Most Clarity contracts use a form of authentication similar to
Solidity’s tx.origin
for sensitive/“owner only” functions.
This is a known “bad thing” in the Ethereum community.
This authentication method interacts particular poorly with Clarity’s (otherwise fantastic) dynamic dispatch mechanism which relies on users passing contracts as function parameters. These contract parameters must implement an interface, known as a trait.
Although Stacks has a novel protection mechanism, called post-conditions, it is inadequate protection against many phishing attacks.
The potential vulnerability has been known about and heavily debated for at least 4 years.
We have identified a popular and heavily used NFT contract that has a very plausible attack path to exploitation.
This exposes an unacceptable number of users to attack, making any “user beware” disclaimer completely insufficient.
We strongly recommend that the Stacks community re-evaluate the
security implications of tx-sender
-based authentication and
come up with a design that more thoroughly protects users.
In October 2024, neumo and I found a vulnerability in the most common implementation of NFT contracts on the Stacks blockchain.
We quickly disclosed the issue to a significant number of affected protocols: all the ones that had bug bounty programs on Immunefi and also a few high profile protocols that didn’t. The overwhelming response from the affected protocols, with one notable exception, was “won’t fix”.
Through this process we learned something. Not only were we not the first to discover the general class of vulnerability, it has been heavily debated with members of the Stacks core development team. Despite heavy debate no significant steps have been taken to mitigate the issue beyond developer education.
So far the debate has been fairly theoretical. But the instance we have found is different. Vast sums of user funds — in NFT-sized chunks — are currently at risk and there is a very plausible phishing/honey-pot attack that could be used to exploit them.
Let’s get down to business and discuss the root cause.
Most live Clarity contracts do authentication in a particular way. It has become standard practice. An example of the kind of code you might see is:
(asserts! (or (is-eq tx-sender sender) (is-eq contract-caller sender)) ERR_NOT_OWNER)
In this snippet of code sender
is a parameter to the
function but tx-sender
and contract-caller
are
Clarity built-ins1.
For those who are more familiar with Solidity we can translate the expression:
(or (is-eq tx-sender sender) (is-eq contract-caller sender))
into something more familiar:
tx.origin == sender || msg.sender == sender
So, in the original Clarity code, it is merely checking whether
sender
is equal to either the tx-sender
or
contract-caller
built-in.
As you might have picked up from our translation into Solidity the
problem is with what tx-sender
means.
According to the Stacks
Documentation tx-sender
returns the original sender of
the current transaction2. It’s just like Solidity’s
tx.origin
. Importantly it is not
msg.sender
, because it does not return the entity that
directly called the contract.
But there is a well-known problem with using the original sender of a
transaction to authenticate. Say the sender is somehow tricked into
calling a malicious contract M. This contract can now call into any
contract that uses tx-sender
for authentication and
pretend to be the sender!
In Ethereum, and other EVM-based chains, this method is heavily discouraged.
In fact, this exploit vector is even mentioned in the Clarity Book in the section on keywords.
Doing authentication this way might seem like an obviously bad design choice. However, we want to be fair to the core Stacks and Clarity developers. They’ve actually put some thought into this. As far as we can tell, there are two reasons things are done this way:
Stacks has a novel protection mechanism, called post-conditions that can protect against many attacks.
Users would lose the convenience of performing multiple actions
in one transaction via a proxy contract when you use
contract-caller
instead of tx-sender
. You can
confirm this by examining multiple
sources.
But let’s discuss post-conditions since they’re the
strongest argument in favour of the using tx-sender
for
authentication. We’ll try to “steel man” their position before showing
that it is inadequate for many kinds of attacks.
Post-conditions are a novel and powerful mechanism provided by Stacks to protect users. They add an extra level of protection that can protect users regardless of whether the smart contracts users interact with are malicious or contain bugs. Users can add post-conditions to any transaction. If the post-condition is not satisfied the entire transaction aborts. Specifically, they can check for whether:
The usual comparison operators such as equality, greater-than, less-than, etc can be used to provide acceptable ranges.
Here are two examples:
A user is interacting with a swap contract and they expect to send 100 STX. Using post-conditions they can ensure that no more and no less is sent.
A user is interacting with contract where they specifically don’t expect any of their STX, FTs or NFTs to be sent. They can add post-conditions to ensure none are sent.
You can learn more about post-conditions in the Stacks docs and Hiro Systems docs.
However there are some notable limitations to what post-conditions can do.
They can only set conditions on who sends an asset and how much was sent. They don’t operate on the final owner. Not only that, they cannot guard against arbitrary state changes in a contract. It is precisely this limitation that means our phishing/honey-pot attack cannot be protected by post-conditions.
Read on for further details.
And now the part of the post you’ve been waiting for. Just what did we find? And how much is at risk?
In short, we discovered a phishing/honey-pot attack on the most common NFT contract in the Stacks ecosystem. This kind of NFT contract allows users to list their NFTs in a decentralized marketplace. To do this they call a “list” function and must provide a commission contract as a parameter3. Under normal circumstances the commission contract is responsible for paying the seller a small commission when a buyer finally buys the NFT.
This style of contract is used in collections released by Megapont Ape Club, the Stacks Foundation’s Mojo and, as far as we can tell, any collection created on Gamma.io. This is by no means a complete list as this style of contract seems to be the de facto standard for NFTs in the Stacks ecosystem.
Here’s the exploit. An attacker could list an NFT with a malicious commission contract. Simply by buying this NFT, a victim will have all of their other NFTs listed for sale at a ludicrously low price by the commission contract. The attacker can then just swoop in and buy them, effectively for free.
The value at risk is precisely the sum of the market prices of all the other NFTs the victim owns.
Ready for some more detail?
We’ll now go through the basic building blocks of the contract, then give an outline of the attack and, finally, explain why post-conditions cannot prevent this attack.
The source code presented in this section comes from Megapont Ape Club’s NFT implementation but the other implementations we listed above are not substantially different, and all suffer from the same vulnerability.
Now we’ll list the source code of each important function and provide a short summary.
list-in-ustx
(define-public (list-in-ustx (id uint) (price uint) (comm <commission-trait>))
(let ((listing {price: price, commission: (contract-of comm)}))
(asserts! (is-sender-owner id) ERR-NOT-AUTHORIZED)
(map-set market id listing)
(print (merge listing {a: "list-in-ustx", id: id}))
(ok true)))
list-in-ustx
to list the NFT for salelist-in-ustx
has 3 parameters: an NFT id
,
a price
and a commission contract comm
. The
contract must implement the commission-trait
interfacebuy-in-ustx
using
the same comm
contract that the seller passed to
list-in-ustx
list-in-ustx
checks that the caller is authorised to
list the NFT using function is-sender-owner
is-sender-owner
(define-private (is-sender-owner (id uint))
(let ((owner (unwrap! (nft-get-owner? Megapont-Ape-Club id) false)))
(or (is-eq tx-sender owner) (is-eq contract-caller owner))))
is-sender-owner
authenticates successfully whenever the
expression
(or (is-eq tx-sender owner) (is-eq contract-caller owner))
evaluates to true
. As we’ll see below this is a key element
of the attack.buy-in-ustx
(define-public (buy-in-ustx (id uint) (comm <commission-trait>))
(let ((owner (unwrap! (nft-get-owner? Megapont-Ape-Club id) ERR-NOT-FOUND))
(listing (unwrap! (map-get? market id) ERR-LISTING))
(price (get price listing)))
(asserts! (is-eq (contract-of comm) (get commission listing)) ERR-WRONG-COMMISSION)
(try! (stx-transfer? price tx-sender owner))
(try! (contract-call? comm pay id price))
(try! (trnsfr id owner tx-sender))
(map-delete market id)
(print {a: "buy-in-ustx", id: id})
(ok true)))
buy-in-ustx
is used to buy an NFT. It takes an NFT
id
parameter and the same commission contract that the
seller used when calling list-in-ustx
The statement
(asserts! (is-eq (contract-of comm) (get commission listing)) ERR-WRONG-COMMISSION)
ensures that comm
is the same one that the seller passed in
when they called list-in-ustx
during execution the comm
contract is called with
the following code.
(try! (contract-call? comm pay id price))
This calls the pay
function of the comm
contract passing in id
and price
as
parameters.
The attack is a classic phishing/honey-pot attack where a malicious actor tricks an unsuspecting victim into interacting with a malicious contract.
An attacker creates a malicious commission contract:
malicious-comm
. The malicious code goes in the
pay
function, which normally just pays a commission to the
seller of the NFT.
The attacker calls list-in-ustx
passing in the
id
of an NFT they own, the malicious-comm
contract and a price
that is sufficiently below market
price so as to be enticing (but not so low as to set off alarm
bells)
A victim buys the the NFT by calling buy-in-ustx
and
passing in the same malicious-comm
contract. We note that
this is unlikely to happen for a user interacting directly with the
Stacks blockchain. However, it is quite likely to occur to an
unsuspecting victim that is using the web app for an NFT marketplace
e.g. Gamma.io
During execution of buy-in-ustx
, the
pay
function of the malicious-comm
contract is
called. This is where the magic happens.
list-in-ustx
passing in its id
, a non-malicious comm
contract and a ludicrously low sale price
of 1 uSTX (1
micro STX)tx-sender
works.
The call to list-in-ustx
will call
is-sender-owner
and — since tx-sender
returns
the original caller (i.e. the victim) — it will return true
and thus the malicious call to list-in-ustx
succeedsbuy-in-ustx
finishes executing and the
victim receives the NFT.However, althought the victim now has a new NFT in their possession, all their other NFTs have been listed for sale at 1 uSTX.
The attacker now buys them all, essentially for free.
It is clear that post-conditions are useless against this attack. This is because post-conditions can only track whether NFTs have been sent or not. The only NFT that was sent in this transaction was the one that the victim was buying, and this was expected!
The others were merely listed for sale. They were not transferred. The only thing that changed was some state in the NFT contract. Unfortunately, post-conditions are of no help here.
Gamma.io is one of the most popular marketplaces for NFTs in the Stacks ecosystem. Using their platform you can create your own NFT collections. It was also one of the many organisations that we informed of the vulnerability.
Unfortunately, new collections are still being created via this
platform that contain the vulnerability. As an experiment we went to the
Minting Now page,
followed the links to the contract source code and discovered that
collections created in just the last 15 days (or less!)4
still have the same vulnerability i.e. that is-sender-owner
contains the Clarity expression:
(or (is-eq tx-sender owner) (is-eq contract-caller owner))
This is an important point. In this post we have described an attack that causes a user who interacts with a maliciously listed NFT to lose their other NFTs. If only that was the full extent of the problem.
Any contract that uses tx-sender
for authentication
is at risk.
This is a sobering thought. It is theoretically possible that a protocol owner — using an account that has authority over an important contract — could be tricked into interacting with a malicious NFT and compromise the entire protocol.
Until this kind of vulnerability can be remedied we highly recommend that all important protocol addresses (such as owners, governors, admins, etc) only be used for interacting with protocol contracts and not for anything else.
As we said in the introduction, we were not the first to discover this issue. In this section we’ll cover the history of this vulnerability in chronological order.
The earliest mention of tx-sender
based authentication
we could find was this blog post: Treating
Traits in Clarity.
It discusses tx-sender
used in conjunction with
Clarity’s as-contract
built-in. Doing this changes tx-sender
from the original
sender to the contract itself, for the duration of the contract call. As
such this blog post actually discusses a slightly different issue than
the one covered in this post. However, the final section is worth
quoting here:
Second, Clarity requires that traits are provided directly by the user. Traits can’t be wrapped or stored. Therefore, the user is in control when using these general contracts. The burden is now on the UI to help users to understand the impact. Apps should inform the users that only vetted contracts can be passed to the general contracts or the apps should warn the user that they are using a potentially malicious contract as a trait. This leads to bigger question about governance. Who can verify contract? Who can blacklist them or who can whitelist them? How can protocol still be permissionless? How can the authenticator support users?
I am looking forward to a healthy discussion about these questions.
mijoco-btc/clarity-market
issue #6A short time later a Github issue was published Guarding functions with tx-sender opens up contracts and users for a simple attacks.
It succinctly describes the attack:
Guarding any public function that don’t perform any STX/FT/NFT transfer/burn/mint operation with simple
tx-sender
comparison is a potential security hole. It opens up both contracts and contract users for a very simple attack.
It then suggests some mitigations:
Either guard it with
contract-caller
or add 1 micro STX transfer to enforce post-conditions.
The idea of adding a 1 uSTX transfer is a little hacky, but it works (for the most part). For normal contract interactions a user is not expecting to be calling a function that requires their authentication. So they can add a post-condition to check that a very specific amount of STX is sent (often 0 STX). If they do accidentally interact with a malicious contract that calls an authentication function the extra 1 uSTX sent causes the post-condition to revert the transaction.
In a follow-up comment the issue poster clarifies this:
Functions that needs extra care are these that can be executed without an post-conditions, and if they get called with malicious intent you can lose control over your contract/protocol/funds. I’m talking about functions like
set-approval-for
,set-collection-royalties
,update-mint-price
,set-edition-cost
,transfer-administrator
just to name a few.
Here we can clearly see that the shortcomings of post-conditions were known as far back as November 2021. Not only that, a reasonable, if a little hacky, solution was proposed to protect functions that couldn’t be protected with post-conditions:
If you want to allow your users to call these functions via additional contract eg. to set an approval for multiple NFT’s in one TX, then I would just add 1 micro STX transfer
Unfortunately, the 1 uSTX transfer protection mechanism has not been implemented in the vulnerable NFT contracts we found.
Further, it won’t work in situations where a variable amount of STX sent is expected by the user.
Two months later, security firm Setzeus provide a detailed post called Clarity, Carefully - tx-sender. They correctly identify the problem…
regardless of how many hops a transaction makes,
tx-sender
will always refer totx-sender
— the originator sending the transaction. Now, let’s explore how this persistence can be hijacked for an exploit.
… and then explain a phishing scenario eerily similar to the one we presented.
The next post of note is Github repo BNS-V2 Issue
#70. It is worth a closer read, if only for the spirited defence of
the tx-sender
design decision, including an explanation of
how tx-sender
is useful in a situation where you want to
perform multiple operations in one transaction using a proxy
contract.
When you use
contract-caller
as your security measure, then in case of emergency, when you have to pause/lock/secure multiple contracts, or when it is a multi-step procedure, then you have to submit multiple tx and pray that miners will include them all in a single block.With
tx-sender
- you can perform multiple operations within single tx by just deploying a contract that contains all steps that you want to perform.
Clearly tx-sender
provides some convenience but is it
worth the security risk?
The post also re-iterates the 1 uSTX protection mechanism.
Another thing of note is that BNS actually decided to use contract-caller for authentication based on the discussion! Clearly they saw merit in doing this.
The final post we will discuss is Github repo stacks-core/sbtc issue #500. The problem is elegantly summarised as follows:
However, checks against
tx-sender
can be implicitly bypassed once there’s a call into a malicious contract. To mitigate this, sBTC relies on Stacks Post-Conditions. These checks, specified outside of contract code, run indeny mode
by default, meaning no asset transfers can occur except the ones explicitly allowed. However, there are notable limitations: * You can only track outgoing asset transfers from principals but not incoming asset transfers. * State changes cannot be tracked. * If a contract usesas-contract
, it changestx-sender
to its own address. Post-conditions are set once, before the transaction is signed, and cannot be accessed or modified during contract execution. Accordingly, if a contract (e.g.,Foo
) callsas-contract
and subsequently callssbtc-token:transfer
, an attacker could specify a post-condition such as[Foo spends ≥ 0 sBTC]
and then drain all sBTC fromFoo
.
We are also reminded of the insufficiency of post-conditions.
Avoid using
tx-sender
for any auth purposes altogether as the phishing risk is insufficiently mitigated by Post-Conditions.An EVM-style approval mechanism is recommended instead.
The issues with tx-sender
have been known for at least 4
years and are considered a known and accepted risk.
However, the current authentication design is very much “user beware”. The responsibility is squarely placed upon the user’s shoulders. They must remain eternally vigilant against interacting with any smart contract that could perform a malicious action on their behalf.
We think this view is short sighted and unfair on users, many of whom will not have much technical expertise. For the exploit vector we identified there are far too many users who own NFTs to reasonably assert that education alone will prevent them getting phished.
A novel 1 uSTX transfer mechanism has been suggested as a way to protect functions that cannot be protected by post-conditions. However, it has not been implemented in the NFT contracts we discussed, and new collections with this vulnerability are still being created to this day.
Our motivation to write this post stemmed from our heartfelt belief that the attack vector we discovered is plausible and exposes users to unacceptable risk.
We sincerely hope that this post inspires further discussion and action around the issue.
We found this bug while working together as Pai Mei & Gandalf.
Pai Mei & Gandalf is:
If you’d like to book us for an audit of your Clarity codebase please contact us at
pai_mei_and_gandalf X protonmail Y com
(replacing the X and Y with the obvious symbols)
Solidity has many built-ins as well like
tx.origin
, msg.sender
, msg.value
etc.↩︎
Unless another Clarity built-in as-contract
is used, in which case it will change to be the current contract.↩︎
Clarity does dynamic dispatch via traits. It’s a great design for two reasons. First, the fact that traits are type checked at compile time prevents dispatch to arbitrary functions, thus preventing many security vulnerabilities. More importantly — thanks to a prohibition on traits being stored in contract storage — it also neatly prevents re-entrancy attacks. This, combined with a compile time check for dependency loops ensures re-entrancy is impossible.↩︎
When we wrote this the date was 12 February 2025.↩︎