msg.sender).send(shares[msg.sender])) shares[msg.sender] = 0; } }
这里的问题不是很严重,因为有限的 gas 也作为 send
的一部分,但仍然暴露了一个缺陷:
|ether| 的传输过程中总是可以包含代码执行,所以接收者可以是一个回调进入 withdraw
的合约。
这就会使其多次得到退款,从而将合约中的全部 |ether| 提取。
特别地,下面的合约将允许一个攻击者多次得到退款,因为它使用了 call
,默认发送所有剩余的 gas。
// SPDX-License-Identifier: GPL-3.0 pragma solidity >=0.6.2 <0.9.0; // 不要使用这个合约,其中包含一个 bug。 contract Fund { /// 合约中 |ether| 分成的映射。 mapping(address => uint) shares; /// 提取你的分成。 function withdraw() public { if (payable(msg.sender).call.value(shares[msg.sender])()) shares[msg.sender] = 0; } }
为了避免重入,你可以使用下面撰写的“检查-生效-交互”(Checks-Effects-Interactions)模式:
pragma solidity >=0.6.0 <0.9.0; contract Fund { /// 合约中 |ether| 分成的映射。 mapping(address => uint) shares; /// 提取你的分成。 function withdraw() public { var share = shares[msg.sender]; shares[msg.sender] = 0; payable(msg.sender).transfer(share); } }
请注意重入不仅是 |ether| 传输的其中一个影响,还包括任何对另一个合约的函数调用。 更进一步说,你也不得不考虑多合约的情况。 一个被调用的合约可以修改你所依赖的另一个合约的状态。
必须谨慎使用没有固定迭代次数的循环,例如依赖于 |storage| 值的循环:
由于区块 gas 有限,交易只能消耗一定数量的 gas。
无论是明确指出的还是正常运行过程中的,循环中的数次迭代操作所消耗的 gas 都有可能超出区块的 gas 限制,从而导致整个合约在某个时刻骤然停止。
这可能不适用于只被用来从区块链中读取数据的 view
函数。
尽管如此,这些函数仍然可能会被其它合约当作 |on_chain| 操作的一部分来调用,并使那些操作骤然停止。
请在合约代码的说明文档中明确说明这些情况。
发送和接收 |ether|
- 目前无论是合约还是“外部账户”都不能阻止有人给它们发送 |ether|。
合约可以对一个正常的转账做出反应并拒绝它,但还有些方法可以不通过创建消息来发送 |ether|。
其中一种方法就是单纯地向合约地址“挖矿”,另一种方法就是使用
selfdestruct(x)
。 - 如果一个合约收到了 |ether| (且没有函数被调用),就会执行 fallback 函数。 如果没有 fallback 函数,那么 |ether| 会被拒收(同时会抛出异常)。 在 fallback 函数执行过程中,合约只能依靠此时可用的“gas 津贴”(2300 gas)来执行。 这笔津贴并不足以用来完成任何方式的 |storage| 访问。 为了确保你的合约可以通过这种方式收到 |ether|,请你核对 fallback 函数所需的 gas 数量 (在 Remix 的“详细”章节会举例说明)。
- 有一种方法可以通过使用
addr.call.value(x)()
向接收合约发送更多的 gas。 这本质上跟addr.transfer(x)
是一样的, 只不过前者发送所有剩余的 gas,并且使得接收者有能力执行更加昂贵的操作 (它只会返回一个错误代码,而且也不会自动传播这个错误)。 这可能包括回调发送合约或者你想不到的其它状态改变的情况。 因此这种方法无论是给诚实用户还是恶意行为者都提供了极大的灵活性。 - 如果你想要使用
address.transfer
发送 |ether| ,你需要注意以下几个细节:- 如果接收者是一个合约,它会执行自己的 fallback 函数,从而可以回调发送 |ether| 的合约。
- 如果调用的深度超过 1024,发送 |ether| 也会失败。由于调用者对调用深度有完全的控制权,他们可以强制使这次发送失败;
请考虑这种可能性,或者使用
send
并且确保每次都核对它的返回值。 更好的方法是使用一种接收者可以取回 |ether| 的方式编写你的合约。 - 发送 |ether| 也可能因为接收方合约的执行所需的 gas 多于分配的 gas 数量而失败
(确切地说,是使用了
require
,assert
,revert
,throw
或者因为这个操作过于昂贵) - “gas 不够用了”。 如果你使用transfer
或者send
的同时带有返回值检查,这就为接收者提供了在发送合约中阻断进程的方法。 再次说明,最佳实践是使用 :ref:`“取回”模式而不是“发送”模式<withdrawal_pattern>`。
外部函数调用随时会失败,因为它们超过了调用栈的上限 1024。 在这种情况下,Solidity 会抛出一个异常。 恶意行为者也许能够在与你的合约交互之前强制将调用栈设置成一个比较高的值。
请注意,使用 .send()
时如果超出调用栈 并不会 抛出异常,而是会返回 false
。
低级的函数比如 .call()
,.callcode()
和 .delegatecall()
也都是这样的。
永远不要使用 tx.origin 做身份认证。假设你有一个如下的钱包合约:
// SPDX-License-Identifier: GPL-3.0 pragma solidity >=0.7.0 <0.9.0; // 不要使用这个合约,其中包含一个 bug。 contract TxUserWallet { address owner; constructor() { owner = msg.sender; } function transferTo(address dest, uint amount) public { require(tx.origin == owner); dest.transfer(amount); } }
现在有人欺骗你,将 |ether| 发送到了这个恶意钱包的地址:
// SPDX-License-Identifier: GPL-3.0 pragma solidity >=0.7.0 <0.9.0; interface TxUserWallet { function transferTo(address dest, uint amount) public; } contract TxAttackWallet { address payable owner; constructor() { owner = payable(msg.sender); } function() public { TxUserWallet(msg.sender).transferTo(owner, msg.sender.balance); } }
如果你的钱包通过核查 msg.sender
来验证发送方身份,你就会得到恶意钱包的地址,而不是所有者的地址。
但是通过核查 tx.origin
,得到的就会是启动交易的原始地址,它仍然会是所有者的地址。
恶意钱包会立即将你的资金抽出。
As in many programming languages, Solidity's integer types are not actually integers. They resemble integers when the values are small, but cannot represent arbitrarily large numbers.
The following code causes an overflow because the result of the addition is too large
to be stored in the type uint8
:
uint8 x = 255; uint8 y = 1; return x + y;
Solidity has two modes in which it deals with these overflows: Checked and Unchecked or "wrapping" mode.
The default checked mode will detect overflows and cause a failing assertion. You can disable this check
using unchecked { ... }
, causing the overflow to be silently ignored. The above code would return
0
if wrapped in unchecked { ... }
.
Even in checked mode, do not assume you are protected from overflow bugs. In this mode, overflows will always revert. If it is not possible to avoid the overflow, this can lead to a smart contract being stuck in a certain state.
In general, read about the limits of two's complement representation, which even has some more special edge cases for signed numbers.
Try to use require
to limit the size of inputs to a reasonable range and use the
:ref:`SMT checker<smt_checker>` to find potential overflows.
The Solidity type mapping
(see :ref:`mapping-types`) is a storage-only
key-value data structure that does not keep track of the keys that were
assigned a non-zero value. Because of that, cleaning a mapping without extra
information about the written keys is not possible.
If a mapping
is used as the base type of a dynamic storage array, deleting
or popping the array will have no effect over the mapping
elements. The
same happens, for example, if a mapping
is used as the type of a member
field of a struct
that is the base type of a dynamic storage array. The
mapping
is also ignored in assignments of structs or arrays containing a
mapping
.
pragma solidity >=0.6.0 <0.9.0; contract Map { mapping (uint => uint)[] array; function allocate(uint _newMaps) public { for (uint i = 0; i < _newMaps; i++) array.push(); } function writeMap(uint _map, uint _key, uint _value) public { array[_map][_key] = _value; } function readMap(uint _map, uint _key) public view returns (uint) { return array[_map][_key]; } function eraseMaps() public { delete array; } }
Consider the example above and the following sequence of calls: allocate(10)
,
writeMap(4, 128, 256)
.
At this point, calling readMap(4, 128)
returns 256.
If we call eraseMaps
, the length of state variable array
is zeroed, but
since its mapping
elements cannot be zeroed, their information stays alive
in the contract's storage.
After deleting array
, calling allocate(5)
allows us to access
array[4]
again, and calling readMap(4, 128)
returns 256 even without
another call to writeMap
.
If your mapping
information must be deleted, consider using a library similar to
iterable mapping,
allowing you to traverse the keys and delete their values in the appropriate mapping
.
- 在
for (var i = 0; i < arrayName.length; i++) { ... }
中,i
的类型会变为uint8
, 因为这是保存0
值所需的最小类型。如果数组超过 255 个元素,则循环不会终止。 - 不占用完整 32 字节的类型可能包含“脏高位”。这在当你访问
msg.data
的时候尤为重要 —— 它带来了延展性风险: 你既可以用原始字节0xff000001
也可以用0x00000001
作为参数来调用函数f(uint8 x)
以构造交易。 这两个参数都会被正常提供给合约,并且x
的值看起来都像是数字1
, 但msg.data
会不一样,所以如果你无论怎么使用keccak256(msg.data)
,你都会得到不同的结果。
如果编译器警告了你什么事,你最好修改一下,即使你不认为这个特定的警告不会产生安全隐患,因为那也有可能埋藏着其他的问题。 我们给出的任何编译器警告,都可以通过轻微的修改来去掉。
同时也请尽早添加 pragma experimental "v0.5.0";
来允许 0.5.0 版本的安全特性。
注意在这种情况下,experimental
并不意味着任何有风险的安全特性,
它只是可以允许一些在当前版本还不支持的 Solidity 特性,来提供向后的兼容。
限定 |ether| 的数量
限定 |storage| 在一个智能合约中 |ether| (或者其它通证)的数量。 如果你的源代码、编译器或者平台出现了 bug,可能会导致这些资产丢失。 如果你想控制你的损失,就要限定 |ether| 的数量。
保持你的合约短小精炼且易于理解。 找出无关于其它合约或库的功能。 有关源码质量可以采用的一般建议: 限制局部变量的数量以及函数的长度等等。 将实现的函数文档化,这样别人看到代码的时候就可以理解你的意图,并判断代码是否按照正确的意图实现。
大多数函数会首先做一些检查工作(例如谁调用了函数,参数是否在取值范围之内,它们是否发送了足够的 |ether| ,用户是否具有通证等等)。 这些检查工作应该首先被完成。
第二步,如果所有检查都通过了,应该接着进行会影响当前合约状态变量的那些处理。 与其它合约的交互应该是任何函数的最后一步。
早期合约延迟了一些效果的产生,为了等待外部函数调用以非错误状态返回。 由于上文所述的重入问题,这通常会导致严重的后果。
请注意,对已知合约的调用反过来也可能导致对未知合约的调用,所以最好是一直保持使用这个模式编写代码。
尽管将系统完全去中心化可以省去许多中间环节,但包含某种故障-安全模式仍然是好的做法,尤其是对于新的代码来说:
你可以在你的智能合约中增加一个函数实现某种程度上的自检查,比如“ |ether| 是否会泄露?”, “通证的总和是否与合约的余额相等?”等等。 请记住,你不能使用太多的 gas,所以可能需要通过 |off_chain| 计算来辅助。
如果自检查没有通过,合约就会自动切换到某种“故障安全”模式, 例如,关闭大部分功能,将控制权交给某个固定的可信第三方,或者将合约转换成一个简单的“退回我的钱”合约。
The more people examine a piece of code, the more issues are found. Asking people to review your code also helps as a cross-check to find out whether your code is easy to understand - a very important criterion for good smart contracts.
使用形式化验证可以执行自动化的数学证明,保证源代码符合特定的正式规范。 规范仍然是正式的(就像源代码一样),但通常要简单得多。
请注意形式化验证本身只能帮助你理解你做的(规范)和你怎么做(实际的实现)的之间的差别。 你仍然需要检查这个规范是否是想要的,而且没有漏掉由它产生的任何非计划内的效果。
Solidity implements a formal verification approach based on SMT solving. The
SMTChecker module automatically tries to prove that the code satisfies the
specification given by require/assert
statements. That is, it considers
require
statements as assumptions and tries to prove that the conditions
inside assert
statements are always true. If an assertion failure is
found, a counterexample is given to the user, showing how the assertion can be
violated.
The SMTChecker also checks automatically for arithmetic underflow/overflow, trivial conditions and unreachable code. It is currently an experimental feature, therefore in order to use it you need to enable it via :ref:`a pragma directive<smt_checker>`.
The SMTChecker traverses the Solidity AST creating and collecting program constraints. When it encounters a verification target, an SMT solver is invoked to determine the outcome. If a check fails, the SMTChecker provides specific input values that lead to the failure.
While the SMTChecker encodes Solidity code into SMT constraints, it contains two reasoning engines that use that encoding in different ways.
The SMT encoding tries to be as precise as possible, mapping Solidity types and expressions to their closest SMT-LIB representation, as shown in the table below.
Solidity type | SMT sort | Theories (quantifier-free) |
---|---|---|
Boolean | Bool | Bool |
intN, uintN, address, bytesN, enum | Integer | LIA, NIA |
array, mapping, bytes, string | Tuple (Array elements, Integer length) | Datatypes, Arrays, LIA |
struct | Tuple | Datatypes |
other types | Integer | LIA |
Types that are not yet supported are abstracted by a single 256-bit unsigned integer, where their unsupported operations are ignored.
For more details on how the SMT encoding works internally, see the paper SMT-based Verification of Solidity Smart Contracts.
The SMTChecker module implements two different reasoning engines that use the SMT encoding above, a Bounded Model Checker (BMC) and a system of Constrained Horn Clauses (CHC). Both engines are currently under development, and have different characteristics.
The BMC engine analyzes functions in isolation, that is, it does not take the overall behavior of the contract throughout many transactions into account when analyzing each function. Loops are also ignored in this engine at the moment. Internal function calls are inlined as long as they are not recursive, direct or indirectly. External function calls are inlined if possible, and knowledge that is potentially affected by reentrancy is erased.
The characteristics above make BMC easily prone to reporting false positives, but it is also lightweight and should be able to quickly find small local bugs.
The Solidity contract's Control Flow Graph (CFG) is modelled as a system of Horn clauses, where the lifecycle of the contract is represented by a loop that can visit every public/external function non-deterministically. This way, the behavior of the entire contract over an unbounded number of transactions is taken into account when analyzing any function. Loops are fully supported by this engine. Internal function calls are supported, but external function calls are currently unsupported.
The CHC engine is much more powerful than BMC in terms of what it can prove, and might require more computing resources.
The SMTChecker implements abstractions in an incomplete and sound way: If a bug is reported, it might be a false positive introduced by abstractions (due to erasing knowledge or using a non-precise type). If it determines that a verification target is safe, it is indeed safe, that is, there are no false negatives (unless there is a bug in the SMTChecker).
In the BMC engine, function calls to the same contract (or base contracts) are inlined when possible, that is, when their implementation is available. Calls to functions in other contracts are not inlined even if their code is available, since we cannot guarantee that the actual deployed code is the same.
The CHC engine creates nonlinear Horn clauses that use summaries of the called functions to support internal function calls. The same approach can and will be used for external function calls, but the latter requires more work regarding the entire state of the blockchain and is still unimplemented.
Complex pure functions are abstracted by an uninterpreted function (UF) over the arguments.
Functions | SMT behavior |
---|---|
assert |
Verification target |
require |
Assumption |
internal | BMC: Inline function call CHC: Function summaries |
external | BMC: Inline function call or erase knowledge about state variables and local storage references. CHC: Function summaries and erase state knowledge. |
gasleft , blockhash ,
keccak256 , ecrecover
ripemd160 , addmod ,
mulmod |
Abstracted with UF |
pure functions without implementation (external or complex) | Abstracted with UF |
external functions without implementation | BMC: Unsupported CHC: Nondeterministic summary |
others | Currently unsupported |
Using abstraction means loss of precise knowledge, but in many cases it does not mean loss of proving power.
// SPDX-License-Identifier: GPL-3.0 pragma solidity >=0.5.0; pragma experimental SMTChecker; // This may report a warning if no SMT solver available. contract Recover { function f( bytes32 hash, uint8 _v1, uint8 _v2, bytes32 _r1, bytes32 _r2, bytes32 _s1, bytes32 _s2 ) public pure returns (address) { address a1 = ecrecover(hash, _v1, _r1, _s1); require(_v1 == _v2); require(_r1 == _r2); require(_s1 == _s2); address a2 = ecrecover(hash, _v2, _r2, _s2); assert(a1 == a2); return a1; } }
In the example above, the SMTChecker is not expressive enough to actually
compute ecrecover
, but by modelling the function calls as uninterpreted
functions we know that the return value is the same when called on equivalent
parameters. This is enough to prove that the assertion above is always true.
Abstracting a function call with an UF can be done for functions known to be deterministic, and can be easily done for pure functions. It is however difficult to do this with general external functions, since they might depend on state variables.
External function calls also imply that any current knowledge that the SMTChecker might have regarding mutable state variables needs to be erased to guarantee no false negatives, since the called external function might direct or indirectly call a function in the analyzed contract that changes state variables.
Solidity implements aliasing for reference types with the same :ref:`data location<data-location>`. That means one variable may be modified through a reference to the same data area. The SMTChecker does not keep track of which references refer to the same data. This implies that whenever a local reference or state variable of reference type is assigned, all knowledge regarding variables of the same type and data location is erased. If the type is nested, the knowledge removal also includes all the prefix base types.
// SPDX-License-Identifier: GPL-3.0 pragma solidity >=0.5.0; pragma experimental ABIEncoderV2; pragma experimental SMTChecker; // This will report a warning contract Aliasing { uint[] array1; uint[][] array2; function f( uint[] memory a, uint[] memory b, uint[][] memory c, uint[] storage d ) internal { array1[0] = 42; a[0] = 2; c[0][0] = 2; b[0] = 1; // Erasing knowledge about memory references should not // erase knowledge about state variables. assert(array1[0] == 42); // However, an assignment to a storage reference will erase // storage knowledge accordingly. d[0] = 2; // Fails as false positive because of the assignment above. assert(array1[0] == 42); // Fails because `a == b` is possible. assert(a[0] == 2); // Fails because `c[i] == b` is possible. assert(c[0][0] == 2); assert(d[0] == 2); assert(b[0] == 1); } function g( uint[] memory a, uint[] memory b, uint[][] memory c, uint x ) public { f(a, b, c, array2[x]); } }
After the assignment to b[0]
, we need to clear knowledge about a
since
it has the same type (uint[]
) and data location (memory). We also need to
clear knowledge about c
, since its base type is also a uint[]
located
in memory. This implies that some c[i]
could refer to the same data as
b
or a
.
Notice that we do not clear knowledge about array
and d
because they
are located in storage, even though they also have type uint[]
. However,
if d
was assigned, we would need to clear knowledge about array
and
vice-versa.