
Research
/Security News
9 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.
@openzeppelin/merkle-tree
Advanced tools
@openzeppelin/merkle-treeA JavaScript library to generate merkle trees and merkle proofs.
Well suited for airdrops and similar mechanisms in combination with OpenZeppelin Contracts MerkleProof utilities.
npm install @openzeppelin/merkle-tree
import { StandardMerkleTree } from "@openzeppelin/merkle-tree";
import fs from "fs";
// (1)
const values = [
["0x1111111111111111111111111111111111111111", "5000000000000000000"],
["0x2222222222222222222222222222222222222222", "2500000000000000000"]
];
// (2)
const tree = StandardMerkleTree.of(values, ["address", "uint256"]);
// (3)
console.log('Merkle Root:', tree.root);
// (4)
fs.writeFileSync("tree.json", JSON.stringify(tree.dump()));
Assume we're looking to generate a proof for the entry that corresponds to address 0x11...11.
import { StandardMerkleTree } from "@openzeppelin/merkle-tree";
import fs from "fs";
// (1)
const tree = StandardMerkleTree.load(JSON.parse(fs.readFileSync("tree.json", "utf8")));
// (2)
for (const [i, v] of tree.entries()) {
if (v[0] === '0x1111111111111111111111111111111111111111') {
// (3)
const proof = tree.getProof(i);
console.log('Value:', v);
console.log('Proof:', proof);
}
}
In practice this might be done in a frontend application prior to submitting the proof on-chain, with the address looked up being that of the connected wallet.
Once the proof has been generated, it can be validated in Solidity using MerkleProof as in the following example:
pragma solidity ^0.8.4;
import "@openzeppelin/contracts/utils/cryptography/MerkleProof.sol";
contract Verifier {
bytes32 private root;
constructor(bytes32 _root) {
// (1)
root = _root;
}
function verify(
bytes32[] memory proof,
address addr,
uint256 amount
) public {
// (2)
bytes32 leaf = keccak256(bytes.concat(keccak256(abi.encode(addr, amount))));
// (3)
require(MerkleProof.verify(proof, root, leaf), "Invalid proof");
// (4)
// ...
}
}
addr and amount ABI encoded values.MerkleProof's verify function.This library works on "standard" merkle trees designed for Ethereum smart contracts. We have defined them with a few characteristics that make them secure and good for on-chain verification.
The library also supports "simple" merkle trees, which are a simplified version of the standard ones. They are designed to be more flexible and accept arbitrary bytes32 data as leaves. It keeps the same tree shape and internal pair hashing algorithm.
As opposed to standard trees, leaves are not double-hashed. Instead they are ABI encoded to bytes32 and hashed in pairs inside the tree. This is useful to override the leaf hashing algorithm and use a different one prior to building the tree.
Users of tooling that produced trees without double leaf hashing can use this feature to build a representation of the tree in JavaScript. We recommend this approach exclusively for trees that are already built on-chain. Otherwise the standard tree may be a better fit.
import { SimpleMerkleTree } from '@openzeppelin/merkle-tree';
import keccak256 from '@ethersproject/keccak256';
// (1)
const tree = SimpleMerkleTree.of([keccak256('Value 1'), keccak256('Value 2')]);
// (2)
// ...
bytes32 values for the tree.The Standard Merkle Tree uses an opinionated double leaf hashing algorithm. For example, a leaf in the tree with value [addr, amount] can be computed in Solidity as follows:
bytes32 leaf = keccak256(bytes.concat(keccak256(abi.encode(addr, amount))));
This is an opinionated design that we believe will offer the best out of the box experience for most users. However, there are advanced use case where a different leaf hashing algorithm may be needed. For those, the SimpleMerkleTree can be used to build a tree with custom leaf hashing.
Each leaf of a merkle tree can be proven individually. The relative ordering of leaves is mostly irrelevant when the only objective is to prove the inclusion of individual leaves in the tree. Proving multiple leaves at once is however a little bit more difficult.
This library proposes a mechanism to prove (and verify) that sets of leaves are included in the tree. These "multiproofs" can also be verified onchain using the implementation available in @openzeppelin/contracts. This mechanism requires the leaves to be ordered respective to their position in the tree. For example, if the tree leaves are (in hex form) [ 0xAA...AA, 0xBB...BB, 0xCC...CC, 0xDD...DD], then you'd be able to prove [0xBB...BB, 0xDD...DD] as a subset of the leaves, but not [0xDD...DD, 0xBB...BB].
Since this library knows the entire tree, you can generate a multiproof with the requested leaves in any order. The library will re-order them so that they appear inside the proof in the correct order. The MultiProof object returned by tree.getMultiProof(...) will have the leaves ordered according to their position in the tree, and not in the order in which you provided them.
By default, the library orders the leaves according to their hash when building the tree. This is so that a smart contract can build the hashes of a set of leaves and order them correctly without any knowledge of the tree itself. Said differently, it is simpler for a smart contract to process a multiproof for leaves that it rebuilt itself if the corresponding tree is ordered.
However, some trees are constructed iteratively from unsorted data, causing the leaves to be unsorted as well. For this library to be able to represent such trees, the call to StandardMerkleTree.of includes an option to disable sorting. Using that option, the leaves are kept in the order in which they were provided. Note that this option has no effect on your ability to generate and verify proofs and multiproofs in JavaScript, but that it may introduce challenges when verifying multiproofs onchain. We recommend only using it for building a representation of trees that are built (onchain) using an iterative process.
Note Consider reading the array of elements from a CSV file for easy interoperability with spreadsheets or other data processing pipelines.
Note By default, leaves are sorted according to their hash. This is done so that multiproof generated by the library can more easily be verified onchain. This can be disabled using the optional third argument. See the Leaf ordering section for more details.
StandardMerkleTreeimport { StandardMerkleTree } from "@openzeppelin/merkle-tree";
StandardMerkleTree.ofconst tree = StandardMerkleTree.of([[alice, '100'], [bob, '200']], ['address', 'uint'], options);
Creates a standard merkle tree out of an array of the elements in the tree, along with their types for ABI encoding. For documentation on the syntax of the types, including how to encode structs, refer to the documentation for Ethers.js's AbiCoder.
StandardMerkleTree.loadStandardMerkleTree.load(JSON.parse(fs.readFileSync('tree.json', 'utf8')));
Loads the tree from a description previously returned by tree.dump.
StandardMerkleTree.verifyconst verified = StandardMerkleTree.verify(root, ['address', 'uint'], [alice, '100'], proof);
Returns a boolean that is true when the proof verifies that the value is contained in the tree given only the proof, merkle root, and encoding.
StandardMerkleTree.verifyMultiProofconst isValid = StandardMerkleTree.verifyMultiProof(root, leafEncoding, multiproof);
Returns a boolean that is true when the multiproof verifies that all the values are contained in the tree given only the multiproof, merkle root, and leaf encoding.
SimpleMerkleTreeimport { SimpleMerkleTree } from '@openzeppelin/merkle-tree';
SimpleMerkleTree.ofconst tree = SimpleMerkleTree.of([hashFn('Value 1'), hashFn('Value 2')]);
The hashFn is a custom cryptographic leaf hashing algorithm that returns bytes32 values. The tree will be built using these values as leaves. The function should be different to the internal hashing pair algorithm used by the tree.
SimpleMerkleTree.loadSimpleMerkleTree.load(JSON.parse(fs.readFileSync('tree.json', 'utf8')));
Same as StandardMerkleTree.load.
SimpleMerkleTree.verifyconst verified = SimpleMerkleTree.verify(root, hashFn('Value 1'), proof);
Same as StandardMerkleTree.verify, but using raw bytes32 values.
SimpleMerkleTree.verifyMultiProofconst isValid = SimpleMerkleTree.verifyMultiProof(root, multiproof);
Same as StandardMerkleTree.verifyMultiProof.
Both StandardMerkleTree and SimpleMerkleTree share the same API, defined below.
Allows to configure the behavior of the tree. The following options are available:
| Option | Description | Default |
|---|---|---|
sortLeaves | Enable or disable sorted leaves. Sorting is strongly recommended for multiproofs. | true |
tree.rootconsole.log(tree.root);
The root of the tree is a commitment on the values of the tree. It can be published (e.g., in a smart contract) to later prove that its values are part of the tree.
tree.dumpfs.writeFileSync('tree.json', JSON.stringify(tree.dump()));
Returns a description of the merkle tree for distribution. It contains all the necessary information to reproduce the tree, find the relevant leaves, and generate proofs. You should distribute this to users in a web application or command line interface so they can generate proofs for their leaves of interest.
tree.getProofconst proof = tree.getProof(i);
Returns a proof for the ith value in the tree. Indices refer to the position of the values in the array from which the tree was constructed.
Also accepts a value instead of an index, but this will be less efficient. It will fail if the value is not found in the tree.
const proof = tree.getProof(value); // e.g. [alice, '100']
tree.getMultiProofconst { proof, proofFlags, leaves } = tree.getMultiProof([i0, i1, ...]);
Returns a multiproof for the values at indices i0, i1, .... Indices refer to the position of the values in the array from which the tree was constructed.
The multiproof returned contains an array with the leaves that are being proven. This array may be in a different order than that given by i0, i1, ...! The order returned is significant, as it is that in which the leaves must be submitted for verification (e.g., in a smart contract).
Also accepts values instead of indices, but this will be less efficient. It will fail if any of the values is not found in the tree.
const proof = tree.getMultiProof([value1, value2]); // e.g. [[alice, '100'], [bob, '200']]
tree.verifytree.verify(i, proof);
tree.verify(value, proof); // e.g. [alice, '100']
Returns a boolean that is true when the proof verifies that the value is contained in the tree.
tree.verifyMultiProoftree.verifyMultiProof({ proof, proofFlags, leaves });
Returns a boolean that is true when the multi-proof verifies that the values are contained in the tree.
tree.entriesfor (const [i, v] of tree.entries()) {
console.log('value:', v);
console.log('proof:', tree.getProof(i));
}
Lists the values in the tree along with their indices, which can be used to obtain proofs.
tree.renderconsole.log(tree.render());
Returns a visual representation of the tree that can be useful for debugging.
tree.leafHashconst leaf = tree.leafHash(value); // e.g. [alice, '100']
Returns the leaf hash of the value, defined per tree type.
In case of the StandardMerkleTree, it corresponds to the following expression in Solidity:
bytes32 leaf = keccak256(bytes.concat(keccak256(abi.encode(alice, 100))));
1.0.8
FAQs
Utilities to work with merkle trees
The npm package @openzeppelin/merkle-tree receives a total of 22,204 weekly downloads. As such, @openzeppelin/merkle-tree popularity was classified as popular.
We found that @openzeppelin/merkle-tree demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.

Security News
Socket CTO Ahmad Nassri discusses why supply chain attacks now target developer machines and what AI means for the future of enterprise security.

Security News
Learn the essential steps every developer should take to stay secure on npm and reduce exposure to supply chain attacks.