ERC1155Supply.spec 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204
  1. methods {
  2. totalSupply(uint256) returns uint256 envfree
  3. balanceOf(address, uint256) returns uint256 envfree
  4. exists_wrapper(uint256) returns bool envfree
  5. }
  6. /// given two different token ids, if totalSupply for one changes, then
  7. /// totalSupply for other should not
  8. rule token_totalSupply_independence(method f)
  9. filtered {
  10. f -> f.selector != safeBatchTransferFrom(address,address,uint256[],uint256[],bytes).selector
  11. }
  12. {
  13. uint256 token1; uint256 token2;
  14. require token1 != token2;
  15. uint256 token1_before = totalSupply(token1);
  16. uint256 token2_before = totalSupply(token2);
  17. env e; calldataarg args;
  18. f(e, args);
  19. uint256 token1_after = totalSupply(token1);
  20. uint256 token2_after = totalSupply(token2);
  21. assert token1_after != token1_before => token2_after == token2_before,
  22. "methods must not change the total supply of more than one token";
  23. }
  24. /// TODO possibly show equivalence between batch and non-batch methods
  25. /// in order to leverage non-batch rules wrt batch rules
  26. /// The result of transferring a single token must be equivalent whether done
  27. /// via safeTransferFrom or safeBatchTransferFrom.
  28. rule singleTokenSafeTransferFromSafeBatchTransferFromEquivalence {
  29. storage beforeTransfer = lastStorage;
  30. env e;
  31. address holder; address recipient;
  32. uint256 token; uint256 transferAmount; bytes data;
  33. uint256[] tokens; uint256[] transferAmounts;
  34. mathint holderStartingBalance = balanceOf(holder, token);
  35. mathint recipientStartingBalance = balanceOf(recipient, token);
  36. require tokens.length == 1; require transferAmounts.length == 1;
  37. require tokens[0] == token; require transferAmounts[0] == transferAmount;
  38. // transferring via safeTransferFrom
  39. safeTransferFrom(e, holder, recipient, token, transferAmount, data) at beforeTransfer;
  40. mathint holderSafeTransferFromBalanceChange = holderStartingBalance - balanceOf(holder, token);
  41. mathint recipientSafeTransferFromBalanceChange = balanceOf(recipient, token) - recipientStartingBalance;
  42. // transferring via safeBatchTransferFrom
  43. safeBatchTransferFrom(e, holder, recipient, tokens, transferAmounts, data) at beforeTransfer;
  44. mathint holderSafeBatchTransferFromBalanceChange = holderStartingBalance - balanceOf(holder, token);
  45. mathint recipientSafeBatchTransferFromBalanceChange = balanceOf(recipient, token) - recipientStartingBalance;
  46. assert holderSafeTransferFromBalanceChange == holderSafeBatchTransferFromBalanceChange
  47. && recipientSafeTransferFromBalanceChange == recipientSafeBatchTransferFromBalanceChange,
  48. "Transferring a single token via safeTransferFrom or safeBatchTransferFrom must be equivalent";
  49. }
  50. /// The results of transferring multiple tokens must be equivalent whether done
  51. /// separately via safeTransferFrom or together via safeBatchTransferFrom.
  52. rule multipleTokenSafeTransferFromSafeBatchTransferFromEquivalence {
  53. storage beforeTransfers = lastStorage;
  54. env e;
  55. address holder; address recipient; bytes data;
  56. uint256 tokenA; uint256 tokenB; uint256 tokenC;
  57. uint256 transferAmountA; uint256 transferAmountB; uint256 transferAmountC;
  58. uint256[] tokens; uint256[] transferAmounts;
  59. mathint holderStartingBalanceA = balanceOf(holder, tokenA);
  60. mathint holderStartingBalanceB = balanceOf(holder, tokenB);
  61. mathint holderStartingBalanceC = balanceOf(holder, tokenC);
  62. require tokens.length == 3; require transferAmounts.length == 3;
  63. require tokens[0] == tokenA; require transferAmounts[0] == transferAmountA;
  64. require tokens[1] == tokenB; require transferAmounts[1] == transferAmountB;
  65. require tokens[2] == tokenC; require transferAmounts[2] == transferAmountC;
  66. // transferring via safeTransferFrom
  67. safeTransferFrom(e, holder, recipient, tokenA, transferAmountA, data) at beforeTransfers;
  68. safeTransferFrom(e, holder, recipient, tokenB, transferAmountB, data);
  69. safeTransferFrom(e, holder, recipient, tokenC, transferAmountC, data);
  70. mathint holderSafeTransferFromChangeA = holderStartingBalanceA - balanceOf(holder, tokenA);
  71. mathint holderSafeTransferFromChangeB = holderStartingBalanceB - balanceOf(holder, tokenB);
  72. mathint holderSafeTransferFromChangeC = holderStartingBalanceC - balanceOf(holder, tokenC);
  73. // transferring via safeBatchTransferFrom
  74. safeBatchTransferFrom(e, holder, recipient, tokens, transferAmounts, data) at beforeTransfers;
  75. mathint holderSafeBatchTransferFromBalanceChangeA = holderStartingBalanceA - balanceOf(holder, tokenA);
  76. mathint holderSafeBatchTransferFromBalanceChangeB = holderStartingBalanceB - balanceOf(holder, tokenB);
  77. mathint holderSafeBatchTransferFromBalanceChangeC = holderStartingBalanceC - balanceOf(holder, tokenC);
  78. assert holderSafeTransferFromChangeA == holderSafeBatchTransferFromBalanceChangeA
  79. && holderSafeTransferFromChangeB == holderSafeBatchTransferFromBalanceChangeB
  80. && holderSafeTransferFromChangeC == holderSafeBatchTransferFromBalanceChangeC,
  81. "Transferring multiple tokens via safeTransferFrom or safeBatchTransferFrom must be equivalent";
  82. }
  83. /*
  84. /// If passed empty token and burn amount arrays, burnBatch must not change
  85. /// token balances or address permissions.
  86. rule burnBatchOnEmptyArraysChangesNothing {
  87. env e;
  88. address holder; uint256 token;
  89. address nonHolderA; address nonHolderB;
  90. uint256 startingBalance = balanceOf(holder, token);
  91. bool startingPermissionNonHolderA = isApprovedForAll(holder, nonHolderA);
  92. bool startingPermissionNonHolderB = isApprovedForAll(holder, nonHolderB);
  93. uint256[] noTokens; uint256[] noBurnAmounts;
  94. require noTokens.length == 0; require noBurnAmounts.length == 0;
  95. burnBatch(e, holder, noTokens, noBurnAmounts);
  96. uint256 endingBalance = balanceOf(holder, token);
  97. bool endingPermissionNonHolderA = isApprovedForAll(holder, nonHolderA);
  98. bool endingPermissionNonHolderB = isApprovedForAll(holder, nonHolderB);
  99. assert startingBalance == endingBalance,
  100. "burnBatch must not change token balances if passed empty arrays";
  101. assert startingPermissionNonHolderA == endingPermissionNonHolderA
  102. && startingPermissionNonHolderB == endingPermissionNonHolderB,
  103. "burnBatch must not change account permissions if passed empty arrays";
  104. }
  105. */
  106. /******************************************************************************/
  107. ghost mapping(uint256 => mathint) sumOfBalances {
  108. init_state axiom forall uint256 token . sumOfBalances[token] == 0;
  109. }
  110. hook Sstore _balances[KEY uint256 token][KEY address user] uint256 newValue (uint256 oldValue) STORAGE {
  111. sumOfBalances[token] = sumOfBalances[token] + newValue - oldValue;
  112. }
  113. // status: not passing, because mint and burn are the same as transferring to/from
  114. // the 0 address.
  115. invariant total_supply_is_sum_of_balances(uint256 token)
  116. sumOfBalances[token] == totalSupply(token)
  117. {
  118. preserved {
  119. requireInvariant balanceOfZeroAddressIsZero(token);
  120. }
  121. }
  122. /*
  123. rule total_supply_is_sum_of_balances_as_rule {
  124. uint256 token;
  125. require sumOfBalances[token] == totalSupply(token) + balanceOf(0, token);
  126. mathint sum_before = sumOfBalances[token];
  127. method f; calldataarg arg; env e;
  128. f(e, arg);
  129. mathint sum_after = sumOfBalances[token];
  130. assert sumOfBalances[token] == totalSupply(token) + balanceOf(0, token);
  131. }
  132. */
  133. /******************************************************************************/
  134. /// The balance of a token for the zero address must be zero.
  135. invariant balanceOfZeroAddressIsZero(uint256 token)
  136. balanceOf(0, token) == 0
  137. // if a user has a token, then the token should exist
  138. /*
  139. hook Sload _balances[...] {
  140. require balance <= totalSupply
  141. }
  142. */
  143. rule held_tokens_should_exist {
  144. address user; uint256 token;
  145. requireInvariant balanceOfZeroAddressIsZero(token);
  146. // This assumption is safe because of total_supply_is_sum_of_balances
  147. require balanceOf(user, token) <= totalSupply(token);
  148. assert balanceOf(user, token) > 0 => exists_wrapper(token),
  149. "if a user's balance for a token is positive, the token must exist";
  150. }
  151. /******************************************************************************/
  152. rule sanity {
  153. method f; env e; calldataarg args;
  154. f(e, args);
  155. assert false;
  156. }