ERC1155Supply.spec 9.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234
  1. methods {
  2. totalSupply(uint256) returns uint256 envfree
  3. balanceOf(address, uint256) returns uint256 envfree
  4. exists_wrapper(uint256) returns bool envfree
  5. }
  6. /// given two different token ids, if totalSupply for one changes, then
  7. /// totalSupply for other should not
  8. rule token_totalSupply_independence(method f)
  9. filtered {
  10. f -> f.selector != safeBatchTransferFrom(address,address,uint256[],uint256[],bytes).selector
  11. }
  12. {
  13. uint256 token1; uint256 token2;
  14. require token1 != token2;
  15. uint256 token1_before = totalSupply(token1);
  16. uint256 token2_before = totalSupply(token2);
  17. env e; calldataarg args;
  18. f(e, args);
  19. uint256 token1_after = totalSupply(token1);
  20. uint256 token2_after = totalSupply(token2);
  21. assert token1_after != token1_before => token2_after == token2_before,
  22. "methods must not change the total supply of more than one token";
  23. }
  24. /// TODO possibly show equivalence between batch and non-batch methods
  25. /// in order to leverage non-batch rules wrt batch rules
  26. /// The result of transferring a single token must be equivalent whether done
  27. /// via safeTransferFrom or safeBatchTransferFrom.
  28. rule singleTokenSafeTransferFromSafeBatchTransferFromEquivalence {
  29. storage beforeTransfer = lastStorage;
  30. env e;
  31. address holder; address recipient;
  32. uint256 token; uint256 transferAmount; bytes data;
  33. uint256[] tokens; uint256[] transferAmounts;
  34. mathint holderStartingBalance = balanceOf(holder, token);
  35. mathint recipientStartingBalance = balanceOf(recipient, token);
  36. require tokens.length == 1; require transferAmounts.length == 1;
  37. require tokens[0] == token; require transferAmounts[0] == transferAmount;
  38. // transferring via safeTransferFrom
  39. safeTransferFrom(e, holder, recipient, token, transferAmount, data) at beforeTransfer;
  40. mathint holderSafeTransferFromBalanceChange = holderStartingBalance - balanceOf(holder, token);
  41. mathint recipientSafeTransferFromBalanceChange = balanceOf(recipient, token) - recipientStartingBalance;
  42. // transferring via safeBatchTransferFrom
  43. safeBatchTransferFrom(e, holder, recipient, tokens, transferAmounts, data) at beforeTransfer;
  44. mathint holderSafeBatchTransferFromBalanceChange = holderStartingBalance - balanceOf(holder, token);
  45. mathint recipientSafeBatchTransferFromBalanceChange = balanceOf(recipient, token) - recipientStartingBalance;
  46. assert holderSafeTransferFromBalanceChange == holderSafeBatchTransferFromBalanceChange
  47. && recipientSafeTransferFromBalanceChange == recipientSafeBatchTransferFromBalanceChange,
  48. "Transferring a single token via safeTransferFrom or safeBatchTransferFrom must be equivalent";
  49. }
  50. /// The results of transferring multiple tokens must be equivalent whether done
  51. /// separately via safeTransferFrom or together via safeBatchTransferFrom.
  52. rule multipleTokenSafeTransferFromSafeBatchTransferFromEquivalence {
  53. storage beforeTransfers = lastStorage;
  54. env e;
  55. address holder; address recipient; bytes data;
  56. uint256 tokenA; uint256 tokenB; uint256 tokenC;
  57. uint256 transferAmountA; uint256 transferAmountB; uint256 transferAmountC;
  58. uint256[] tokens; uint256[] transferAmounts;
  59. mathint holderStartingBalanceA = balanceOf(holder, tokenA);
  60. mathint holderStartingBalanceB = balanceOf(holder, tokenB);
  61. mathint holderStartingBalanceC = balanceOf(holder, tokenC);
  62. mathint recipientStartingBalanceA = balanceOf(recipient, tokenA);
  63. mathint recipientStartingBalanceB = balanceOf(recipient, tokenB);
  64. mathint recipientStartingBalanceC = balanceOf(recipient, tokenC);
  65. require tokens.length == 3; require transferAmounts.length == 3;
  66. require tokens[0] == tokenA; require transferAmounts[0] == transferAmountA;
  67. require tokens[1] == tokenB; require transferAmounts[1] == transferAmountB;
  68. require tokens[2] == tokenC; require transferAmounts[2] == transferAmountC;
  69. // transferring via safeTransferFrom
  70. safeTransferFrom(e, holder, recipient, tokenA, transferAmountA, data) at beforeTransfers;
  71. safeTransferFrom(e, holder, recipient, tokenB, transferAmountB, data);
  72. safeTransferFrom(e, holder, recipient, tokenC, transferAmountC, data);
  73. mathint holderSafeTransferFromBalanceChangeA = holderStartingBalanceA - balanceOf(holder, tokenA);
  74. mathint holderSafeTransferFromBalanceChangeB = holderStartingBalanceB - balanceOf(holder, tokenB);
  75. mathint holderSafeTransferFromBalanceChangeC = holderStartingBalanceC - balanceOf(holder, tokenC);
  76. mathint recipientSafeTransferFromBalanceChangeA = balanceOf(recipient, tokenA) - recipientStartingBalanceA;
  77. mathint recipientSafeTransferFromBalanceChangeB = balanceOf(recipient, tokenB) - recipientStartingBalanceB;
  78. mathint recipientSafeTransferFromBalanceChangeC = balanceOf(recipient, tokenC) - recipientStartingBalanceC;
  79. // transferring via safeBatchTransferFrom
  80. safeBatchTransferFrom(e, holder, recipient, tokens, transferAmounts, data) at beforeTransfers;
  81. mathint holderSafeBatchTransferFromBalanceChangeA = holderStartingBalanceA - balanceOf(holder, tokenA);
  82. mathint holderSafeBatchTransferFromBalanceChangeB = holderStartingBalanceB - balanceOf(holder, tokenB);
  83. mathint holderSafeBatchTransferFromBalanceChangeC = holderStartingBalanceC - balanceOf(holder, tokenC);
  84. mathint recipientSafeBatchTransferFromBalanceChangeA = balanceOf(recipient, tokenA) - recipientStartingBalanceA;
  85. mathint recipientSafeBatchTransferFromBalanceChangeB = balanceOf(recipient, tokenB) - recipientStartingBalanceB;
  86. mathint recipientSafeBatchTransferFromBalanceChangeC = balanceOf(recipient, tokenC) - recipientStartingBalanceC;
  87. assert holderSafeTransferFromBalanceChangeA == holderSafeBatchTransferFromBalanceChangeA
  88. && holderSafeTransferFromBalanceChangeB == holderSafeBatchTransferFromBalanceChangeB
  89. && holderSafeTransferFromBalanceChangeC == holderSafeBatchTransferFromBalanceChangeC
  90. && recipientSafeTransferFromBalanceChangeA == recipientSafeBatchTransferFromBalanceChangeA
  91. && recipientSafeTransferFromBalanceChangeB == recipientSafeBatchTransferFromBalanceChangeB
  92. && recipientSafeTransferFromBalanceChangeC == recipientSafeBatchTransferFromBalanceChangeC,
  93. "Transferring multiple tokens via safeTransferFrom or safeBatchTransferFrom must be equivalent";
  94. }
  95. /// If transfer methods do not revert, the input arrays must be the same length.
  96. rule transfersHaveSameLengthInputArrays {
  97. env e;
  98. address holder; address recipient; bytes data;
  99. uint256[] tokens; uint256[] transferAmounts;
  100. safeBatchTransferFrom(e, holder, recipient, tokens, transferAmounts, data);
  101. uint256 tokensLength = tokens.length;
  102. uint256 transferAmountsLength = transferAmounts.length;
  103. assert tokens.length == transferAmounts.length,
  104. "If transfer methods do not revert, the input arrays must be the same length";
  105. }
  106. /*
  107. /// If passed empty token and burn amount arrays, burnBatch must not change
  108. /// token balances or address permissions.
  109. rule burnBatchOnEmptyArraysChangesNothing {
  110. env e;
  111. address holder; uint256 token;
  112. address nonHolderA; address nonHolderB;
  113. uint256 startingBalance = balanceOf(holder, token);
  114. bool startingPermissionNonHolderA = isApprovedForAll(holder, nonHolderA);
  115. bool startingPermissionNonHolderB = isApprovedForAll(holder, nonHolderB);
  116. uint256[] noTokens; uint256[] noBurnAmounts;
  117. require noTokens.length == 0; require noBurnAmounts.length == 0;
  118. burnBatch(e, holder, noTokens, noBurnAmounts);
  119. uint256 endingBalance = balanceOf(holder, token);
  120. bool endingPermissionNonHolderA = isApprovedForAll(holder, nonHolderA);
  121. bool endingPermissionNonHolderB = isApprovedForAll(holder, nonHolderB);
  122. assert startingBalance == endingBalance,
  123. "burnBatch must not change token balances if passed empty arrays";
  124. assert startingPermissionNonHolderA == endingPermissionNonHolderA
  125. && startingPermissionNonHolderB == endingPermissionNonHolderB,
  126. "burnBatch must not change account permissions if passed empty arrays";
  127. }
  128. */
  129. /// TODO
  130. /******************************************************************************/
  131. ghost mapping(uint256 => mathint) sumOfBalances {
  132. init_state axiom forall uint256 token . sumOfBalances[token] == 0;
  133. }
  134. hook Sstore _balances[KEY uint256 token][KEY address user] uint256 newValue (uint256 oldValue) STORAGE {
  135. sumOfBalances[token] = sumOfBalances[token] + newValue - oldValue;
  136. }
  137. // status: not passing, because mint and burn are the same as transferring to/from
  138. // the 0 address.
  139. invariant total_supply_is_sum_of_balances(uint256 token)
  140. sumOfBalances[token] == totalSupply(token)
  141. {
  142. preserved {
  143. requireInvariant balanceOfZeroAddressIsZero(token);
  144. }
  145. }
  146. /*
  147. rule total_supply_is_sum_of_balances_as_rule {
  148. uint256 token;
  149. require sumOfBalances[token] == totalSupply(token) + balanceOf(0, token);
  150. mathint sum_before = sumOfBalances[token];
  151. method f; calldataarg arg; env e;
  152. f(e, arg);
  153. mathint sum_after = sumOfBalances[token];
  154. assert sumOfBalances[token] == totalSupply(token) + balanceOf(0, token);
  155. }
  156. */
  157. /******************************************************************************/
  158. /// The balance of a token for the zero address must be zero.
  159. invariant balanceOfZeroAddressIsZero(uint256 token)
  160. balanceOf(0, token) == 0
  161. // if a user has a token, then the token should exist
  162. /*
  163. hook Sload _balances[...] {
  164. require balance <= totalSupply
  165. }
  166. */
  167. rule held_tokens_should_exist {
  168. address user; uint256 token;
  169. requireInvariant balanceOfZeroAddressIsZero(token);
  170. // This assumption is safe because of total_supply_is_sum_of_balances
  171. require balanceOf(user, token) <= totalSupply(token);
  172. assert balanceOf(user, token) > 0 => exists_wrapper(token),
  173. "if a user's balance for a token is positive, the token must exist";
  174. }
  175. /******************************************************************************/
  176. rule sanity {
  177. method f; env e; calldataarg args;
  178. f(e, args);
  179. assert false;
  180. }