Skip to content

Commit

Permalink
Merge pull request #1248 from Agoric/rs-closely-vs-widely-held
Browse files Browse the repository at this point in the history
docs: closely held vs widely held
  • Loading branch information
rabi-siddique authored Oct 25, 2024
2 parents a9bdafb + 806577a commit 9ba04aa
Show file tree
Hide file tree
Showing 2 changed files with 17 additions and 1 deletion.
16 changes: 16 additions & 0 deletions main/guides/js-programming/hardened-js.md
Original file line number Diff line number Diff line change
Expand Up @@ -79,6 +79,22 @@ e.g., only giving the `entryGuard` the ability to increment the counter.

This limits the damage that can happen if there is an exploitable bug.

### Widely Shared vs. Closely Held

#### Widely Shared Capabilities

In the object capability model, "widely shared" refers to capabilities that are accessible to a large portion of the code within a system. For example:

- [**agoricNames**](/guides/integration/name-services.html#agoricnames-agoricnamesadmin-well-known-names): This component serves as a read-only name service, which means it can be accessed by most parts of the system. Since it only allows data to be read and not modified, it poses minimal risk and can be safely made widely available.
Similarly, in [Access Control with Objects](/guides/zoe/contract-access-control.html#access-control-with-objects), this concept is mirrored by the **publicFacet**, which exposes safe-to-share functionality publicly.

#### Closely Held Capabilities

On the other hand, "closely held" capabilities are restricted and only accessible to specific parts of the system that require them to function effectively:

- [**agoricNamesAdmin**](/guides/integration/name-services.html#agoricnames-agoricnamesadmin-well-known-names): Known as the write facet of the name service, this component allows modifications to the data in `agoricNames`. Given its capability to alter critical system data, access to `agoricNamesAdmin` is limited to only those parts of the system that have a legitimate need for write access.
This precaution helps to prevent potential misuse or errors that could compromise the system. This parallels the **creatorFacet** in [Access Control with Objects](/guides/zoe/contract-access-control.html#access-control-with-objects), that is provided only to the caller who creates the contract instance.

::: tip Watch: Navigating the Attack Surface
to achieve a _multiplicative_ reduction in risk. _15 min_<br />

Expand Down
2 changes: 1 addition & 1 deletion main/guides/zoe/contract-access-control.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ We can write a simple test as below to make sure that trying to `set` using the

<<< @/../snippets/zoe/contracts/test-zoe-hello.js#test-access

Note that the `set()` method has no access check inside it. Access control is based on separation of powers between the `publicFacet`, which is expected to be shared widely, and the `creatorFacet`, which is closely held. _We'll discuss this [object capabilities](../js-programming/hardened-js#object-capabilities-ocaps) approach more later._ If you're having trouble, check out the [`tut-03-access`](https://github.com/Agoric/dapp-offer-up/tree/tut-03-access) branch in the example repo.
Note that the `set()` method has no access check inside it. Access control is based on separation of powers between the `publicFacet`, which is expected to be [shared widely](/guides/js-programming/hardened-js.html#widely-shared-capabilities), and the `creatorFacet`, which is [closely held](/guides/js-programming/hardened-js.html#closely-held-capabilities). _We'll discuss this [object capabilities](../js-programming/hardened-js#object-capabilities-ocaps) approach more later._ If you're having trouble, check out the [`tut-03-access`](https://github.com/Agoric/dapp-offer-up/tree/tut-03-access) branch in the example repo.

## Object Access Rules

Expand Down

0 comments on commit 9ba04aa

Please sign in to comment.