Market Cap: $2.6639T -6.17%
Volume(24h): $183.6111B 9.70%
Fear & Greed Index:

26 - Fear

  • Market Cap: $2.6639T -6.17%
  • Volume(24h): $183.6111B 9.70%
  • Fear & Greed Index:
  • Market Cap: $2.6639T -6.17%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top Cryptospedia

Select Language

Select Language

Select Currency

Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos

What is the difference between call, delegatecall, and staticcall in Solidity?

Understanding `call`, `delegatecall`, and `staticcall` is crucial for secure Solidity development, as each alters execution context, state access, and security risks differently.

Nov 14, 2025 at 06:59 pm

Understanding the distinctions between call, delegatecall, and staticcall is essential for secure and efficient smart contract development in Solidity. These low-level functions allow interaction with other contracts or external accounts but behave differently in terms of context, state modification, and execution environment.

call

1. The call function invokes another contract’s function while forwarding a specified amount of Ether and executing code in the called contract’s context.

  1. It uses the callee’s storage, code, and balance, meaning any state changes occur within the target contract’s scope.
  2. This method is commonly used when interacting with external contracts whose ABI may not be known at compile time.
  3. Developers must carefully handle return data since call returns a boolean indicating success or failure, along with optional return bytes.
  4. Misuse can lead to reentrancy vulnerabilities if proper checks-effects-interactions patterns are not followed.

delegatecall

1. delegatecall executes code from a different contract but retains the caller’s storage, context, and balance.

  1. It is often used in proxy patterns where logic is separated from data, enabling upgradeable contracts.
  2. Since state modifications affect the calling contract’s storage, extreme caution is required when aligning storage layouts between proxy and implementation.
  3. Unlike call, no Ether is transferred during a delegatecall unless explicitly sent via additional mechanisms.
  4. Security risks include malicious implementation contracts altering critical variables such as ownership or balances in the proxy.

staticcall

1. staticcall is designed to invoke functions that do not modify the state of the blockchain.

  1. Any attempt to write to storage, emit events, or perform operations that change state will cause the call to revert.
  2. This function is useful for safely reading data from external contracts without risking unintended side effects.
  3. Like call, it operates within the target contract’s code but enforces a read-only mode on execution.
  4. Its primary use case includes querying token balances, checking allowances, or retrieving immutable values from third-party contracts.

Common Questions

What happens if a delegatecall targets a contract with mismatched storage layout?If the storage slots in the calling contract do not align with those expected by the logic in the called contract, variables can be overwritten incorrectly. For example, an address stored in one slot might be interpreted as a uint256, leading to corrupted data or unauthorized access.

Can staticcall be used to interact with payable functions?Yes, staticcall can target payable functions as long as they do not actually modify state. However, sending Ether through staticcall is redundant because value transfers inherently involve state changes and would cause the call to fail.

Why is call considered riskier than staticcall in certain scenarios?Because call allows both state changes and Ether transfers, it opens up attack vectors such as reentrancy attacks. Without strict input validation and control flow management, an external contract could recursively drain funds during a callback.

Is delegatecall compatible with all types of contract upgrades?While delegatecall enables upgradeability, it requires careful design. Storage collisions, function selector clashes, and initialization issues can break functionality. Transparent proxies and UUPS patterns help mitigate these risks but demand rigorous testing and auditing.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Related knowledge

See all articles

User not found or password invalid

Your input is correct