Code Monkey home page Code Monkey logo

capture-the-ic-token's Introduction

Capture The IC Token

This little project implements a canister that will hold on to 0.1 ICP and reveal it to anyone who can guess a secret. The secret is obtained from the Internet Computer’s random tape (using the aaaaa-aa.raw_rand() call), and then kept in main memory. If you find a way to read from the secret tape, or from the canister’s main memory you unlock 0.1 ICP.

The canister is live with canister id 6b4pv-sqaaa-aaaah-qaava-cai.

The ICP is sitting in account 604336f3b4fbd3f45ef058394acdfb8c8e76ea676d90c6147b22888390d06d42 owned by principal dn76p-ld3h7-72osu-zv5tz-ot26n-hag5h-jhc5i-3mgv4-wyu4g-hi4j6-vqe.

FAQ

Why?

Because it seemed like a nice programming puzzle. Also, to demonstrate a few features of the Internet Computer, namely

Did someone hack this already?

Yes! You can check the account to see the transactions on the reward account, and you can go to https://6b4pv-sqaaa-aaaah-qaava-cai.raw.ic0.app/ and see that there were “Successful calls to set_certified_data”.

I heard canisters cannot hold ICPs. How does this work?

Indeed, at the time of writing the ledger will not allow accounts owned by canister ids, so Canisters cannot own ICPs via their canister id (which is a principal).

But canisters can also create Canister Signatures, a “signature scheme” based on certified variables, and mainly used by identity providers such as Internet Identity. The canister gives full control to its certified variables to anyone who has guessed the secret, and thus those can sign withdrawal requests towards the ledger.

I know the secret, how do I get the ICP?

You still have to do a little bit of coding, which is part of the exercise. Here is a rough outline:

  • Create a request to transfer the token to your account.
  • Create a hash tree that contains a signature to this request in /sig//<m> (note that the seed is empty).
  • Pass the root hash of that tree to set_certified_data. To authorize, you have to also pass the hash of the concatenation of your principal (in binary form) and the secret hash.
  • Use get_certificate to get the certificate
  • Construct a canister signature from the certificate and your hash tree
  • Submit this to the Internet Computer
  • Profit

If you like the programming challenge even without finding a bug in the Internet Computer, and have implemented a tool for this, feel free to link to it here.

Are you really running the code you claim to run?

You can check yourself! See the blog post about verifying the Internet Identity for a rough outline. I used dfx-0.7.0 (moc-0.6.1) on Linux to build this canister.

Who is the controller of this canister?

No one. You can check with dfx canister info or on ic.rocks.

If you see zrl4w-cqaaa-nocon-troll-eraaa-d5qc shown as a controller, then you are using a tool that does not speak the latest IC protocol. This is a placeholder princpal (note that it says “no controller” in the middle).

The canister reports its cycle balance at https://6b4pv-sqaaa-aaaah-qaava-cai.raw.ic0.app/. Feel free to donate a few cycles. If this canister runs out of cycles and gets removed by the system, the ICP prize is lost forever.

Why does this canister control some canisters?

Becuase I was given this canister by a colleage who was using this as a wallet canister, but does not use it any more. Guess these controlled canisters are now also orphans.

Are Canister Signaures even supported yet?

The [Interface Spec] specifies them on all subnets, but the replica, at the time of writing, only accepts them from canisters on the root subnet. This restriction is currently implemented in these lines, and will be removed soon™. If you indeed manage to get the secret before this restriction is removed, well, be proud of it.

How did you calculate the principal and account number?

The principal “owning” the token is derived from a Canister Signature public “key”, with the empty blob as the seed. From that we can calculate the ICP ledger address (with subaccount 0).

I used the code in dfinity/ic-hs for these calculations:

~/dfinity/ic-hs $ cabal repl
> :set -XOverloadedStrings
> import Codec.Candid
> let Right (Principal raw_canister) = parsePrincipal "6b4pv-sqaaa-aaaah-qaava-cai"
> let raw_principal = IC.Id.Forms.mkSelfAuthenticatingId (IC.Crypto.DER.encode IC.Crypto.DER.CanisterSig $ IC.Crypto.CanisterSig.genPublicKey (EntityId raw_canister) "")
> prettyPrincipal (Principal raw_principal)
"dn76p-ld3h7-72osu-zv5tz-ot26n-hag5h-jhc5i-3mgv4-wyu4g-hi4j6-vqe"
> import qualified Data.ByteString.Lazy as BS
> let subaccount = BS.replicate 32 0
> let account_hash = IC.Hash.sha224 ("\x0a" <> "account-id" <> raw_principal <> subaccount)
> import Data.Digest.CRC32
> let CRC32 checksum = digest (BS.toStrict account_hash)
> import qualified Data.ByteString.Builder as BS
> let checkbytes = BS.toLazyByteString (BS.word32BE checksum)
> import qualified Text.Hex as T
> T.encodeHex (BS.toStrict (checkbytes <> account_hash))
"604336f3b4fbd3f45ef058394acdfb8c8e76ea676d90c6147b22888390d06d42"

What happens if I transfer funds to that account?

They will up the stakes for this treasure hunt, so feel free to! But note that very likely, these tokens would simply be lost.

Also, should the subnet hosting this canister ever get reset, or Canister Signatures not implemented as planned, the tokens would be lost.

What is fj6bh-taaaa-aaaab-qaacq-cai?

The canister at fj6bh-taaaa-aaaab-qaacq-cai is an earlier attempt at setting up this challenge, but it is buggy buggy version of the challenge. See commit 112933 for the changes.

This means that in order to get the ICP token “owned” by that canister, which sits in 62c01571c33e6b6d118842e2bc25193d6730f6a05580c64d4438411062f13310, can be reaped by anyone who manages to modify the canister code or state.

Good luck!

This account holds 1 ICP and was the account I originally claimed to be owned by the present canister. But I made a mistake calculating the account number, so that token is probably lost forever. H't to @mraszyk for noticing when he solved the challenge.

More questions or comments?

I have enabled the discussion feature on this repository, feel free to use it. Else https://forum.dfinity.org/ is a fine venue for questions.

capture-the-ic-token's People

Contributors

mraszyk avatar nomeata avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

Forkers

myp904

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.