Solidity, the Smart Contract Programming Language
Go to file
Martin Blicha 12bca24774 [SMTChecker] Use path condition when creating CHC targets
Without path condition, verification targets created inside ternary
operator ignore the condition of the operator inside the branches.
This led to false positives.

Further updates:

- Function calls should consider the conditions under which they are
called, otherwise the analysis may report false positives.
The fix proposed here is to add the current path condition to the edge
that propagates error from a function call.

- Increment error index after function call

This is necessary for the analysis of the ternary operator to work
correctly. No information should leak from a function call inside a
ternary operator in the first branch to the second branch, including
whether or not an error would have occured in the first branch.

However, for the execution that continues after the function call,
we still need to ensure that under the current path condition
the error has not occurred in that function call.

It would be better to isolate the analysis of the branches to separate
clauses, but I do not see an easy way for that now. In this way, even
though the function call in first branch is included in the clause of
the second branch, no information leaks.

- Additonal test for ternary operator

This tests the behaviour of SMTChecker on ternary operator with function
calls inside both branches. Specifically, it tests that SMTChecker
successfully detects a violation of a verification target in the second
branch when the same target is present also in the first branch, but
there it cannot be triggered because of the operator's condition.
2023-04-21 18:56:34 +02:00
.circleci Merge pull request #13982 from ethereum/cleanup-base-images 2023-04-21 18:09:30 +02:00
.github Update ubuntu ossfuzz references 2023-04-19 00:18:11 +02:00
cmake Improve comment on CMP0115 2022-08-31 12:12:15 +03:00
docs Merge pull request #14123 from ethereum/docs-and-index-tweaks-for-literals 2023-04-18 16:31:14 +02:00
libevmasm feat: change generation of bytecode for pushes with zero-value 2023-04-12 00:10:24 +02:00
liblangutil Refactor TokenTraits::isUnaryOp() not to treat + as a unary operator 2023-04-18 16:49:31 +02:00
libsmtutil Fixes handling bitwise operators for z3 model checker 2023-02-08 18:37:17 +01:00
libsolc Add std:: qualifier to move() calls 2022-08-30 11:12:15 +02:00
libsolidity [SMTChecker] Use path condition when creating CHC targets 2023-04-21 18:56:34 +02:00
libsolutil Add util::capitalized() and Type::categoryName() 2023-04-04 17:30:37 +02:00
libyul Emit PUSH0 as junk in evm code transform, if available. 2023-04-17 16:26:07 +02:00
scripts Merge pull request #13982 from ethereum/cleanup-base-images 2023-04-21 18:09:30 +02:00
snap Snap: update z3 2021-10-06 18:00:07 -06:00
solc feat: introduce EVM Version Shanghai 2023-04-12 00:10:24 +02:00
test [SMTChecker] Use path condition when creating CHC targets 2023-04-21 18:56:34 +02:00
tools Remove solidity-upgrade 2023-01-17 07:59:43 -07:00
.clang-format [.clang-format ] Update prohibited property 'AlignEscapedNewlinesLeft'. 2023-04-12 11:44:23 -05:00
.dockerignore adds .dockerignore file 2018-06-26 12:21:04 +02:00
.editorconfig .editorconfig: Indentation rules for .yul 2020-11-10 23:31:05 +01:00
.gitattributes Create .gitattributes 2018-02-20 18:41:02 -05:00
.gitignore External tests maintenance 2022-12-16 11:34:00 +01:00
Changelog.md [SMTChecker] Use path condition when creating CHC targets 2023-04-21 18:56:34 +02:00
CMakeLists.txt use new z3 2023-03-28 14:37:01 +02:00
CODE_OF_CONDUCT.md Update CODE_OF_CONDUCT.md 2022-11-09 14:55:59 +01:00
codecov.yml Fix patch coverage settings 2019-02-20 16:09:00 +01:00
CODING_STYLE.md Use std:: prefix with std::forward() as well to satisfy Clang 2023-03-06 18:20:49 +01:00
CONTRIBUTING.md Replace links to readthedocs.io with ones using the new domain 2020-11-18 15:20:34 +01:00
LICENSE.txt Align license to those in file headers. 2016-06-08 22:57:30 +02:00
README.md Update README maintainers 2022-11-08 16:30:00 +01:00
ReleaseChecklist.md Update ReleaseChecklist.md post release steps (#14007) 2023-04-03 17:55:17 +01:00
ReviewChecklist.md Use std:: prefix with std::forward() as well to satisfy Clang 2023-03-06 18:20:49 +01:00
SECURITY.md Replace links to readthedocs.io with ones using the new domain 2020-11-18 15:20:34 +01:00

The Solidity Contract-Oriented Programming Language

Matrix Chat Gitter Chat Solidity Forum Twitter Follow Mastodon Follow

You can talk to us on Gitter and Matrix, tweet at us on Twitter or create a new topic in the Solidity forum. Questions, feedback, and suggestions are welcome!

Solidity is a statically typed, contract-oriented, high-level language for implementing smart contracts on the Ethereum platform.

For a good overview and starting point, please check out the official Solidity Language Portal.

Table of Contents

Background

Solidity is a statically-typed curly-braces programming language designed for developing smart contracts that run on the Ethereum Virtual Machine. Smart contracts are programs that are executed inside a peer-to-peer network where nobody has special authority over the execution, and thus they allow anyone to implement tokens of value, ownership, voting, and other kinds of logic.

When deploying contracts, you should use the latest released version of Solidity. This is because breaking changes, as well as new features and bug fixes, are introduced regularly. We currently use a 0.x version number to indicate this fast pace of change.

Build and Install

Instructions about how to build and install the Solidity compiler can be found in the Solidity documentation.

Example

A "Hello World" program in Solidity is of even less use than in other languages, but still:

// SPDX-License-Identifier: MIT
pragma solidity >=0.6.0 <0.9.0;

contract HelloWorld {
    function helloWorld() external pure returns (string memory) {
        return "Hello, World!";
    }
}

To get started with Solidity, you can use Remix, which is a browser-based IDE. Here are some example contracts:

  1. Voting
  2. Blind Auction
  3. Safe remote purchase
  4. Micropayment Channel

Documentation

The Solidity documentation is hosted using Read the Docs.

Development

Solidity is still under development. Contributions are always welcome! Please follow the Developers Guide if you want to help.

You can find our current feature and bug priorities for forthcoming releases in the projects section.

Maintainers

The Solidity programming language and compiler are open-source community projects governed by a core team. The core team is sponsored by the Ethereum Foundation.

License

Solidity is licensed under GNU General Public License v3.0.

Some third-party code has its own licensing terms.

Security

The security policy may be found here.