Crytic-compile

Latest version: v0.3.7

Safety actively analyzes 630305 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 5 of 5

0.1.2

Not secure
This release extends crytic-compile capacities and fixes a bug related to the file encoding.

Added
- Support for native `solc` in truffle (https://github.com/crytic/crytic-compile/pull/20)
- Add etherlime> 2.0.0 support (https://github.com/crytic/crytic-compile/issues/19)
- Add support for a list of different `solc` versions (https://github.com/crytic/crytic-compile/pull/18)

Changed
- Cli: return -1 if the compilation failed (https://github.com/crytic/crytic-compile/issues/21)

Fixed
- Fix utf8 related bugs (https://github.com/crytic/crytic-compile/commit/95a0b1a6b934d2e1674e6310f7ca71db459cfb42, https://github.com/crytic/crytic-compile/commit/5901c747c53c6546bc73d9dd90caf84b76b76457)

0.1.1

Not secure
This release fixes minor bugs and extends `crytic-compile` capacities

Added
- `is_dependency` API to determine if a file is from a library (https://github.com/crytic/crytic-compile/commit/3ed5160924d08a4d3c86d7cddf9f1e17dfe51808)
- Allow compilation of relative and absolute paths for truffle/embark/dapp https://github.com/crytic/crytic-compile/pull/14

Changed
- Improve support for old solc version (https://github.com/crytic/crytic-compile/commit/5bf2527a2b7e7b90a36a53ac18d439be7067a9bb)
- Improve custom version of truffle (https://github.com/crytic/crytic-compile/commit/dbf3a1686c39a27ba247f9d5592a36b150bf4b38)
- Use `truffle compile --all` to prevent incorrect json update (https://github.com/crytic/crytic-compile/commit/e74f659353cd1080c6d035f115b3520b5ce04c67)
- Change filename of saved etherscan files https://github.com/crytic/crytic-compile/pull/15

Fixed
- Fix error when compiling empty contract (https://github.com/crytic/crytic-compile/pull/13)
- Fix collision if a filename is named as an etherscan address (https://github.com/crytic/crytic-compile/pull/10)

0.1.0

Not secure
First public release of `crytic-compile`. The library standardizes the smart contract compilation. It can be used as a command line or through the [Python API](https://github.com/crytic/crytic-compile/wiki/Library-Documentation).

Features
- ASTs
- ABIs
- Init and runtime bytecode
- Init and runtime source map
- Compiler version and optimization
- Standardization of the paths
- Standardization of the compilation options

Platforms supported
- Truffle
- Embark
- Dapp
- Etherlime
- Etherscan

See the [Configuration documentation](https://github.com/crytic/crytic-compile/wiki/Configuration) for advanced usages.

Tools integration
- Slither https://github.com/crytic/slither/pull/199
- Echidna https://github.com/crytic/echidna/pull/204
- Manticore https://github.com/trailofbits/manticore/pull/1406
- evm-cfg-builder https://github.com/crytic/evm_cfg_builder/pull/19

Page 5 of 5

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.