This standard defines a broadly applicable action messaging protocol for the transmission of user-initiated actions between tokens. Modular statefulness is achieved with optional state controller contracts (i.e. environments) that manage shared state, and provide arbitration and settlement of the action process.
Tokenized item standards such as EIP-721 and EIP-1155 serve as the objects of the Ethereum computing environment. A growing number of projects are seeking to build interactivity and "digital physics" into NFTs, especially in the contexts of gaming and decentralized identity. A standard action messaging protocol will allow this physics layer to be developed in the same open, Ethereum-native way as the objects they operate on.
The messaging protocol outlined defines how an action is initiated and transmitted between tokens and (optional) shared state environments. It is paired with a common interface for defining functionality that allows off-chain services to aggregate and query supported contracts for functionality and interoperability; creating a discoverable, human-readable network of interactive token contracts. Not only can contracts that implement this standard be automatically discovered by such services, their policies for interaction can be as well. This allows clients to easily discover compatible senders and receivers, and allowed actions.
Aggregators can also parse action event logs to derive analytics on new action types, trending/popular/new interactive contracts, which token and state contract pairs users are likely to interact with, and other discovery tools to facilitate interaction.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.
Smart contracts implementing this EIP standard MUST implement the EIP-165 supportsInterface function and MUST return the constant value true
if the IERC5050Sender
interface ID 0xc8c6c9f3
and/or the IERC5050Receiver
interface ID 0x1a3f02f4
is passed through the interfaceID
argument (depending on which interface(s) the contract implements).
pragma solidity ^0.8.0;
/// @param _address The address of the interactive object
/// @param tokenId The token that is interacting (optional)
struct Object {
address _address;
uint256 _tokenId;
}
/// @param selector The bytes4(keccack256()) encoding of the action string
/// @param user The address of the sender
/// @param from The initiating object
/// @param to The receiving object
/// @param state The state controller contract
/// @param data Additional data with no specified format
struct Action {
bytes4 selector;
address user;
Object from;
Object to;
address state;
bytes data;
}
/// @title EIP-5050 Interactive NFTs with Modular Environments
interface IERC5050Sender {
/// @notice Send an action to the target address
/// @dev The action's `fromContract` is automatically set to `address(this)`,
/// and the `from` parameter is set to `msg.sender`.
/// @param action The action to send
function sendAction(Action memory action) external payable;
/// @notice Check if an action is valid based on its hash and nonce
/// @dev When an action passes through all three possible contracts
/// (`fromContract`, `to`, and `state`) the `state` contract validates the
/// action with the initiating `fromContract` using a nonced action hash.
/// This hash is calculated and saved to storage on the `fromContract` before
/// action handling is initiated. The `state` contract calculates the hash
/// and verifies it and nonce with the `fromContract`.
/// @param _hash The hash to validate
/// @param _nonce The nonce to validate
function isValid(bytes32 _hash, uint256 _nonce) external returns (bool);
/// @notice Retrieve list of actions that can be sent.
/// @dev Intended for use by off-chain applications to query compatible contracts,
/// and to advertise functionality in human-readable form.
function sendableActions() external view returns (string[] memory);
/// @notice Change or reaffirm the approved address for an action
/// @dev The zero address indicates there is no approved address.
/// Throws unless `msg.sender` is the `_account`, or an authorized
/// operator of the `_account`.
/// @param _account The account of the account-action pair to approve
/// @param _action The action of the account-action pair to approve
/// @param _approved The new approved account-action controller
function approveForAction(
address _account,
bytes4 _action,
address _approved
) external returns (bool);
/// @notice Enable or disable approval for a third party ("operator") to conduct
/// all actions on behalf of `msg.sender`
/// @dev Emits the ApprovalForAll event. The contract MUST allow
/// an unbounded number of operators per owner.
/// @param _operator Address to add to the set of authorized operators
/// @param _approved True if the operator is approved, false to revoke approval
function setApprovalForAllActions(address _operator, bool _approved)
external;
/// @notice Get the approved address for an account-action pair
/// @dev Throws if `_tokenId` is not a valid NFT.
/// @param _account The account of the account-action to find the approved address for
/// @param _action The action of the account-action to find the approved address for
/// @return The approved address for this account-action, or the zero address if
/// there is none
function getApprovedForAction(address _account, bytes4 _action)
external
view
returns (address);
/// @notice Query if an address is an authorized operator for another address
/// @param _account The address on whose behalf actions are performed
/// @param _operator The address that acts on behalf of the account
/// @return True if `_operator` is an approved operator for `_account`, false otherwise
function isApprovedForAllActions(address _account, address _operator)
external
view
returns (bool);
/// @dev This emits when an action is sent (`sendAction()`)
event SendAction(
bytes4 indexed name,
address _from,
address indexed _fromContract,
uint256 _tokenId,
address indexed _to,
uint256 _toTokenId,
address _state,
bytes _data
);
/// @dev This emits when the approved address for an account-action pair
/// is changed or reaffirmed. The zero address indicates there is no
/// approved address.
event ApprovalForAction(
address indexed _account,
bytes4 indexed _action,
address indexed _approved
);
/// @dev This emits when an operator is enabled or disabled for an account.
/// The operator can conduct all actions on behalf of the account.
event ApprovalForAllActions(
address indexed _account,
address indexed _operator,
bool _approved
);
}
interface IERC5050Receiver {
/// @notice Handle an action
/// @dev Both the `to` contract and `state` contract are called via
/// `onActionReceived()`.
/// @param action The action to handle
function onActionReceived(Action calldata action, uint256 _nonce)
external
payable;
/// @notice Retrieve list of actions that can be received.
/// @dev Intended for use by off-chain applications to query compatible contracts,
/// and to advertise functionality in human-readable form.
function receivableActions() external view returns (string[] memory);
/// @dev This emits when a valid action is received.
event ActionReceived(
bytes4 indexed name,
address _from,
address indexed _fromContract,
uint256 _tokenId,
address indexed _to,
uint256 _toTokenId,
address _state,
bytes _data
);
}
Actions SHOULD use dot-separation for namespacing (e.g. "spells.cast"
specifies the "cast"
action with namespace "spells"
), and arrow-separation for sequence specification (e.g. "settle>build"
indicating "settle"
must be received before "build"
).
Actions do not require that a state contract be used. Actions can be transmitted from one token contract (Object
) to another, or from a user to a single token contract. In these cases, the sending and receiving contracts each control their own state.
State contracts allow arbitrary senders and receivers to share a user-specified state environment. Each Object
MAY define its own action handling, which MAY include reading from the state contract during, but the action MUST be finalized by the state contract. This means the state contract serves as ground truth.
The intended workflow is for state contracts to define stateful game environments, typically with a custom IState
interface for use by other contracts. Objects
register with state contracts to initialize their state. Then, users commit actions using a specific state contract to make things happen in the game.
The modularity of state contracts allows multiple copies of the same or similar "game environment" to be created and swapped in or out by the client. There are many ways this modularity can be used:
State Contract FightGame
defines a fighting game environment. Token holders call FightGame.register(contract, tokenId)
to randomly initialize their stats (strength/hp/etc.). An account which holds a registered token A of contract Fighters
, calls Fighters.sendAction(AttackAction)
, specifying token A from Fighters
as the sender, token B from Pacifists
contract as the receiver, and FightGame
as the state contract.
The action is passed to token B, which may handle the action in whatever way it wants before passing the action to the FightGame
state contract. The state contract can verify the stored action hash with the Fighters
contract to validate the action is authentic before updating the stats if the tokens, dealing damage to token B.
Tokens A and B may update their metadata based on stats in the FightGame
state contract, or based on their own stored data updated in response to sending/receiving actions.
Some contracts may have custom user interfaces that facilitate interaction.
pragma solidity ^0.8.0;
/// @title EIP-5050 Interactive NFTs with Modular Environments
interface IERC5050Interactive {
function interfaceURI(bytes4 _action) external view returns (string);
}
Action proxies can be used to support backwards compatibility with non-upgradeable contracts, and potentially for cross-chain action bridging.
They can be implemented using a modified version of EIP-1820 that allows EIP-173 contract owners to call setManager()
.
Users of this standard may want to allow trusted contracts to control the action process to provide security guarantees, and support action bridging. Controllers step through the action chain, calling each contract individually in sequence.
Contracts that support Controllers SHOULD ignore require/revert statements related to action verification, and MUST NOT pass the action to the next contract in the chain.
pragma solidity ^0.8.0;
/// @title EIP-5050 Action Controller
interface IControllable {
/// @notice Enable or disable approval for a third party ("controller") to force
/// handling of a given action without performing EIP-5050 validity checks.
/// @dev Emits the ControllerApproval event. The contract MUST allow
/// an unbounded number of controllers per action.
/// @param _controller Address to add to the set of authorized controllers
/// @param _action Selector of the action for which the controller is approved / disapproved
/// @param _approved True if the controller is approved, false to revoke approval
function setControllerApproval(address _controller, bytes4 _action, bool _approved)
external;
/// @notice Enable or disable approval for a third party ("controller") to force
/// action handling without performing EIP-5050 validity checks.
/// @dev Emits the ControllerApproval event. The contract MUST allow
/// an unbounded number of controllers per action.
/// @param _controller Address to add to the set of authorized controllers
/// @param _approved True if the controller is approved, false to revoke approval
function setControllerApprovalForAll(address _controller, bool _approved)
external;
/// @notice Query if an address is an authorized controller for a given action.
/// @param _controller The trusted third party address that can force action handling
/// @param _action The action selector to query against
/// @return True if `_controller` is an approved operator for `_account`, false otherwise
function isApprovedController(address _controller, bytes4 _action)
external
view
returns (bool);
/// @dev This emits when a controller is enabled or disabled for the given
/// action. The controller can force `action` handling on the emitting contract,
/// bypassing the standard EIP-5050 validity checks.
event ControllerApproval(
address indexed _controller,
bytes4 indexed _action,
bool _approved
);
/// @dev This emits when a controller is enabled or disabled for all actions.
/// Disabling all action approval for a controller does not override explicit action
/// action approvals. Controller's approved for all actions can force action handling
/// on the emitting contract for any action.
event ControllerApprovalForAll(
address indexed _controller,
bool _approved
);
}
Interactive NFTs are likely to update their metadata in response to certain actions and developers MAY want to implement EIP-4906 event emitters.
The critical features of this interactive token standard are that it 1) creates a common way to define, advertise, and conduct object interaction, 2) enables optional, brokered statefulness with useful validity assurances at minimum gas overhead, 3) is easy for developers to implement, and 4) is easy for end-users to use.
Actions are advertised using human-readable strings, and processed using function selectors (bytes4(keccack256(action_key))
). Human-readable strings allow end-users to easily interpret functionality, while function selectors allow efficient comparison operations on arbitrarily long action keys. This scheme also allows for simple namespacing and sequence specification.
Off-chain services can easily convert the strings to bytes4
selector encoding when interacting with contracts implementing this EIP or parsing SendAction
and ActionReceived
event logs.
Validation of the initiating contract via a hash of the action data was satisfactory to nearly everyone surveyed and was the most gas efficient verification solution explored. We recognize that this solution does not allow the receiving and state contracts to validate the initiating user
account beyond using tx.origin
, which is vulnerable to phishing attacks.
We considered using a signed message to validate user-intiation, but this approach had two major drawbacks:
Most importantly, the consensus among the developers surveyed is that strict user validation is not necessary because the concern is only that malicious initiating contracts will phish users to commit actions with the malicious contract's assets. This protocol treats the initiating contract's token as the prime mover, not the user. Anyone can tweet at Bill Gates. Any token can send an action to another token. Which actions are accepted, and how they are handled is left up to the contracts. High-value actions can be reputation-gated via state contracts, or access-gated with allow/disallow-lists. Controllable
contracts can also be used via trusted controllers as an alternative to action chaining.
Alternatives considered: action transmitted as a signed message, action saved to reusable storage slot on initiating contract
Moving state logic into dedicated, parameterized contracts makes state an action primitive and prevents state management from being obscured within the contracts. Specifically, it allows users to decide which "environment" to commit the action in, and allows the initiating and receiving contracts to share state data without requiring them to communicate.
The specifics of state contract interfaces are outside the scope of this standard, and are intended to be purpose-built for unique interactive environments.
Action handling within each contract can be arbitrarily complex, and there is no way to eliminate the possibility that certain contract interactions will run out of gas. However, developers SHOULD make every effort to minimize gas usage in their action handler methods, and avoid the use of for-loops.
Alternatives considered: multi-request action chains that push-pull from one contract to the next.
Non-upgradeable, already deployed token contracts will not be compatible with this standard unless a proxy registry extension is used.
A reference implementation is included in ../static/assets/eip-5050
with a simple stateless example ExampleToken2Token.sol
, and a stateful example ExampleStateContract.sol
The core security consideration of this protocol is action validation. Actions are passed from one contract to another, meaning it is not possible for the receiving contract to natively verify that the caller of the initiating contract matches the action.from
address. One of the most important contributions of this protocol is that it provides an alternative to using signed messages, which require users to perform two operations for every action committed.
As discussed in Validation, this is viable because the initiating contract / token is treated as the prime mover, not the user.
Copyright and related rights waived via CC0.