
Security News
Security Community Slams MIT-linked Report Claiming AI Powers 80% of Ransomware
Experts push back on new claims about AI-driven ransomware, warning that hype and sponsored research are distorting how the threat is understood.
@chainlink/evm-gauntlet-safe
Advanced tools
EVM Gauntlet Safe commands and wrapper
This package provides commands to manage a Gnosis Safe as well as a wrapper function that can be used to make an existing command able to be executed via Gnosis Safe
yarn gauntlet gnosis_safe:deploy --network=<NETWORK>
yarn gauntlet gnosis_safe_proxy_factory:deploy --network=<NETWORK>
yarn gauntlet gnosis_multisend:deploy --network=<NETWORK>
yarn gauntlet confirmed_transaction_module:deploy --network=<NETWORK>
In order to deploy a single safe that can be used to manage contracts, deploy a safe instance via the following command:
yarn gauntlet gnosis_safe_proxy_factory:deploy_safe_instance --network=<NETWORK> --owners=<OWNERS> --threshold=<THRESHOLD> <PROXY_FACTORY_CONTRACT_ADDRESS>
For example:
yarn gauntlet gnosis_safe_proxy_factory:deploy_safe_instance --network=goerli --owners='["0xbd6A907a03882C4c4Ab3af5274e13a96d5c006EC"]' --threshold=1 <PROXY_FACTORY_CONTRACT_ADDRESS>
After this step, use the address returned from this command as the SAFE_ADDRESS in your .env file before attempting to execute any gauntlet commands via safe
Gauntlet EVM commands are automatically wrapped with the safe wrapper so they can be executed through the safe easily. Commands can be executed via safe proposal flow by suffixing :safe in the command ID when running a Gauntlet command. For example, the following command makes a contract call to an arbitrary contract:
yarn gauntlet storage:store 0xEcE2bC2C6de2e5d90Cd939a31Fd7C1159AC088c3 --value=8
This same command can be executed via the safe proposal flow by running the following command:
yarn gauntlet storage:store:safe 0xEcE2bC2C6de2e5d90Cd939a31Fd7C1159AC088c3 --value=8
Sometimes users might want not want to imemdiately broadcast transactions. Users might want to sign transactions in advance in order to broadcast later. This can be achieved by using the --exportApprove or --exportExecute flag with any Safe command. For example the following command returns the signed transaction payload for an approveHash call:
yarn gauntlet storage:store:safe 0xEcE2bC2C6de2e5d90Cd939a31Fd7C1159AC088c3 --value=8 --exportApprove
Similarly, the following command returns the signed transaction payload for an execTransaction call:
yarn gauntlet storage:store:safe 0xEcE2bC2C6de2e5d90Cd939a31Fd7C1159AC088c3 --value=8 --exportExecute
One thing to note when using --exportExecute flag is that the transaction is encoded with the current existing approvers for that proposal onchain. This may not always be desired, in which case, the approvers used to encode the transaction can be overridden with the --expectedApprovers flag. This flag expects a comma-delimited string of addresses like below:
yarn gauntlet storage:store:safe 0xEcE2bC2C6de2e5d90Cd939a31Fd7C1159AC088c3 --value=8 --exportExecute --expectedApprovers=0x001,0x002,0x003
FAQs
EVM Gauntlet Safe
The npm package @chainlink/evm-gauntlet-safe receives a total of 2,781 weekly downloads. As such, @chainlink/evm-gauntlet-safe popularity was classified as popular.
We found that @chainlink/evm-gauntlet-safe demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 9 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Experts push back on new claims about AI-driven ransomware, warning that hype and sponsored research are distorting how the threat is understood.

Security News
Ruby's creator Matz assumes control of RubyGems and Bundler repositories while former maintainers agree to step back and transfer all rights to end the dispute.

Research
/Security News
Socket researchers found 10 typosquatted npm packages that auto-run on install, show fake CAPTCHAs, fingerprint by IP, and deploy a credential stealer.