Best security practices
Similar to many projects, Mina’s NFT Standard defines several roles/contracts which are given special permissions or perform important validations for critical operations. The abilities of these entities and their trust assumptions are outlined below.
The core contracts rely on various contracts which may depend on the particular application. In particular, NFT
owners, NFT
approved spenders, NFT
admins, and NFT
oracle contracts may vary from Collection
to Collection
and are not specified here.
the NFTStandardApproval, NFTStandardOwner, NFTStandardUpdate are templates that are not intended to be used as-is, and are to be changed according to the case of the collection creator or developer that is implementing NFT auction or NFT game. Veridise analysts did review these contracts and found no flaws, but they are highly centralized wrappers around a standard user accounts. The collection creator or debveloper can extend the contracts to make them decentralized according to the requirements of the projects, with example of such implementations provided in this repo.
In case the contracts are used as is, the following applies:
Protocol Contract Roles
Collection
:- deployer: This is any party who may produce signatures for the
Collection.address
. The deployer has a highly privileged role, but only during deployment, initialization, and network upgrades. The deployer may perform any of the following actions:- Set the permissions as specified during deployment.
- Upgrade the
Collection
during a hard fork. - Initialize the
Collection
without permission of theadmin
/creator
, allowing them to determine the entireCollectionData
initial state and set the “master NFT”.
creator
: TheCollection.creator
receives fees based on theCollection
's configured royalty and transfer fees, and may mint tokens. More specifically, thecreator
:- Receives fees determined by the
Collection
transferFee
,NFT
transfer price, andCollection
royaltyFee
. - Prevent users from transferring funds by setting their
receive
permissions toimpossible
, causing fees to fail. - Mint
NFT
s when the contract is not paused, and minting for theCollection
has not been limited (see theadmin
's role below). - Upon permission from the
admin
(see below), transfer thecreator
role.
- Receives fees determined by the
admin
: TheCollection.admin
configures all of theCollection
settings, including metadata, fees, and the paused status. Theadmin
is intended to be a smart contract, whose implementation depends on the specificCollection
instance. This smart contract may:- Upgrade the
Collection
's verification key to implement arbitrary logic. - Configure the collection’s fees, name, and base URL.
- Pause and un-pause the
Collection
, and individualNFT
s. - Transfer
admin
rights to another account. - Transfer the
creator
role, upon approval by thecreator
. - “Limit”
NFT
minting, i.e. permanently prevent future minting on thisCollection
. - Mint
NFT
s when the contract is not paused, and minting for theCollection
has not been limited. - Restrict updates to
NFT
-data. - Restrict
NFT
transfers when theCollection
is configured withrequireTransferApproval == true
. - Upgrade
NFT
verification keys, with owner approval if required based on theNFT
's data.
- Upgrade the
- deployer: This is any party who may produce signatures for the
NFT
:NFT
s (when used properly) are deployed directly by theCollection
. Depending on their configuration when minted, there may still be some special roles with extra authority over the particularNFT
:- deployer: Whoever knows the private key may upgrade the
NFT
on hard forks. owner
: The owner may- transfer the
NFT
ownership based on signature or verification key (forNFT
s withcanTransfer
) - set the
approved
address based on signature or verification key (forNFT
s withcanApprove
) - prevent upgrading the
NFT
's verification key forCollection
s withisOwnerApprovalRequired
- transfer the
approved
: An approved account may transfer theNFT
ownership (forNFT
s withcanTransfer
).metadataVerificationKeyHash
: Anyone who can create a proof which verifies against themetadataVerificationKeyHash
may update theNFT
itself (contingent upon approval by theCollection
admin
). More precisely, the may:- Edit
owner
orapproved
(forNFT
s withcanChangeOwnerByProof
, regardless ofcanTransfer
orcanApprove
) - Edit the
name
,metadata
,storage
,isPaused
, ormetadataVerificationKeyHash
(forNFT
s withcanChangeName
,canChangeMetadata
,canChangeStorage
,canPause
, andcanChangeMetadataVerificationKeyHash
, respectively). - Set the
NFT
version arbitrarily high, causing denial-of-service.
- Edit
- deployer: Whoever knows the private key may upgrade the
Default Implementations
NFTAdmin
. This contract extends the classNFTAdminBase
and serves as the foundational administrative layer for the NFT collection. The address of theNFTAdmin
contract corresponds to theCollection.admin
. It provides approval for critical functionalities within the collection such as NFT upgrades, pausing and resuming operations and ownership management. Note that this contract is upgradable, and therefore a malicious admin can pose a signifiant threat to the collection. The contract has its ownadmin
, which is required to sign off on various (but not all) approvals in the default implementation.admin
: This account may perform any of the following actions- Upgrades the NFTAdmin’s verification key.
- Pause or resume the
NFTAdmin
contract. - Transfers ownership of the contract to a new admin.
- Upgrade specific NFT verification keys (possibly with consent of the owner, if required).
canChangeRoyalty()
- Determines if the royalty fee can be changed for a Collection.canChangeTransferFee()
- Determines if the transfer fee can be changed for a Collection.canPause()
- Determines if the collection can be paused.canResume()
- Determines if the collection can be resumed.
- deployer: The deployer is the public key used to deploy the NFT collection contract. It is responsible for
- Correctly configuring the verification key and permissions for the zkApp.
- Upgrading the zkApp during hard forks.
Contracts providing approval for critical actions related to the NFT collection
The following contracts are provided as templates in the project and are not meant to be used as is. Instead a user deploying a collection should tailor them as per the requirements. But, these templates provide a good estimate of trust assumptions on the part of the collection. For the default implementations, the admin of the contract signs off on each permitted action, but the deployer can change the VerificationKey
unprompted, and therefore it remains fully in control.
NFTStandardApproval
— This contract provides approval for transfers by proof, if the owner of the NFT is a contract.NFTStandardOwner
— This contract is the default implementation of an NFT owner contract. It provides approval for critical NFT actions like pause, resume, approve, transfer and upgrade.NFTStandardUpdate
— This contract is a default implementation of theoracle
. Theoracle
optionally provides approval for an NFT update.
Impact
As a standard intended for broad use across several implementations, the precise impact of these centralization risks may be difficult to asses. Given this setting, the Veridise team that has audited the contracts wishes to highlight some specific risks based on the above centralization issues:
- Signature-based transfers: Transfers via signature cannot be prevented for an
NFT
. This means that, for a third-party smart contract to truly own theNFT
, theiraccess
permissions must be set toproof
-only. Otherwise, whoever knows the private key may bypass the smart contract logic and transfer theNFT
to themselves. - Creator dependence on admin-set fees: The
Collection
admin
s may set fees arbitrarily, including to zero. - NFT owner dependence on admin-set fees: The
Collection
admin
may set fees arbitrarily high, preventing transfers. - Use of “standard” contracts: Implementers may use the standard owner, updater, or approver contracts.
- NFT update risks: The
metadataVerificationKey
encodes logic which may arbitrarily update theNFT
(up to mutability flags), even when paused. This may fully DoS theNFT
by setting the version toUInt32.MAXINT()
, preventing further transfers. - Rogue NFT updates on hard-forks: During a Mina hard-fork, the owner of an
NFT
's private key may upgrade the verification key. IfCollection
creator
s/admin
s do not control these keys, it may lead to serious issues (see Maliciously upgraded NFTs may mint new NFTs). Conversely, ifCollection
creator
s/admin
s lose control of these keys, upgrades may be prevented. - Key loss / malicious action: As always, centralized roles may offer promising targets for attackers, or be abused by role holders. Depending on the
admin
contract, this could include a full contract upgrade, targeted denial of service toNFT
holders, or theft ofNFT
s.
Recommendation
Some of these issues should be mitigated by following the following recommendations:
- Signature-based transfers: Users should validate contract permissions before trusting it with ownership of their
NFT
. - Creator dependence on admin-set fees:
NFT
creators should validate theadmin
contract has sufficient protections, or is operated by a trusted party, to prevent loss of fees. - NFT owner dependence on admin-set fees:
NFT
owners should validate theadmin
contract has sufficient protections, or is operated by a trusted party, to prevent prohibitively exorbitant of fees. - Use of “standard” contracts:
NFT
users should not use the standard contracts.
A few of the above issues may be mitigated by concrete action.
- NFT update risks: Consider setting a maximum version increase for updates. Given the current Mina block time of several minutes, this will ensure the version limit is not reached before the next hard fork. This should be inforced in ZkProgram that update metadata, with typical increase of the version by one in the method, so at least one proof calculation is reqired for increasing the version by one, and, in case of merged proofs, more than one proof per each increase of the version by one.
Finally, some problems are best mitigated through extensive care in the operational security practices taken when operating the specified roles.
- Rogue NFT updates on hard-forks:
Collection
admin
/creator
s should own and operate the keys of allNFT
s, and carefully store them in a persistent manner (see operational-security guidance below). - Key loss / malicious action: All deployer, administrative, and
creator
roles should take care to follow security best practices (see below).
Privileged operations should be operated by a multi-sig contract or a decentralized governance system. Non-emergency privileged operations should be guarded by a timelock to ensure there is enough time for incident response. The risks in this issue may be partially mitigated by validating that the protocol is deployed with the appropriate roles granted to the timelock and multi-sig contracts. The multi-sig is in development now: https://github.com/o1-labs/o1js/issues/1971. Please check https://github.com/o1-labs/o1js/blob/main/CHANGELOG.md to see when it will become available.
Users of the protocol should ensure they are confident that the operators of privileged keys are following best practices such as:
- Never storing a protocol key in plaintext, on a regularly used phone, laptop, or device, or relying on a custom solution for key management.
- Using separate keys for each separate function.
- Storing multi-sig keys in a diverse set of key management software/hardware services and geographic locations.
- Enabling 2FA for key management accounts. SMS should not be used for 2FA, nor should any account which uses SMS for 2FA. Authentication apps or hardware are preferred.
- Validating that no party has control over multiple multi-sig keys.
- Performing regularly scheduled key rotations for high-frequency operations.
- Securely storing physical, non-digital backups for critical keys.
- Actively monitoring for unexpected invocation of critical operations and/or deployed attack contracts.
- Regularly drilling responses to situations requiring emergency response such as pausing/unpausing.
Recommended contract factory validations for developers
The Mina NFT standard uses a new contract factory pattern for development. For example, suppose a contract Foo is intended to call a contract Bar. Using the contract factory pattern, Foo would access Bar by calling a function which returns a constructor for Bar, instead of just calling Bar directly. An example can be seen in the below code snippet.
function FooFactory(barFactory: () => BarConstructor) {
class Foo extends SmartContract {
@method async foo(address: PublicKey) {
const barInstance = new BarConstructor()(address);
barInstance.bar();
}
}
return Foo;
}
Since the logic of Foo
and Bar
are compiled separately, taking this approach (instead of just calling new Bar()
directly) should not change the verification key of Foo
.
This pattern allows users to more easily swap out different implementations of Bar
, so long as each implementation has a @method
with the same signature as Bar.bar()
. This is especially helpful for the NFT standard, which expects users to have custom admin, owner, update, and approver contracts.
When compiling a class created with the factory pattern, users must call the factory to get a concrete instance of the class, then compile that instance. To ensure that all the usual checks performed when calling another smart contract are in place, this instance must be instantiated with constructors of actual o1js smart contracts.
For example, a malicious compiler could use an overriden o1js smart contract whose constructor sets its tokenId
to an unconstrained variable, instead of a constant 1. This would create an attack vector which may allow an attacker to maliciously deploy contracts with the Collection
's tokenId
.
Best practices of contract factories
When using the factory pattern,
- Compile the factory-created contract with concrete instantiations of the contracts it may call.
- Compile the factory-created contract with multiple different concrete instantiations of the contracts it may call, and validate the
vkey
is unchanged. - Consider using
Provable.isConstant()
to check that theAccountUpdate
produced by method calls has a constant token ID of 1.
const OwnerContract = ownerContract();
const owner = new OwnerContract(address);
assert(Provable.isConstant(Field, owner.self.tokenId));
Provable.assertEqual(Field, owner.self.tokenId, TokenId.default);
return owner;