Skip to content

Commit 80badac

Browse files
author
bohendo
committed
Merge branch 'master' into nssc
2 parents 7d19b4a + 7762922 commit 80badac

File tree

119 files changed

+5624
-580
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+5624
-580
lines changed

.github/dependabot.yml

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
version: 2
2+
updates:
3+
- package-ecosystem: "github-actions"
4+
directory: "/"
5+
schedule:
6+
interval: "daily"

.github/workflows/ci.yml

+7-6
Original file line numberDiff line numberDiff line change
@@ -12,16 +12,17 @@ on:
1212

1313
jobs:
1414
tests:
15-
runs-on: ubuntu-latest
15+
runs-on: ubuntu-22.04
1616
strategy:
17+
fail-fast: false
1718
matrix:
18-
type: ["slither", "echidna", "manticore"]
19+
type: ["slither", "manticore"]
1920
steps:
20-
- uses: actions/checkout@v1
21-
- name: Set up Python 3.6
22-
uses: actions/setup-python@v1
21+
- uses: actions/checkout@v3
22+
- name: Set up Python 3.8
23+
uses: actions/setup-python@v4
2324
with:
24-
python-version: 3.6
25+
python-version: 3.8
2526
- name: Install dependencies
2627
run: |
2728
sudo wget -O /usr/bin/solc https://github.com/ethereum/solidity/releases/download/v0.5.11/solc-static-linux

.github/workflows/echidna.yml

+128
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,128 @@
1+
name: Echidna
2+
3+
on:
4+
push:
5+
branches:
6+
- master
7+
- dev
8+
pull_request:
9+
schedule:
10+
# run CI every day even if no PRs/merges occur
11+
- cron: '0 12 * * *'
12+
13+
jobs:
14+
tests:
15+
name: ${{ matrix.name }}
16+
continue-on-error: ${{ matrix.flaky == true }}
17+
runs-on: ubuntu-22.04
18+
strategy:
19+
fail-fast: false
20+
matrix:
21+
include:
22+
- name: Exercise 1
23+
workdir: program-analysis/echidna/exercises/exercise1/
24+
files: solution.sol
25+
contract: TestToken
26+
outcome: failure
27+
expected: 'echidna_test_balance:\s*failed'
28+
- name: Exercise 2
29+
workdir: program-analysis/echidna/exercises/exercise2/
30+
files: solution.sol
31+
contract: TestToken
32+
outcome: failure
33+
expected: 'echidna_no_transfer:\s*failed'
34+
- name: Exercise 3
35+
workdir: program-analysis/echidna/exercises/exercise3/
36+
files: solution.sol
37+
contract: TestToken
38+
outcome: failure
39+
expected: 'echidna_test_balance:\s*failed'
40+
- name: Exercise 4
41+
workdir: program-analysis/echidna/exercises/exercise4/
42+
files: solution.sol
43+
config: config.yaml
44+
contract: Token
45+
outcome: failure
46+
expected: 'transfer(address,uint256):\s*failed'
47+
- name: TestToken
48+
workdir: program-analysis/echidna/example/
49+
files: testtoken.sol
50+
contract: TestToken
51+
outcome: failure
52+
expected: 'echidna_balance_under_1000:\s*failed'
53+
- name: Gas estimation
54+
workdir: program-analysis/echidna/example/
55+
files: gas.sol
56+
config: gas.yaml
57+
outcome: success
58+
expected: 'f(42,123,'
59+
flaky: true
60+
- name: Multi
61+
workdir: program-analysis/echidna/example/
62+
files: multi.sol
63+
config: filter.yaml
64+
outcome: failure
65+
expected: 'echidna_state4:\s*failed'
66+
- name: Assert
67+
workdir: program-analysis/echidna/example/
68+
files: assert.sol
69+
config: assert.yaml
70+
outcome: failure
71+
expected: 'inc(uint256):\s*failed'
72+
- name: PopsicleBroken
73+
workdir: program-analysis/echidna/example/
74+
files: PopsicleBroken.sol
75+
solc-version: 0.8.4
76+
config: Popsicle.yaml
77+
contract: PopsicleBroken
78+
outcome: failure
79+
expected: 'totalBalanceAfterTransferIsPreserved(address,uint256):\s*failed'
80+
- name: PopsicleFixed
81+
workdir: program-analysis/echidna/example/
82+
files: PopsicleFixed.sol
83+
solc-version: 0.8.4
84+
config: Popsicle.yaml
85+
contract: PopsicleFixed
86+
outcome: success
87+
expected: 'totalBalanceAfterTransferIsPreserved(address,uint256):\s*passed'
88+
- name: TestDepositWithPermit
89+
workdir: program-analysis/echidna/example/
90+
files: TestDepositWithPermit.sol
91+
solc-version: 0.8.0
92+
config: testdeposit.yaml
93+
contract: TestDepositWithPermit
94+
outcome: success
95+
expected: 'testERC20PermitDeposit(uint256):\s*passed'
96+
97+
steps:
98+
- name: Checkout repository
99+
uses: actions/checkout@v3
100+
- name: Run Echidna
101+
uses: crytic/echidna-action@v2
102+
id: echidna
103+
continue-on-error: true
104+
with:
105+
files: ${{ matrix.files }}
106+
contract: ${{ matrix.contract }}
107+
config: ${{ matrix.config }}
108+
output-file: ${{ matrix.files }}.out
109+
solc-version: ${{ matrix.solc-version || '0.5.11' }}
110+
echidna-workdir: ${{ matrix.workdir }}
111+
echidna-version: edge
112+
- name: Verify that the exit code is correct
113+
run: |
114+
if [[ ${{ steps.echidna.outcome }} = ${{ matrix.outcome }} ]]; then
115+
echo "Outcome matches"
116+
else
117+
echo "Outcome mismatch. Expected ${{ matrix.outcome }} but got ${{ steps.echidna.outcome }}"
118+
exit 1
119+
fi
120+
- name: Verify that the output is correct
121+
run: |
122+
if grep -q "${{ matrix.expected }}" "${{ steps.echidna.outputs.output-file }}"; then
123+
echo "Output matches"
124+
else
125+
echo "Output mismatch. Expected something matching '${{ matrix.expected }}'. Got the following:"
126+
cat "${{ steps.echidna.outputs.output-file }}"
127+
exit 1
128+
fi

.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
.DS_Store

README.md

+22
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# Building Secure Smart Contracts
2+
3+
![](https://github.com/crytic/building-secure-contracts/workflows/CI/badge.svg) ![](https://github.com/crytic/building-secure-contracts/workflows/Echidna/badge.svg)
4+
5+
Follow our guidelines and best practices to write secure smart contracts.
6+
7+
**Table of contents:**
8+
9+
- [Development guidelines](./development-guidelines)
10+
- [High-level best practices](./development-guidelines/guidelines.md): High-level best-practices for all smart contracts
11+
- [Incident Response Recommendations](./development-guidelines/incident_response.md): Guidelines on how to formulate an incident response plan
12+
- [Secure development workflow](./development-guidelines/workflow.md): A rough, high-level process to follow while you write code
13+
- [Token integration checklist](./development-guidelines/token_integration.md): What to check when interacting with arbitrary token
14+
- [Learn EVM](./learn_evm): EVM technical knowledge
15+
- [EIPs - forks](./learn_evm/eips_forks.md): summarize the EIPs included in each fork
16+
- [Program analysis](./program-analysis): How to use automated tools to secure contracts
17+
- [Echidna](./program-analysis/echidna): a fuzzer that will check your contract's properties.
18+
- [Slither](./program-analysis/slither): a static analyzer avaialable through a CLI and scriptable interface.
19+
- [Manticore](./program-analysis/manticore): a symbolic execution engine that can prove the correctness properties.
20+
- For each tool, this training material will provide:
21+
- a theoretical introduction, a walkthrough of its API, and a set of exercises.
22+
- exercises expected to require ~two hours to practically learn its operation.

development-guidelines/README.md

+5-95
Original file line numberDiff line numberDiff line change
@@ -1,96 +1,6 @@
1-
# Development Guidelines
1+
List of smart contract development best practices
22

3-
The following recommendations describe high-level best pratices.
4-
5-
## Design Guidelines
6-
7-
The design of the contract should be discussed ahead of time, prior writing any line of code.
8-
9-
### Documentation and specification
10-
11-
Documentation can be written at different levels, and should be updated while implementing the contracts:
12-
13-
- **A plain English description of the system**, describing what the contracts do and any assumptions on the codebase.
14-
15-
- **Schema and architectural diagrams**, including the contracts interactions, and the state machine of the system. [Slither printers](https://github.com/crytic/slither/wiki/Printer-documentation) will help to generate these schemas.
16-
17-
- **Thorough code documentation**, the [Natspec format](https://solidity.readthedocs.io/en/develop/natspec-format.html) can be used for Solidity.
18-
19-
## Onchain vs Offchain computation
20-
21-
- **Put as much code as you can offchain.** Keep the onchain layer small. Rely on offchain code for any data pre-processing for which the result can be easily verified onchain. You need an ordered list? Sort the list offchain, and check only its order onchain.
22-
23-
## Upgradeability
24-
25-
We discussed the different upgradeability solutions in [our blogpost](https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/). The choice of upgradeable contract or not must be deliberate prior coding. The decision will influence how you structure our code. The summary is:
26-
27-
- **Favor [contract’s migration](https://blog.trailofbits.com/2018/10/29/how-contract-migration-works/) over upgradeability.** Migrations system have the same advantages than upgradeable, without their drawbacks.
28-
29-
- **Use the data separation pattern over the delegatecallproxy one.** If your project has a clear abstraction separation, upgradeability using the data separation pattern will necessitate only a few adjustments. The delegatecallproxy requires EVM expertise and is highly error-prone.
30-
31-
- **Document the migration/upgrade procedure before the deployment.** If you have to react under stress without any guidelines, you will make mistakes. Write the procedure to follow ahead of time. It should include:
32-
- What are the calls to make to initiate the new contracts.
33-
- Where are stored the keys, and how to access them.
34-
- How to check the deployment. A post-deployment script should be prepared, and fully tested.
35-
36-
# Implementation Guidelines
37-
38-
The main advice to keep in mind is to **strive for simplicity.** Always use the simplest solution that fits your purpose. Always keep in mind that anyone should be able to understand your solution.
39-
40-
## Function Composition
41-
42-
The architecture of your codebase will also heavily influence the ease to review your code.
43-
44-
- **Split the logic of your system**, either through multiple contracts or by grouping similar functions together (ex: authentification, arithmetic, …). It will ease targeting the features of the code
45-
46-
- **Write small functions, with a clear purpose.** Small code is simpler to review and allow the testing of individual components.
47-
48-
## Inheritance
49-
50-
- **Keep the inheritance manageable.** While inheritance should be used to divide the logic, your project should aim to minimize the depth and the width of the inheritance tree.
51-
52-
- **Use Slither’s [inheritance printer](https://github.com/crytic/slither/wiki/Printer-documentation#inheritance-graph) to check the contracts’ hierarchy.** The inheritance printer will help you to watch the hierarchy grows.
53-
54-
## Events
55-
56-
- **Log any crucial operation.** Events will help to debug the contract during the development, and monitor it after its deployment.
57-
58-
## Blockchain pitfalls
59-
60-
- **Be aware of the most common vulnerabilities patterns.** There are many online resources to learn about common issues, such as [Ethernaut CTF](https://ethernaut.openzeppelin.com/), [Capture the Ether](https://capturetheether.com/), or [Not so smart contract](https://github.com/crytic/not-so-smart-contracts/).
61-
62-
- **Be aware of the warnings sections in the [Solidity documentation](https://solidity.readthedocs.io/en/latest/).** The warnings sections will inform you about not obvious behavior of the language.
63-
64-
## Dependencies
65-
66-
- **Use well-tested libraries.** Importing code from well-tested libraries will reduce the likelihood for you to write buggy code. If you want to write an ERC20 contract, use [OpenZeppelin](https://github.com/OpenZeppelin/openzeppelin-contracts/tree/master/contracts/token/ERC20).
67-
68-
- **Use a dependencies manager, avoid copy-and-paste of code.** If you rely on an external source, be sure to be up to date with the original codebase.
69-
70-
## Testing and Verifying
71-
72-
- **Write thorough unit-tests.** An extensive test suite is crucial to build high-quality software.
73-
74-
- **Write [Slither](https://github.com/crytic/slither), [Echidna](https://github.com/crytic/echidna) and [Manticore](https://github.com/trailofbits/manticore) custom checks and properties.** Automated tools will help you to ensure your contracts is secure. The content of this repository will help you to write efficient checks and properties.
75-
76-
- **Use [crytic.io](https://crytic.io/).** Crytic will give you access to Slither’s private detectors, and will provide github integration.
77-
78-
## Solidity
79-
80-
- **Favor Solidity 0.5 over 0.4 and 0.6.** Solidity 0.5 is overall more secure and has better inbuilt practices and 0.4. Solidity 0.6 is too young to be used in production.
81-
82-
- **Use a stable compiler’s version to compile, use the latest to check for warnings.** You should check that your code leads to no warning with the latest compiler version. Solidity compiler has a fast release cycle, and has a history of compiler bugs, as a result, we recommend to not use the latest version for deployment (see Slither’s [solc version recommendation](https://github.com/crytic/slither/wiki/Detector-Documentation#recommendation-33)).
83-
84-
- **Do not use inline assembly.** Assembly requires EVM expertise, if you do not master the yellow paper, do not write EVM code.
85-
86-
## Post development Guidelines
87-
88-
Once the contract has been developed, consider to:
89-
90-
- **Monitor your contracts.** Watch the contracts’ logs, and be ready to react in case of contracts or wallet compromise.
91-
92-
- **Add your contact info to [blockchain-security-contacts](https://github.com/crytic/blockchain-security-contacts).** The list will help third-parties to contact and coordinate with you if any security flaw is discovered.
93-
94-
- **Secure the wallets of privileged users.** Follow the [best practices](https://blog.trailofbits.com/2018/11/27/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/) to store the wallets.
95-
96-
- **Have a response to incident plan.** Take in consideration that you can be compromised. Even if your contracts are free of bugs, an attacker can take control of the contract’s owner keys.
3+
- [High-level best practices](./guidelines.md): High-level best-practices for all smart contracts
4+
- [Token integration checklist](./token_integration.md): What to check when interacting with arbitrary tokens
5+
- [Incident Response Recommendations](./incident_response.md): Guidelines on how to formulate an incident response plan
6+
- [Secure development workflow](./workflow.md): A rough, high-level process to follow while you write code

0 commit comments

Comments
 (0)