Install
openclaw skills install upgrade-stellar-contractsUpgrade Stellar/Soroban smart contracts using OpenZeppelin's upgradeable module. Use when users need to: (1) make Soroban contracts upgradeable via native WA...
openclaw skills install upgrade-stellar-contractsSoroban contracts are mutable by default. Mutability refers to the ability of a smart contract to modify its own WASM bytecode, altering its function interface, execution logic, or metadata. Soroban provides a built-in, protocol-level mechanism for contract upgrades — no proxy pattern is needed.
A contract can upgrade itself if it is explicitly designed to do so. Conversely, a contract becomes immutable simply by not provisioning any upgrade function. This is fundamentally different from EVM proxy patterns:
| Soroban | EVM (proxy pattern) | Starknet | |
|---|---|---|---|
| Mechanism | Native WASM bytecode replacement | Proxy delegatecalls to implementation contract | replace_class_syscall swaps class hash in-place |
| Proxy contract needed | No — the contract upgrades itself | Yes — a proxy sits in front of the implementation | No — the contract upgrades itself |
| Storage location | Belongs to the contract directly | Lives in the proxy, accessed via delegatecall | Belongs to the contract directly |
| Opt-in to immutability | Don't expose an upgrade function | Don't deploy a proxy | Don't call the syscall |
One advantage of protocol-level upgradeability is a significantly reduced risk surface compared to platforms that require proxy contracts and delegatecall forwarding.
The new implementation only becomes effective after the current invocation completes. This means if migration logic is defined in the new implementation, it cannot execute within the same call as the upgrade. An auxiliary Upgrader contract can wrap both calls to achieve atomicity (see below).
OpenZeppelin Stellar Soroban Contracts provides an upgradeable module in the contract-utils package with two main components:
| Component | Use when |
|---|---|
Upgradeable | Only the WASM binary needs to be updated — no storage migration required |
UpgradeableMigratable | The WASM binary and specific storage entries need to be modified during the upgrade |
The recommended way to use these is through derive macros: #[derive(Upgradeable)] and #[derive(UpgradeableMigratable)]. These macros handle the implementation of necessary functions and set the crate version from Cargo.toml as the binary version in WASM metadata, aligning with SEP-49 guidelines.
Derive Upgradeable on the contract struct, then implement UpgradeableInternal with a single required method:
_require_auth(e: &Env, operator: &Address) — verify the operator is authorized to perform the upgrade (e.g., check against a stored owner address)The operator parameter is the invoker of the upgrade function and can be used for role-based access control.
Derive UpgradeableMigratable on the contract struct, then implement UpgradeableMigratableInternal with:
MigrationData type defining the data passed to the migration function_require_auth(e, operator) — same authorization check as above_migrate(e: &Env, data: &Self::MigrationData) — perform storage modifications using the provided migration dataThe derive macro ensures that migration can only be invoked after a successful upgrade, preventing state inconsistencies and storage corruption.
Because the new implementation only takes effect after the current invocation completes, migration logic in the new contract cannot run in the same call as the upgrade. An auxiliary Upgrader contract wraps both calls atomically:
use soroban_sdk::{contract, contractimpl, symbol_short, Address, BytesN, Env, Val};
use stellar_contract_utils::upgradeable::UpgradeableClient;
use stellar_contract_utils::access::Ownable;
#[contract]
pub struct Upgrader;
#[contractimpl]
impl Upgrader {
#[only_owner]
pub fn upgrade_and_migrate(
env: Env,
contract_address: Address,
operator: Address,
wasm_hash: BytesN<32>,
migration_data: soroban_sdk::Vec<Val>,
) {
operator.require_auth();
let contract_client = UpgradeableClient::new(&env, &contract_address);
contract_client.upgrade(&wasm_hash, &operator);
env.invoke_contract::<()>(
&contract_address,
&symbol_short!("migrate"),
migration_data,
);
}
}
CRITICAL — Upgrader access control: The Upgrader contract MUST have its own access control (e.g.,
#[only_owner]from theaccesspackage). Theoperator.require_auth()call only proves the operator signed the transaction — it does not prove they are authorized to upgrade the target contract. If the target contract's_require_authtrusts the Upgrader's address (rather than the original caller), then without access control on the Upgrader itself, anyone can trigger upgrades through it.
If a rollback is required, the contract can be upgraded to a newer version where rollback-specific logic is defined and performed as a migration.
Examples: See the
examples/directory of the stellar-contracts repository for full working integration examples of bothUpgradeableandUpgradeableMigratable, including theUpgraderpattern.
The upgradeable module deliberately does not embed access control itself. You must define authorization in the _require_auth method of UpgradeableInternal or UpgradeableMigratableInternal. Forgetting this allows anyone to replace your contract's code.
Common access control options:
access package)access package)The framework structures the upgrade flow but does not perform deeper checks:
When replacing the WASM binary, existing storage is reinterpreted by the new code. Incompatible changes corrupt state:
symbol_short!("OWNER")), so key naming is critical — unlike EVM sequential slots, there is no ordering dependencyThe derive macros automatically extract the crate version from Cargo.toml and embed it as the binary version in the WASM metadata, following SEP-49. This enables on-chain version tracking and can be used to coordinate upgrade paths.
Before upgrading a production contract:
stellar-cli with local network)upgradeUpgrader pattern if migration is needed