For the Braavos Multi Owner Account (MOA) please refer to README_MOA.md
Braavos Account - 0x02c8c7e6fbcfb3e8e15a46648e8914c6aa1fc506fc1e7fb3d1e19630716174bc
Braavos Base Account - 0x03d16c7a9a60b0593bd202f660a28c5d76e0403601d9ccc7e4fa253b6a70c201
Braavos account deployment enables account addresses to be dependent only on the Stark public key while still supporting additional initialization parameters and using the most up-to-date account implementation class hash. This is achieved by:
- Having a base implementation class hash that rarely changes (
src/presets/braavos_base_account.cairo
). Account deployments should always use this class hash. - Send additional initialization parameters in a way that does not affect account address. See below for further details.
- Additional initialization parameters are signed and verified in the base implementation (see
_assert_valid_deploy_params
). - After validation, the base implementation replaces the underlying implementation to the latest one via a
replace_class_syscall
(src/presets/braavos_account.cairo
) and the actual implementation initializer is called.
When using an ACCOUNT_DEPLOY
transaction or a generic deploy
syscall (e.g. UDC) the additional deployment parameters are sent via the signature.
Since validation and initialization for these types of deployments happen in the CTOR, the account is guaranteed to be initialized with the relevant parameters atomically.
Furthermore, since the additional parameters are sent in the signature and not in CTOR parameters, they do not affect the account address.
When using the Braavos Account Factory, no special signature scheme is required. The factory guarantees atomic initialization in this case.
More specifically, the factory calls the CTOR with the Stark key as usual, but then in the same transaction calls initializer_from_factory
which initializes the account.
There are 2 implementations of initializer_from_factory
:
- In the base implementation, the implementation is generic and only responsible for validating the parameters and forwarding them to the account implementation
- In the account implementation, the additional parameters are deserialized according to what that specific account implementation supports. Same as before, since the additional parameters are not sent as CTOR parameters, they do not affect the address.
The Braavos account supports 3 different types of signers:
- Stark Signer - the native signer based on the Stark friendly curve.
- Hardware Signer - Uses the physical device secure enclave to sign - based on the secp256r1 curve.
- Webauthn Signer - Uses the physical device Webauthn protocol (aka Passkeys) implementation to sign - also based on the secp256r1 curve with a webauthn compatible signature format.
The native Stark signer is added by default on account deployment and is usually derived from the seed phrase.
The Hardware Signer and Webauthn Signer are considered to be Strong Signers as they facilitate 2FA. When a Strong Signer is added to the account the default Stark Signer is disabled and not allowed to issue transactions. Only a Strong Signer can.
Note that an account can have both Hardware Signer and Webauthn Signer defined, in which case, any of them can sign as a 'Strong Signer' in the account.
In addition, a multisig threshold can be enabled and support m-of-n signer threshold in order to execute a transaction. When an account have both Hardware signer and Webauthn signer defined, then both of them MUST be present in the multisig.
When there is a Strong Signer defined in the account, the Stark Signer role is reduced to removing all Strong Signers and Multisig with a time lock. The purpose of this mechanism is to allow the user to recover access to his account even if he lost access to the device containing his Strong Signer. The time-lock guarantees that the user have ample time to respond in case his seed phrase was stolen and an attacker tries to remove Strong Signer protection and take over the account.
The default time lock is defined to be 4 days.
The signature format is as follows:
[ signer #1 sig #1, signer #2 sig, signer #3 sig, ... ]
Where each instance of a signer sig is:
[ signer type, signer pub key, ...actual signature fields]
Some important details to note here:
-
We send the
signer pub key
since each signer is saved in the account as a singlefelt252
- guid. When verifying a signature, the guid is calculated from the public key and we verify that it matches one of the guids that are saved in the account. For the Hardware Signer and Webauthn Signer the guid isposeidon(secp256r1 pub key)
-
Signer type
indicates in which signer list we should look for the computed guid. The applicable types are: Stark Signer: 1, Hardware Signer: 2, Webauthn Signer: 5 -
Since currently only the default Stark Signer is supported, when sending a Stark signature there is no need to send the
pub key
together with the signature. In this scenario there are 2 possible formats:- The native
(r, s)
format for compatibility with tooling and SDKs [ signer type (==1), r, s]
- The native
-
More than one signer can be sent in the signature array to allow for
m-of-n
signers in Multisig mode.
The Daily Withdrawal Limit is a feature that allows relaxation of Strong Signer and Multisig requirements for certain types of transactions. All applicable transactions are analyzed for their value (actual token value + gas) and are accumulated per calendar day. While the accumulated amount is under a certain threshold, a weaker signer can be used to validate enabling lower fees and simpler User Experience for lower value transactions.
The Withdrawal Limit thresholds are set in USDC. For example, to set a low withdrawal limit of 100$, withdrawal limit should be set to 100 * 10**6
. We use
MySwap-CL's TWAP pricing to determine the value of an applicable transaction in USDC terms.
Applicable transactions are either transfer
or approve
transactions on the most commonly used tokens (ETH, USDC, USDT, DAI, WBTC) or a whitelisted set of protocol entrypoints.
This whitelist for both tokens and contract entrypoints can be configured manually using the update_rate_config
entrypoint
Two thresholds can be set as part of the daily withdrawal limit:
- Low Limit - controls under which accumulated daily transaction value the Stark Signer can sign even if there are Strong Signers or Multisig defined in the account.
- High Limit - Defines under which accumulated daily transaction value a Strong Signer can be used even if Multisig is defined
When a transaction is validated without utilizing the Daily Withdrawal Limit's use of a weaker signer, i.e. using Strong Signer even though Daily Withdrawal Limit allows usage of Stark Signer for that transaction then the transaction value is not accumulated towards the Withdraw Limit.
This feature is intended to allow different protocols to submit transactions on behalf of the user, given the user had signed the appropriate transactions beforehand. This contract implements SNIP-9 version 2.
This repo is built using Scarb v2.8.4. After installation, run:
scarb build
Prerequisites:
- Install Python requirements
pip install -r requirements.txt
- Setup starknet-devnet-rs
- Define
STARKNET_DEVNET
env variable to point tostarknet-devnet-rs
executable - Define
STARKNET_PY_MARSHMALLOW_UNKNOWN_EXCLUDE
env variable to have the valuetrue
To run tests:
pytest