ERC-6464: Multi-operator, per-token ERC-721 approvals.
Extends ERC-721 to allow token owners to approve multiple operators to control their assets on a per-token basis.
Abstract
ERC-721 did not foresee the approval of multiple operators to manage a specific token on behalf of its owner. This lead to the establishment of setApprovalForAll()
as the predominant way to authorise operators, which affords the approved address control over all assets and creates an unnecessarily broad security risk that has already been exploited in a multitude of phishing attacks. The presented EIP extends ERC-721 by introducing a fine-grained, on-chain approval mechanism that allows owners to authorise multiple, specific operators on a per-token basis; this removes unnecessary access permissions and shrinks the surface for exploits to a minimum. The provided reference implementation further enables cheap revocation of all approvals on a per-owner or per-token basis.
Motivation
The NFT standard defined in ERC-721 allows token owners to "approve" arbitrary addresses to control their tokens—the approved addresses are known as "operators". Two types of approval were defined:
approve(address,uint256)
provides a mechanism for only a single operator to be approved for a giventokenId
; andsetApprovalForAll(address,bool)
toggles whether an operator is approved for every token owned bymsg.sender
.
With the introduction of multiple NFT marketplaces, the ability to approve multiple operators for a particular token is necessary if sellers wish to allow each marketplace to transfer a token upon sale. There is, however, no mechanism for achieving this without using setApprovalForAll()
. This is in conflict with the principle of least privilege and creates an attack vector that is exploited by phishing for malicious (i.e. zero-cost) sell-side signatures that are executed by legitimate marketplace contracts.
This EIP therefore defines a fine-grained approach for approving multiple operators but scoped to specific token(s).
Goals
- Ease of adoption for marketplaces; requires minimal changes to existing workflows.
- Ease of adoption for off-chain approval-indexing services.
- Simple revocation of approvals; i.e. not requiring one per grant.
Non-goals
- Security measures for protecting NFTs other than through limiting the scope of operator approvals.
- Compatibility with ERC-1155 semi-fungible tokens. However we note that the mechanisms described herein are also applicable to ERC-1155 token types without requiring approval for all other types.
Specification
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 and RFC 8174.
To comply with this EIP, a contract MUST implement IERC6464
(defined herein) and the ERC165
and ERC721
interfaces; see ERC-165 and ERC-721 respectively.
Rationale
Draft notes to be expanded upon
- Approvals granted via the newly introduced methods are called explicit as a means of easily distinguishing them from those granted via the standard
ERC721.approve()
andERC721.setApprovalForAll()
functions. However they follow the same intent: authorising operators to act on the owner's behalf. - Abstracting
isApprovedFor()
intoIERC6464AnyApproval
interface, as against keeping it inIERC6464
allows for modularity of plainIERC6464
implementations while also standardising the interface for checking approvals when interfacing with specific implementations and any future approval EIPs. - Inclusion of an indexed owner address in
AllExplicitApprovalsRevoked(address,uint256)
assists off-chain indexing of existing approvals. - Re
IERC6464AnyApproval
: With an increasing number of approval mechanisms it becomes cumbersome for marketplaces to integrate with them since they have to query multiple interfaces to check if they are approved to manage tokens. This provides a streamlined interface, intended to simplify data ingestion for them.
Backwards Compatibility
This extension was written to allow for the smallest change possible to the original ERC-721 spec while still providing a mechanism to grant, revoke and track approvals of multiple operators on a per-token basis.
Extended contracts remain fully compatible with all existing platforms.
Note the Security Considerations
sub-section on Other risks
regarding interplay of approval types.
Reference Implementation
TODO: add internal link to assets directory when the implementation is in place.
An efficient mechanism for broad revocation of approvals via incrementing nonces is included.
Security Considerations
Threat model
Mitigations
Other risks
TODO: Interplay with setApprovalForAll()
.
Needs discussion.
Copyright
Copyright and related rights waived via CC0.