Checking states of multiple contracts after inter-contract communication
Many smart-contracts interact with each other and after processing these messages changing their states. So, it is important to verify that states are changed as expected after executing transactions.
Contracts
Let’s consider a smart-contract that emulates a very simple wallet with two operations:
transfer
– transfer money from one wallet to another, decreases the wallet’s balance.receive
– receive money from another wallet, increases the target’s balance.
One could implement such a contract in the following way (sources are available wallet.fc):
int load_balance() inline method_id(-42) {
var ds = get_data().begin_parse();
return ds~load_uint(32);
}
() update_balance(int new_balance) impure inline method_id(-422) {
var new_data = begin_cell().store_uint(new_balance, 32).end_cell();
set_data(new_data);
}
{-
addr_std$10 anycast:(Maybe Anycast)
workchain_id:int8 address:bits256 = MsgAddressInt;
-}
slice calc_address(cell state_init) inline {
return begin_cell().store_uint(4, 3) ;; 0x100 : $10 + anycast (Maybe = 0)
.store_int(0, 8)
.store_uint(
cell_hash(state_init), 256)
.end_cell()
.begin_parse();
}
builder store_msgbody_prefix_ref(builder b, cell ref) inline {
return b.store_uint(1, 1 + 4 + 4 + 64 + 32 + 1 + 1).store_ref(ref);
}
() recv_internal(cell in_msg_full, slice in_msg_body) impure {
if (in_msg_body.slice_empty?()) {
;; ignore empty messages
return ();
}
slice cs = in_msg_full.begin_parse();
int flags = cs~load_uint(4);
if (flags & 1) {
;; ignore bounced messages
return ();
}
int op = in_msg_body~load_uint(32);
int value = in_msg_body~load_uint(32);
if (op == op::transfer) {
slice target = in_msg_body~load_msg_addr();
;; create a message that will decrease the balance of the target account
var msg_body = begin_cell()
.store_uint(op::receive, 32)
.store_uint(value, 32)
.store_slice(my_address())
.end_cell();
var msg = begin_cell()
.store_uint(msg_flag::bounceable, 6)
.store_slice(target)
.store_grams(0)
.store_msgbody_prefix_ref(msg_body);
;; decrease own balance
int balance = load_balance();
balance -= value;
update_balance(balance);
return send_raw_message(msg.end_cell(), 64);
}
if (op == op::receive) {
slice sender = in_msg_body~load_msg_addr();
if (equal_slice_bits(sender, my_address())) {
;; ignore receiving money from self
return ();
}
;; receive message increases the balance by the transferred value
int balance = load_balance();
balance += value;
update_balance(balance);
return ();
}
;; unknown operation
throw(error::unknown_action);
}
Checker
Now we want to ensure that triggering a transfer
operation from one wallet to another wallet will decrease the sender’s balance and increase the receiver’s balance with the same value. So, here we have two instances of the same wallet (emulating different accounts), with contract_id
s 1
and 2
, for sender
and target
, correspondingly.
One could implement such a contract in the following way (sources are available balance_transfer_checker.fc):
() recv_internal(int my_balance, int msg_value, cell in_msg_full, slice msg_body) impure {
tsa_forbid_failures();
;; ensure the initial message is not bounced
slice cs = in_msg_full.begin_parse();
int flags = cs~load_uint(4);
tsa_assert_not(flags & 1);
;; ensure that we perform a [transfer] operation
slice body_copy = msg_body;
int op = body_copy~load_uint(32);
tsa_assert(op == op::transfer);
;; transfer the 100 value
int value = body_copy~load_uint(32);
tsa_fetch_value(value, -1);
tsa_assert(value == 100);
;; ensure that the message body contains a target address
slice target = body_copy~load_msg_addr();
tsa_fetch_value(target, 0);
;; get the initial balances of the two accounts
int first_initial_balance = tsa_call_1_0(1, -42);
tsa_fetch_value(first_initial_balance, 1);
int second_initial_balance = tsa_call_1_0(2, -42);
tsa_fetch_value(second_initial_balance, 2);
;; ensure we have correct balances and cannot get overflows
tsa_assert(first_initial_balance >= 0);
tsa_assert(first_initial_balance <= 1000000000);
tsa_assert(second_initial_balance >= 0);
tsa_assert(second_initial_balance <= 1000000000);
;; send a message with a [transfer] operation
tsa_call_0_4(my_balance, msg_value, in_msg_full, msg_body, 1, 0);
;; get the new balances of the two accounts
int first_new_balance = tsa_call_1_0(1, -42);
tsa_fetch_value(first_new_balance, 11);
int second_new_balance = tsa_call_1_0(2, -42);
tsa_fetch_value(second_new_balance, 22);
tsa_allow_failures();
;; check that the balance of the first account has decreased by 100
throw_if(-10, first_initial_balance - value != first_new_balance);
;; check that the balance of the second account has increased by 100
throw_if(-20, second_initial_balance + value != second_new_balance);
}
This checker contains the following steps:
- Disable error detection using
tsa_forbid_failures
to make some assumptions about input. - Ensure the initial message is not bounced.
- Ensure that the operation is
transfer
by loading the op-code and making an assumption withtsa_assert
. - Load the value of the transfer and make an assumption that it is equal to 100.
- Ensure we have a target address in the message body.
- Get the initial balances of the two accounts using
tsa_call_1_0
and fetch them. - Ensure we have correct balances and cannot get overflows.
- Pass the message to the first wallet.
- Get the new balances of the two accounts using
tsa_call_1_0
and fetch them. - Enable error detection using
tsa_allow_failures
to check the result. - Check that the balance of the first account has decreased by 100.
- Check that the balance of the second account has increased by 100.
Inter-contract communication scheme
As we have two contracts that interact with each other, we need to provide an inter-contract communication scheme. This scheme is a JSON file that describes what contract may send a message to what contract by what operation code. Here we have only 2 operations – transfer
and receive
, so the scheme is very simple (sources are available wallet-intercontract-scheme.json):
[
{
"id": 1,
"handlers": [
{
"op": "10000000",
"destinations": [2]
},
{
"op": "20000000",
"destinations": [2]
}
]
}
]
Here we describe only the first wallet as we do not expect that the second wallet will send any messages.
Running the checker
To run this checker, you need to have either the tsa-cli.jar
JAR file downloaded/built or the Docker container pulled. To make it more clear, let’s use the JAR here – run this command from the root of the repository:
java -jar tsa-cli.jar safety-properties \
--checker tsa-safety-properties-examples/src/test/resources/examples/step3/balance_transfer_checker.fc \
--contract func tsa-safety-properties-examples/src/test/resources/examples/step3/wallet.fc \
--contract func tsa-safety-properties-examples/src/test/resources/examples/step3/wallet.fc \
--scheme tsa-safety-properties-examples/src/test/resources/examples/step3/wallet-intercontract-scheme.json \
--func-std tsa-safety-properties-examples/src/test/resources/imports/stdlib.fc \
--fift-std tsa-safety-properties-examples/src/test/resources/fiftstdlib
Here we pass the inter-contract communication scheme of the two wallets and provide the same contract twice to analyze the interaction between different accounts.
Result
The result of the checker execution is a SARIF report that contains the following information:
{
"$schema": "https://docs.oasis-open.org/sarif/sarif/v2.1.0/errata01/os/schemas/sarif-schema-2.1.0.json",
"version": "2.1.0",
"runs": [
{
"results": [
{
"level": "error",
"message": {
"text": "TvmFailure(exit=TVM user defined error with exit code -20, type=UnknownError, phase=COMPUTE_PHASE)"
},
"properties": {
"gasUsage": 7520,
"usedParameters": {
"type": "recvInternalInput",
"srcAddress": {
"cell": {
"data": "100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"
}
},
"msgBody": {
"cell": {
"data": "00010000000000000000000000000000000000000000000000000000011001001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000",
"knownTypes": [
{
"type": {
"type": "org.usvm.test.resolver.TvmTestCellDataIntegerRead",
"bitSize": 32,
"isSigned": false,
"endian": "BigEndian"
},
"offset": 0
},
{
"type": {
"type": "org.usvm.test.resolver.TvmTestCellDataIntegerRead",
"bitSize": 32,
"isSigned": false,
"endian": "BigEndian"
},
"offset": 32
},
{
"type": {
"type": "org.usvm.test.resolver.TvmTestCellDataMsgAddrRead"
},
"offset": 64
}
]
}
},
"msgValue": "73786976294838206464",
"bounce": false,
"bounced": false,
"ihrDisabled": false,
"ihrFee": "0",
"fwdFee": "0",
"createdLt": "0",
"createdAt": "0"
},
"fetchedValues": {
"-1": "100",
"0": {
"type": "org.usvm.test.resolver.TvmTestSliceValue",
"cell": {
"data": "0001000000000000000000000000000000000000000000000000000001100100100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"
},
"dataPos": 64
},
"1": "536870912",
"2": "0",
"11": "536870812",
"22": "0"
},
"resultStack": [
"0"
]
},
"ruleId": "user-defined-error"
}
],
"tool": {
"driver": {
"name": "TSA",
"organization": "Explyt"
}
}
}
]
}
We are interested in the following lines:
TvmFailure(exit=TVM user defined error with exit code -20, type=UnknownError, phase=COMPUTE_PHASE)
.srcAddress
– the address of the sender with a value100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
fetchedValues
with index0
that corresponds to the concrete value of thetarget
.
The found error means that the balance of the second account has not increased by 100 after the transfer operation. It happens when an address of the sender equals to the address of the receiver – it can be checked that srcAddress
and target
are the same.
After analyzing the source code of out contract, we could discover a logical error in the wallet code:
if (equal_slice_bits(sender, my_address())) {
;; ignore receiving money from self
return ();
}
This block of code leads to decreasing the balance of the sender but does not increase the balance of the receiver.