Trust in canisters

From Internet Computer Wiki
Jump to: navigation, search

Trust in canisters


A key aspect of DeFi and related applications in canister (dapps/smart contracts) is the ability to transfer value, e.g. ICP or Bitcoin. Such functionality makes trust in canisters essential. How can one ensure that it is safe to entrust ICPs to a canister?

The answer to this question has two separate dimensions: i) confidence that the canister does what it is supposed to do and ii) confidence that the canister behavior will not unexpectedly change.

The canister does what it is supposed to do

The correct behavior of a canister can be checked in two steps. First, inspect the source code used to generate the Wasm code deployed in a canister to ensure that it implements the expected/claimed functionality, and only this functionality. Second, ensure that the Wasm module the canister runs, has indeed been generated from the claimed source code. Here, reproducibility of the build is crucial: the developer should have constructed the Wasm module so that precisely the same Wasm can be rebuilt from scratch. The user can then compare the hash of the rebuilt Wasm module with the module hash reported by the IC. Developers and users can find guidance on ensuring reproducibility in Reproducible canisters.

The behavior of the canister cannot unexpectedly change

Canisters (dapps/smart contracts) are deployed and managed by controllers. Among other capabilities, controllers can change the code for the canisters which they control so canister code is mutable, unlike smart contracts on other blockchains. For critical applications like those used in DeFi, mutability can be dangerous: The controller could change a benign canister into a canister that steals ICP. Below we outline some options available to developers on how to verifiably restrict mutability.

Complete immutability

Below we discuss several options available which would turn a canister into an immutable object (as far as code updates are concerned).

The simplest option is to make the canister immutable by removing its controller. A user can verify the list of controllers for a canister using dfx. For example:

dfx canister --network ic info ryjl3-tyaaa-aaaaa-aaaba-cai

will return the list of controllers for the canister with principal ryjl3-tyaaa-aaaaa-aaaba-cai (in this example, the ledger canister). If the controller list is empty then the canister is immutable.

Immutability can also be achieved by setting the controller of a canister to be itself. In this case, however, you need to carefully verify that the canister cannot somehow submit a request to upgrade itself, e.g. by issuing a reinstall request. Here, code inspection and reproducible builds are crucial.

Finally, a somewhat more useful solution is to pass control of the canister to a so-called “black hole” canister. This canister is itself immutable (it has only itself as controller), but allows third parties to obtain useful information about the canisters the black hole controls, such as the available cycles balance of a black-holed canister. An instance of a black hole canister is e3mmv-5qaaa-aaaah-aadma-cai which is thoroughly documented here.

Governed mutability

A more complex but powerful approach is to control the canister via a distributed governance mechanism, i.e., via a Decentralized Autonomous Organization (DAO). One can imagine different levels of complexity and control that such a governance mechanism may implement. An example is the (upcoming) SNS feature which allows developers to set the controller of their canister to some governing canister. Needless to say, the trust requirements are moved to the SNS controlling the canister where all of the considerations regarding code inspection and reproducibility apply.