home / skills / multiversx / mx-ai-skills / multiversx-wasm-debug
This skill analyzes compiled WASM binaries to optimize size, diagnose panics, and map errors to Rust sources for faster debugging.
npx playbooks add skill multiversx/mx-ai-skills --skill multiversx-wasm-debugReview the files below or copy the command above to add this skill to your agents.
---
name: multiversx-wasm-debug
description: Analyze compiled WASM binaries for size optimization, panic analysis, and debugging with DWARF symbols. Use when troubleshooting contract deployment issues, optimizing binary size, or debugging runtime errors.
---
# MultiversX WASM Debugging
Analyze compiled `output.wasm` files for size optimization, panic investigation, and source-level debugging. This skill helps troubleshoot deployment issues and runtime errors.
## When to Use
- Contract deployment fails due to size limits
- Investigating panic/trap errors at runtime
- Optimizing WASM binary size
- Understanding what's in your compiled contract
- Mapping WASM errors back to Rust source code
## 1. Binary Size Analysis
### Using Twiggy
Twiggy analyzes WASM binaries to identify what consumes space:
```bash
# Install twiggy
cargo install twiggy
# Top consumers of space
twiggy top output/my-contract.wasm
# Dominators analysis (what keeps what in the binary)
twiggy dominators output/my-contract.wasm
# Paths to specific functions
twiggy paths output/my-contract.wasm "function_name"
# Full call graph
twiggy callgraph output/my-contract.wasm > graph.dot
```
### Sample Twiggy Output
```
Shallow Bytes │ Shallow % │ Item
───────────────┼───────────┼─────────────────────────────────
12847 │ 18.52% │ data[0]
8291 │ 11.95% │ "function names" subsection
5738 │ 8.27% │ core::fmt::Formatter::pad
4521 │ 6.52% │ alloc::string::String::push_str
```
### Common Size Bloat Causes
| Cause | Size Impact | Solution |
|-------|-------------|----------|
| Panic messages | High | Use `sc_panic!` or strip in release |
| Format strings | High | Avoid `format!`, use static strings |
| JSON serialization | Very High | Use binary encoding |
| Large static arrays | High | Generate at runtime or store off-chain |
| Unused dependencies | Variable | Audit `Cargo.toml` |
| Debug symbols | High | Build in release mode |
### Size Reduction Techniques
```toml
# Cargo.toml - optimize for size
[profile.release]
opt-level = "z" # Optimize for size
lto = true # Link-time optimization
codegen-units = 1 # Better optimization, slower compile
panic = "abort" # Smaller panic handling
strip = true # Strip symbols
```
```bash
# Build optimized release
sc-meta all build --release
# Further optimize with wasm-opt
wasm-opt -Oz output/contract.wasm -o output/contract.opt.wasm
```
## 2. Panic Analysis
### Understanding Contract Traps
When a contract traps (panics), you see:
```
error: execution terminated with signal: abort
```
### Common Trap Causes
| Symptom | Likely Cause | Investigation |
|---------|--------------|---------------|
| `unreachable` | Panic without message | Check `unwrap()`, `expect()` |
| `out of gas` | Computation limit hit | Check loops, storage access |
| `memory access` | Buffer overflow | Check array indexing |
| `integer overflow` | Math operation | Check arithmetic |
### Finding Panics in WASM
```bash
# List all functions in WASM
wasm-objdump -x output/contract.wasm | grep "func\["
# Disassemble to find unreachable instructions
wasm-objdump -d output/contract.wasm | grep -B5 "unreachable"
# Count panic-related code
wasm-objdump -d output/contract.wasm | grep -c "panic"
```
### Panic Message Stripping
By default, `sc_panic!` includes message strings. In production:
```rust
// Development - full messages
sc_panic!("Detailed error: invalid amount {}", amount);
// Production - stripped messages
// Build with --release and wasm-opt removes strings
```
Or use error codes:
```rust
const ERR_INVALID_AMOUNT: u32 = 1;
const ERR_UNAUTHORIZED: u32 = 2;
// Smaller binary, less descriptive
if amount == 0 {
sc_panic!(ERR_INVALID_AMOUNT);
}
```
## 3. DWARF Debug Information
### Building with Debug Symbols
```bash
# Build debug version with source mapping
sc-meta all build --wasm-symbols
# Alternative (equivalent)
sc-meta all build --wasm-symbols
```
### Debug Build Output
Debug builds produce:
- `contract.wasm` - Contract bytecode
- `contract.wasm.map` - Source map (if available)
- Larger file size with DWARF sections
### Using Debug Information
```bash
# View DWARF info
wasm-objdump --debug output/contract.wasm
# List debug sections
wasm-objdump -h output/contract.wasm | grep "debug"
```
### Source-Level Debugging
With debug symbols, you can:
1. Map WASM instruction addresses to Rust source lines
2. Set breakpoints at source locations
3. Inspect variable values (in compatible debuggers)
```bash
# Using wasmtime for debugging
wasmtime run --invoke function_name -g output/contract.wasm
```
## 4. WASM Structure Analysis
### Examining Contract Structure
```bash
# Full WASM dump
wasm-objdump -x output/contract.wasm
# Sections overview
wasm-objdump -h output/contract.wasm
# Export functions (endpoints)
wasm-objdump -j Export -x output/contract.wasm
# Import functions (VM API calls)
wasm-objdump -j Import -x output/contract.wasm
```
### Understanding WASM Sections
| Section | Purpose | Audit Focus |
|---------|---------|-------------|
| Type | Function signatures | API surface |
| Import | VM API functions used | Capabilities |
| Function | Internal functions | Code size |
| Export | Public endpoints | Attack surface |
| Code | Actual bytecode | Logic |
| Data | Static data | Embedded secrets? |
| Name | Debug names | Information leak |
### Checking Exports
```bash
# List all exported functions
wasm-objdump -j Export -x output/contract.wasm | grep "func"
# Expected exports for MultiversX:
# - init: Constructor
# - upgrade: Upgrade handler
# - callBack: Callback handler
# - <endpoint_names>: Your endpoints
```
## 5. Gas Profiling
### Estimating Gas Costs
```bash
# Deploy to devnet using sc-meta or an interactor
sc-meta all deploy --proxy https://devnet-gateway.multiversx.com --chain D
# Or use a Rust interactor for programmatic deployment
# See the multiversx-sc interactor pattern for details
```
### Identifying Gas-Heavy Code
Common gas-intensive patterns:
1. Storage reads/writes
2. Cryptographic operations
3. Large data serialization
4. Loop iterations
```rust
// Gas-expensive
for item in self.large_list().iter() { // N storage reads
self.process(item);
}
// Gas-optimized
let batch_size = 10;
for i in 0..batch_size {
let item = self.large_list().get(start_index + i);
self.process(item);
}
```
## 6. Common Debugging Scenarios
### Scenario: Contract Deployment Fails
```bash
# Check binary size
ls -la output/contract.wasm
# Max size is typically 256KB for deployment
# If too large, analyze and optimize
twiggy top output/contract.wasm
```
### Scenario: Transaction Fails with `unreachable`
1. Check for `unwrap()` calls
2. Check for array index out of bounds
3. Check for division by zero
4. Build with debug and check DWARF info
### Scenario: Gas Exceeded
```bash
# Build with debug to get better error location
sc-meta all build --wasm-symbols
# Profile the specific function
# Add logging to identify which loop/storage access is expensive
```
### Scenario: Unexpected Behavior
```rust
// Add debug logging (remove in production)
#[endpoint]
fn debug_function(&self, input: BigUint) {
// Log to events for debugging
self.debug_event(&input);
// Your logic
let result = self.compute(input);
self.debug_event(&result);
}
#[event("debug")]
fn debug_event(&self, value: &BigUint);
```
## 7. Tools Summary
| Tool | Purpose | Install |
|------|---------|---------|
| `twiggy` | Size analysis | `cargo install twiggy` |
| `wasm-objdump` | WASM inspection | Part of wabt |
| `wasm-opt` | Size optimization | `cargo install wasm-opt` or part of binaryen |
| `wasmtime` | WASM runtime/debug | `cargo install wasmtime` |
| `sc-meta` | MultiversX build tool | `cargo install multiversx-sc-meta` |
## 8. Best Practices
1. **Always check release size** before deployment
2. **Profile on devnet** before mainnet deployment
3. **Use events for debugging** instead of storage (cheaper)
4. **Strip debug info** in production builds
5. **Monitor gas costs** as contract evolves
6. **Keep twiggy reports** to track size changes over time
This skill analyzes compiled MultiversX WASM binaries to help you optimize size, investigate panics/traps, and enable source-level debugging with DWARF symbols. It streamlines troubleshooting for deployment failures, runtime errors, and gas or size regressions. Use it to map WASM issues back to Rust source and to apply concrete size-reduction techniques.
The skill inspects output.wasm using tools like twiggy, wasm-objdump, wasm-opt, and wasmtime to report top size consumers, disassemble code, and locate panic sites. It guides building with or without DWARF symbols, generates source mappings, and provides commands to profile gas usage and examine exports, imports, and sections. It recommends build flags and post-processing steps to shrink or debug the binary.
How do I find which function causes a panic?
Disassemble the WASM (wasm-objdump -d) and search for unreachable or panic symbols. Build with --wasm-symbols to map addresses back to source lines and set breakpoints in a debugger like wasmtime.
What are the fastest wins to reduce WASM size?
Strip debug symbols, switch panic to abort or use numeric error codes, avoid format! and heavy serde JSON, enable LTO and opt-level=z, then run wasm-opt -Oz.
Should I keep DWARF in production?
No. DWARF is valuable for debugging on devnet but inflates binaries and can leak information. Build with symbols for troubleshooting, then produce a stripped release for deployment.