123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204 |
- methods {
- totalSupply(uint256) returns uint256 envfree
- balanceOf(address, uint256) returns uint256 envfree
- exists_wrapper(uint256) returns bool envfree
- }
-
- /// given two different token ids, if totalSupply for one changes, then
- /// totalSupply for other should not
- rule token_totalSupply_independence(method f)
- filtered {
- f -> f.selector != safeBatchTransferFrom(address,address,uint256[],uint256[],bytes).selector
- }
- {
- uint256 token1; uint256 token2;
- require token1 != token2;
- uint256 token1_before = totalSupply(token1);
- uint256 token2_before = totalSupply(token2);
- env e; calldataarg args;
- f(e, args);
- uint256 token1_after = totalSupply(token1);
- uint256 token2_after = totalSupply(token2);
- assert token1_after != token1_before => token2_after == token2_before,
- "methods must not change the total supply of more than one token";
- }
- /// TODO possibly show equivalence between batch and non-batch methods
- /// in order to leverage non-batch rules wrt batch rules
- /// The result of transferring a single token must be equivalent whether done
- /// via safeTransferFrom or safeBatchTransferFrom.
- rule singleTokenSafeTransferFromSafeBatchTransferFromEquivalence {
- storage beforeTransfer = lastStorage;
- env e;
- address holder; address recipient;
- uint256 token; uint256 transferAmount; bytes data;
- uint256[] tokens; uint256[] transferAmounts;
- mathint holderStartingBalance = balanceOf(holder, token);
- mathint recipientStartingBalance = balanceOf(recipient, token);
- require tokens.length == 1; require transferAmounts.length == 1;
- require tokens[0] == token; require transferAmounts[0] == transferAmount;
- // transferring via safeTransferFrom
- safeTransferFrom(e, holder, recipient, token, transferAmount, data) at beforeTransfer;
- mathint holderSafeTransferFromBalanceChange = holderStartingBalance - balanceOf(holder, token);
- mathint recipientSafeTransferFromBalanceChange = balanceOf(recipient, token) - recipientStartingBalance;
- // transferring via safeBatchTransferFrom
- safeBatchTransferFrom(e, holder, recipient, tokens, transferAmounts, data) at beforeTransfer;
- mathint holderSafeBatchTransferFromBalanceChange = holderStartingBalance - balanceOf(holder, token);
- mathint recipientSafeBatchTransferFromBalanceChange = balanceOf(recipient, token) - recipientStartingBalance;
- assert holderSafeTransferFromBalanceChange == holderSafeBatchTransferFromBalanceChange
- && recipientSafeTransferFromBalanceChange == recipientSafeBatchTransferFromBalanceChange,
- "Transferring a single token via safeTransferFrom or safeBatchTransferFrom must be equivalent";
- }
- /// The results of transferring multiple tokens must be equivalent whether done
- /// separately via safeTransferFrom or together via safeBatchTransferFrom.
- rule multipleTokenSafeTransferFromSafeBatchTransferFromEquivalence {
- storage beforeTransfers = lastStorage;
- env e;
- address holder; address recipient; bytes data;
- uint256 tokenA; uint256 tokenB; uint256 tokenC;
- uint256 transferAmountA; uint256 transferAmountB; uint256 transferAmountC;
- uint256[] tokens; uint256[] transferAmounts;
- mathint holderStartingBalanceA = balanceOf(holder, tokenA);
- mathint holderStartingBalanceB = balanceOf(holder, tokenB);
- mathint holderStartingBalanceC = balanceOf(holder, tokenC);
- require tokens.length == 3; require transferAmounts.length == 3;
- require tokens[0] == tokenA; require transferAmounts[0] == transferAmountA;
- require tokens[1] == tokenB; require transferAmounts[1] == transferAmountB;
- require tokens[2] == tokenC; require transferAmounts[2] == transferAmountC;
- // transferring via safeTransferFrom
- safeTransferFrom(e, holder, recipient, tokenA, transferAmountA, data) at beforeTransfers;
- safeTransferFrom(e, holder, recipient, tokenB, transferAmountB, data);
- safeTransferFrom(e, holder, recipient, tokenC, transferAmountC, data);
- mathint holderSafeTransferFromChangeA = holderStartingBalanceA - balanceOf(holder, tokenA);
- mathint holderSafeTransferFromChangeB = holderStartingBalanceB - balanceOf(holder, tokenB);
- mathint holderSafeTransferFromChangeC = holderStartingBalanceC - balanceOf(holder, tokenC);
- // transferring via safeBatchTransferFrom
- safeBatchTransferFrom(e, holder, recipient, tokens, transferAmounts, data) at beforeTransfers;
- mathint holderSafeBatchTransferFromBalanceChangeA = holderStartingBalanceA - balanceOf(holder, tokenA);
- mathint holderSafeBatchTransferFromBalanceChangeB = holderStartingBalanceB - balanceOf(holder, tokenB);
- mathint holderSafeBatchTransferFromBalanceChangeC = holderStartingBalanceC - balanceOf(holder, tokenC);
- assert holderSafeTransferFromChangeA == holderSafeBatchTransferFromBalanceChangeA
- && holderSafeTransferFromChangeB == holderSafeBatchTransferFromBalanceChangeB
- && holderSafeTransferFromChangeC == holderSafeBatchTransferFromBalanceChangeC,
- "Transferring multiple tokens via safeTransferFrom or safeBatchTransferFrom must be equivalent";
- }
- /*
- /// If passed empty token and burn amount arrays, burnBatch must not change
- /// token balances or address permissions.
- rule burnBatchOnEmptyArraysChangesNothing {
- env e;
- address holder; uint256 token;
- address nonHolderA; address nonHolderB;
- uint256 startingBalance = balanceOf(holder, token);
- bool startingPermissionNonHolderA = isApprovedForAll(holder, nonHolderA);
- bool startingPermissionNonHolderB = isApprovedForAll(holder, nonHolderB);
- uint256[] noTokens; uint256[] noBurnAmounts;
- require noTokens.length == 0; require noBurnAmounts.length == 0;
- burnBatch(e, holder, noTokens, noBurnAmounts);
- uint256 endingBalance = balanceOf(holder, token);
- bool endingPermissionNonHolderA = isApprovedForAll(holder, nonHolderA);
- bool endingPermissionNonHolderB = isApprovedForAll(holder, nonHolderB);
- assert startingBalance == endingBalance,
- "burnBatch must not change token balances if passed empty arrays";
- assert startingPermissionNonHolderA == endingPermissionNonHolderA
- && startingPermissionNonHolderB == endingPermissionNonHolderB,
- "burnBatch must not change account permissions if passed empty arrays";
- }
- */
- /******************************************************************************/
- ghost mapping(uint256 => mathint) sumOfBalances {
- init_state axiom forall uint256 token . sumOfBalances[token] == 0;
- }
- hook Sstore _balances[KEY uint256 token][KEY address user] uint256 newValue (uint256 oldValue) STORAGE {
- sumOfBalances[token] = sumOfBalances[token] + newValue - oldValue;
- }
- // status: not passing, because mint and burn are the same as transferring to/from
- // the 0 address.
- invariant total_supply_is_sum_of_balances(uint256 token)
- sumOfBalances[token] == totalSupply(token)
- {
- preserved {
- requireInvariant balanceOfZeroAddressIsZero(token);
- }
- }
- /*
- rule total_supply_is_sum_of_balances_as_rule {
- uint256 token;
- require sumOfBalances[token] == totalSupply(token) + balanceOf(0, token);
- mathint sum_before = sumOfBalances[token];
- method f; calldataarg arg; env e;
- f(e, arg);
- mathint sum_after = sumOfBalances[token];
- assert sumOfBalances[token] == totalSupply(token) + balanceOf(0, token);
- }
- */
- /******************************************************************************/
- /// The balance of a token for the zero address must be zero.
- invariant balanceOfZeroAddressIsZero(uint256 token)
- balanceOf(0, token) == 0
- // if a user has a token, then the token should exist
- /*
- hook Sload _balances[...] {
- require balance <= totalSupply
- }
- */
- rule held_tokens_should_exist {
- address user; uint256 token;
- requireInvariant balanceOfZeroAddressIsZero(token);
- // This assumption is safe because of total_supply_is_sum_of_balances
- require balanceOf(user, token) <= totalSupply(token);
- assert balanceOf(user, token) > 0 => exists_wrapper(token),
- "if a user's balance for a token is positive, the token must exist";
- }
- /******************************************************************************/
- rule sanity {
- method f; env e; calldataarg args;
- f(e, args);
- assert false;
- }
|