A questionable design choice in Stacks/Clarity

neumoneumo
17 min read

Fri 14 March 2025

by 100proof

TL;DR

  • Most Clarity contracts use a form of authentication similar to Solidity's tx.origin for sensitive/"owner only" functions. This is a known "bad thing" in the Ethereum community.

  • This authentication method interacts particular poorly with Clarity's (otherwise fantastic) dynamic dispatch mechanism which relies on users passing contracts as function parameters. These contract parameters must implement an interface, known as a trait.

  • Although Stacks has a novel protection mechanism, called post-conditions, it is inadequate protection against many phishing attacks.

  • The potential vulnerability has been known about and heavily debated for at least 4 years.

  • We have identified a popular and heavily used NFT contract that has a very plausible attack path to exploitation.

  • This exposes an unacceptable number of users to attack, making any "user beware" disclaimer completely insufficient.

  • We strongly recommend that the Stacks community re-evaluate the security implications of tx-sender-based authentication and come up with a design that more thoroughly protects users.

Introduction

In October 2024, neumo and I found a vulnerability in the most common implementation of NFT contracts on the Stacks blockchain.

We quickly disclosed the issue to a significant number of affected protocols: all the ones that had bug bounty programs on Immunefi and also a few high profile protocols that didn't. The overwhelming response from the affected protocols, with one notable exception, was "won't fix".

Through this process we learned something. Not only were we not the first to discover the general class of vulnerability, it has been heavily debated with members of the Stacks core development team. Despite heavy debate no significant steps have been taken to mitigate the issue beyond developer education.

So far the debate has been fairly theoretical. But the instance we have found is different. Vast sums of user funds — in NFT-sized chunks — are currently at risk and there is a very plausible phishing/honey-pot attack that could be used to exploit them.

The root cause

Let's get down to business and discuss the root cause.

Most live Clarity contracts do authentication in a particular way. It has become standard practice. An example of the kind of code you might see is:

(asserts! (or (is-eq tx-sender sender) (is-eq contract-caller sender)) ERR_NOT_OWNER)

In this snippet of code sender is a parameter to the function but tx-sender and contract-caller are Clarity built-ins1.

For those who are more familiar with Solidity we can translate the expression:

(or (is-eq tx-sender sender) (is-eq contract-caller sender))

into something more familiar:

tx.origin == sender || msg.sender == sender

So, in the original Clarity code, it is merely checking whether sender is equal to either the tx-sender or contract-caller built-in.

As you might have picked up from our translation into Solidity the problem is with what tx-sender means.

According to the Stacks Documentation tx-sender returns the original sender of the current transaction2. It's just like Solidity's tx.origin. Importantly it is not msg.sender, because it does not return the entity that directly called the contract.

But there is a well-known problem with using the original sender of a transaction to authenticate. Say the sender is somehow tricked into calling a malicious contract M. This contract can now call into any contract that uses tx-sender for authentication and pretend to be the sender!

In Ethereum, and other EVM-based chains, this method is heavily discouraged.

In fact, this exploit vector is even mentioned in the Clarity Book in the section on keywords.

Doing authentication this way might seem like an obviously bad design choice. However, we want to be fair to the core Stacks and Clarity developers. They've actually put some thought into this. As far as we can tell, there are two reasons things are done this way:

  1. Stacks has a novel protection mechanism, called post-conditions that can protect against many attacks.

  2. Users would lose the convenience of performing multiple actions in one transaction via a proxy contract when you use contract-caller instead of tx-sender. You can confirm this by examining multiple sources.

But let's discuss post-conditions since they're the strongest argument in favour of the using tx-sender for authentication. We'll try to "steel man" their position before showing that it is inadequate for many kinds of attacks.

Post-conditions

Post-conditions are a novel and powerful mechanism provided by Stacks to protect users. They add an extra level of protection that can protect users regardless of whether the smart contracts users interact with are malicious or contain bugs. Users can add post-conditions to any transaction. If the post-condition is not satisfied the entire transaction aborts. Specifically, they can check for whether:

  • an amount of STX was sent / not sent

  • an amount of a fungible token (FT) was sent / not sent

  • an NFT was sent / not sent

The usual comparison operators such as equality, greater-than, less-than, etc can be used to provide acceptable ranges.

Here are two examples:

  1. A user is interacting with a swap contract and they expect to send 100 STX. Using post-conditions they can ensure that no more and no less is sent.

  2. A user is interacting with contract where they specifically don't expect any of their STX, FTs or NFTs to be sent. They can add post-conditions to ensure none are sent.

You can learn more about post-conditions in the Stacks docs and Hiro Systems docs.

Limitations

However there are some notable limitations to what post-conditions can do.

They can only set conditions on who sends an asset and how much was sent. They don't operate on the final owner. Not only that, they cannot guard against arbitrary state changes in a contract. It is precisely this limitation that means our phishing/honey-pot attack cannot be protected by post-conditions.

Read on for further details.

What we found: vast sums at risk, in NFT-sized chunks.

And now the part of the post you've been waiting for. Just what did we find? And how much is at risk?

In short, we discovered a phishing/honey-pot attack on the most common NFT contract in the Stacks ecosystem. This kind of NFT contract allows users to list their NFTs in a decentralized marketplace. To do this they call a "list" function and must provide a commission contract as a parameter3. Under normal circumstances the commission contract is responsible for paying the seller a small commission when a buyer finally buys the NFT.

This style of contract is used in collections released by Megapont Ape Club, the Stacks Foundation's Mojo and, as far as we can tell, any collection created on Gamma.io. This is by no means a complete list as this style of contract seems to be the de facto standard for NFTs in the Stacks ecosystem.

Here's the exploit. An attacker could list an NFT with a malicious commission contract. Simply by buying this NFT, a victim will have all of their other NFTs listed for sale at a ludicrously low price by the commission contract. The attacker can then just swoop in and buy them, effectively for free.

The value at risk is precisely the sum of the market prices of all the other NFTs the victim owns.

Ready for some more detail?

We'll now go through the basic building blocks of the contract, then give an outline of the attack and, finally, explain why post-conditions cannot prevent this attack.

Building blocks

The source code presented in this section comes from Megapont Ape Club's NFT implementation but the other implementations we listed above are not substantially different, and all suffer from the same vulnerability.

Now we'll list the source code of each important function and provide a short summary.

list-in-ustx

(define-public (list-in-ustx (id uint) (price uint) (comm <commission-trait>))
  (let ((listing  {price: price, commission: (contract-of comm)}))
    (asserts! (is-sender-owner id) ERR-NOT-AUTHORIZED)
    (map-set market id listing)
    (print (merge listing {a: "list-in-ustx", id: id}))
    (ok true)))
  • sellers call list-in-ustx to list the NFT for sale

  • list-in-ustx has 3 parameters: an NFT id, a price and a commission contract comm. The contract must implement the commission-trait interface

  • a buyer of the NFT will need to call buy-in-ustx using the same comm contract that the seller passed to list-in-ustx

  • list-in-ustx checks that the caller is authorised to list the NFT using function is-sender-owner

is-sender-owner

(define-private (is-sender-owner (id uint))
  (let ((owner (unwrap! (nft-get-owner? Megapont-Ape-Club id) false)))
    (or (is-eq tx-sender owner) (is-eq contract-caller owner))))
  • is-sender-owner authenticates successfully whenever the expression (or (is-eq tx-sender owner) (is-eq contract-caller owner)) evaluates to true. As we'll see below this is a key element of the attack.

buy-in-ustx

(define-public (buy-in-ustx (id uint) (comm <commission-trait>))
  (let ((owner (unwrap! (nft-get-owner? Megapont-Ape-Club id) ERR-NOT-FOUND))
      (listing (unwrap! (map-get? market id) ERR-LISTING))
      (price (get price listing)))
    (asserts! (is-eq (contract-of comm) (get commission listing)) ERR-WRONG-COMMISSION)
    (try! (stx-transfer? price tx-sender owner))
    (try! (contract-call? comm pay id price))
    (try! (trnsfr id owner tx-sender))
    (map-delete market id)
    (print {a: "buy-in-ustx", id: id})
    (ok true)))
  • buy-in-ustx is used to buy an NFT. It takes an NFT id parameter and the same commission contract that the seller used when calling list-in-ustx

  • The statement (asserts! (is-eq (contract-of comm) (get commission listing)) ERR-WRONG-COMMISSION) ensures that comm is the same one that the seller passed in when they called list-in-ustx

  • during execution the comm contract is called with the following code.

      (try! (contract-call? comm pay id price))
    

    This calls the pay function of the comm contract passing in id and price as parameters.

Outline of the attack

The attack is a classic phishing/honey-pot attack where a malicious actor tricks an unsuspecting victim into interacting with a malicious contract.

  1. An attacker creates a malicious commission contract: malicious-comm. The malicious code goes in the pay function, which normally just pays a commission to the seller of the NFT.

  2. The attacker calls list-in-ustx passing in the id of an NFT they own, the malicious-comm contract and a price that is sufficiently below market price so as to be enticing (but not so low as to set off alarm bells)

  3. A victim buys the NFT by calling buy-in-ustx and passing in the same malicious-comm contract. We note that this is unlikely to happen for a user interacting directly with the Stacks blockchain. However, it is quite likely to occur to an unsuspecting victim that is using the web app for an NFT marketplace e.g. Gamma.io

  4. During execution of buy-in-ustx, the pay function of the malicious-comm contract is called. This is where the magic happens.

    • the code scans for all the NFTS that the victim owns. They don't even have to be part of the same collection as the one they're currently buying. The NFTs merely need to have the same implementation.

    • for each of these NFTs it will then call list-in-ustx passing in its id, a non-malicious comm contract and a ludicrously low sale price of 1 uSTX (1 micro STX)

    • this call succeeds because of the way tx-sender works. The call to list-in-ustx will call is-sender-owner and — since tx-sender returns the original caller (i.e. the victim) — it will return true and thus the malicious call to list-in-ustx succeeds

    • the execution of buy-in-ustx finishes executing and the victim receives the NFT.

  5. However, althought the victim now has a new NFT in their possession, all their other NFTs have been listed for sale at 1 uSTX.

  6. The attacker now buys them all, essentially for free.

Why post-conditions don't help here

It is clear that post-conditions are useless against this attack. This is because post-conditions can only track whether NFTs have been sent or not. The only NFT that was sent in this transaction was the one that the victim was buying, and this was expected!

The others were merely listed for sale. They were not transferred. The only thing that changed was some state in the NFT contract. Unfortunately, post-conditions are of no help here.

Further implications

Gamma.io is still creating collections with this vulnerability

Gamma.io is one of the most popular marketplaces for NFTs in the Stacks ecosystem. Using their platform you can create your own NFT collections. It was also one of the many organisations that we informed of the vulnerability.

Unfortunately, new collections are still being created via this platform that contain the vulnerability. As an experiment we went to the Minting Now page, followed the links to the contract source code and discovered that collections created in just the last 15 days (or less!)4 still have the same vulnerability i.e. that is-sender-owner contains the Clarity expression:

(or (is-eq tx-sender owner) (is-eq contract-caller owner))

More important contracts may be at risk

This is an important point. In this post we have described an attack that causes a user who interacts with a maliciously listed NFT to lose their other NFTs. If only that was the full extent of the problem.

Any contract that uses tx-sender for authentication is at risk.

This is a sobering thought. It is theoretically possible that a protocol owner — using an account that has authority over an important contract — could be tricked into interacting with a malicious NFT and compromise the entire protocol.

Until this kind of vulnerability can be remedied we highly recommend that all important protocol addresses (such as owners, governors, admins, etc) only be used for interacting with protocol contracts and not for anything else.

History

As we said in the introduction, we were not the first to discover this issue. In this section we'll cover the history of this vulnerability in chronological order.

04 Nov 2021 - Treating Traits in Clarity

The earliest mention of tx-sender based authentication we could find was this blog post: Treating Traits in Clarity.

It discusses tx-sender used in conjunction with Clarity's as-contract built-in. Doing this changes tx-sender from the original sender to the contract itself, for the duration of the contract call. As such this blog post actually discusses a slightly different issue than the one covered in this post. However, the final section is worth quoting here:

Second, Clarity requires that traits are provided directly by the user. Traits can't be wrapped or stored. Therefore, the user is in control when using these general contracts. The burden is now on the UI to help users to understand the impact. Apps should inform the users that only vetted contracts can be passed to the general contracts or the apps should warn the user that they are using a potentially malicious contract as a trait. This leads to bigger question about governance. Who can verify contract? Who can blacklist them or who can whitelist them? How can protocol still be permissionless? How can the authenticator support users?

I am looking forward to a healthy discussion about these questions.

16 Nov 2021 - Github repo mijoco-btc/clarity-market issue #6

A short time later a Github issue was published Guarding functions with tx-sender opens up contracts and users for a simple attacks.

It succinctly describes the attack:

Guarding any public function that don't perform any STX/FT/NFT transfer/burn/mint operation with simple tx-sender comparison is a potential security hole. It opens up both contracts and contract users for a very simple attack.

It then suggests some mitigations:

Either guard it with contract-caller or add 1 micro STX transfer to enforce post-conditions.

The idea of adding a 1 uSTX transfer is a little hacky, but it works (for the most part). For normal contract interactions a user is not expecting to be calling a function that requires their authentication. So they can add a post-condition to check that a very specific amount of STX is sent (often 0 STX). If they do accidentally interact with a malicious contract that calls an authentication function the extra 1 uSTX sent causes the post-condition to revert the transaction.

In a follow-up comment the issue poster clarifies this:

Functions that needs extra care are these that can be executed without an post-conditions, and if they get called with malicious intent you can lose control over your contract/protocol/funds. I'm talking about functions like set-approval-for, set-collection-royalties, update-mint-price, set-edition-cost, transfer-administrator just to name a few.

Here we can clearly see that the shortcomings of post-conditions were known as far back as November 2021. Not only that, a reasonable, if a little hacky, solution was proposed to protect functions that couldn't be protected with post-conditions:

If you want to allow your users to call these functions via additional contract eg. to set an approval for multiple NFT's in one TX, then I would just add 1 micro STX transfer

Unfortunately, the 1 uSTX transfer protection mechanism has not been implemented in the vulnerable NFT contracts we found.

Further, it won't work in situations where a variable amount of STX sent is expected by the user.

07 Jan 2022 - Setzeus

Two months later, security firm Setzeus provide a detailed post called Clarity, Carefully - tx-sender. They correctly identify the problem...

regardless of how many hops a transaction makes, tx-sender will always refer to tx-sender — the originator sending the transaction. Now, let’s explore how this persistence can be hijacked for an exploit.

... and then explain a phishing scenario eerily similar to the one we presented.

18 Jul 2024 - BNS-V2 Issue #70

The next post of note is Github repo BNS-V2 Issue #70. It is worth a closer read, if only for the spirited defence of the tx-sender design decision, including an explanation of how tx-sender is useful in a situation where you want to perform multiple operations in one transaction using a proxy contract.

When you use contract-caller as your security measure, then in case of emergency, when you have to pause/lock/secure multiple contracts, or when it is a multi-step procedure, then you have to submit multiple tx and pray that miners will include them all in a single block.

With tx-sender - you can perform multiple operations within single tx by just deploying a contract that contains all steps that you want to perform.

Clearly tx-sender provides some convenience but is it worth the security risk?

The post also re-iterates the 1 uSTX protection mechanism.

Another thing of note is that BNS actually decided to use contract-caller for authentication based on the discussion! Clearly they saw merit in doing this.

11 Sep 2024 - sBTC Issue #500

The final post we will discuss is Github repo stacks-core/sbtc issue #500. The problem is elegantly summarised as follows:

However, checks against tx-sender can be implicitly bypassed once there's a call into a malicious contract. To mitigate this, sBTC relies on Stacks Post-Conditions. These checks, specified outside of contract code, run in deny mode by default, meaning no asset transfers can occur except the ones explicitly allowed. However, there are notable limitations:

  • You can only track outgoing asset transfers from principals but not incoming asset transfers.

  • State changes cannot be tracked.

  • If a contract uses as-contract, it changes tx-sender to its own address. Post-conditions are set once, before the transaction is signed, and cannot be accessed or modified during contract execution. Accordingly, if a contract (e.g., Foo) calls as-contract and subsequently calls sbtc-token:transfer, an attacker could specify a post-condition such as [Foo spends ≥ 0 sBTC] and then drain all sBTC from Foo.

We are also reminded of the insufficiency of post-conditions.

Avoid using tx-sender for any auth purposes altogether as the phishing risk is insufficiently mitigated by Post-Conditions.

An EVM-style approval mechanism is recommended instead.

Conclusion

The issues with tx-sender have been known for at least 4 years and are considered a known and accepted risk.

However, the current authentication design is very much "user beware". The responsibility is squarely placed upon the user's shoulders. They must remain eternally vigilant against interacting with any smart contract that could perform a malicious action on their behalf.

We think this view is short sighted and unfair on users many of whom will not have much technical expertise. For the exploit vector we identified there are far too many users who own NFTs to reasonably assert that education alone will prevent them getting phished.

A novel 1 uSTX transfer mechanism has been suggested as a way to protect functions that cannot be protected by post-conditions. However, it has not been implemented in the NFT contracts we discussed, and new collections with this vulnerability are being still being created to this day.

Our motivation to write this post stemmed from our heartfelt belief that the attack vector we discovered is plausible and exposes users to unacceptable risk.

We sincerely hope that this post inspires further discussion and action around the issue.

About us

We found this bug while working together as Pai Mei & Gandalf.

Pai Mei & Gandalf is:

If you'd like to book us for an audit of your Clarity codebase please contact us at

pai_mei_and_gandalf X protonmail Y com

(replacing the X and Y with the obvious symbols)


1 Solidity has many built-ins as well like tx.origin, msg.sender, msg.value etc. ↩︎

2 Unless another Clarity built-in as-contract is used, in which case it will change to be the current contract. ↩︎

3 Clarity does dynamic dispatch via traits. It's a great design for two reasons. First, the fact that traits are type checked at compile time prevents dispatch to arbitrary functions, thus preventing many security vulnerabilities. More importantly — thanks to a prohibition on traits being stored in contract storage — it also neatly prevents re-entrancy attacks. This, combined with a compile time check for dependency loops ensures re-entrancy is impossible. ↩︎

4 When we wrote this the date was 12 February 2025. ↩︎

0
Subscribe to my newsletter

Read articles from neumo directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

neumo
neumo