Test, lint, deploy and maintain your dapps
Use linters on your smart contracts to ensure they meet best practices.
Solhint is an open source project for linting Solidity code. This project provides both Security and Style Guide validations. Installation You can install Solhint using npm:npm install -g solhint # verify that it was installed correctly solhint -V Usage For linting Solidity files you need to run Solhint with one or more Globs as arguments. For example, to lint all files inside contracts directory, you can do:solhint contracts/**/*.sol To lint a single file:solhint contracts/MyToken.sol Solhint c
Ethlint (Formerly Solium) analyzes your Solidity code for style & security issues and fixes them. Installnpm install -g ethlint solium -V For backward-compatibility, you can still use npm install -g solium. If youre currently using the solium package for npm install, it is highly recommended that you move to ethlint. The solium package will not receive updates after December, 2019. There are no differences between the updates pushed to ethlint and solium packages. Usage In the root directory of
Zeppelin create tools to help you create and maintain secure smart contracts.
Truffle is a suite of tools to help Dapp developers build, deploy and manage their applications. The three tools provide a stack for managing the development lifecycle of an application similar to those you may have used with other languages and frameworks. These are: Ganache, for starting a personal test Ethereum blockchain on your machine. Truffle, for managing the lifecycle of smart contracts and the artifacts your contracts need. Drizzle, a collection of front-end libraries for standardizing
Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors, prints visual information about contract details, and provides an API to easily write custom analyses. Slither enables developers to find vulnerabilities, enhance their code comprehension, and quickly prototype custom analyses. Features Detects vulnerable Solidity code with low false positives Identifies where the error condition occurs in the source code Easily integrates into contin