🚀 Big News: Socket Acquires Coana to Bring Reachability Analysis to Every Appsec Team.Learn more
Socket
DemoInstallSign in
Socket

@meshsdk/contract

Package Overview
Dependencies
Maintainers
3
Versions
119
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@meshsdk/contract

List of open-source smart contracts, complete with documentation, live demos, and end-to-end source code. https://meshjs.dev/smart-contracts

1.9.0-beta.53
latest
npm
Version published
Maintainers
3
Created
Source

Mesh Smart Contracts Library

Here's a list of open-source smart contracts, complete with documentation, live demos, and end-to-end source code.

meshjs.dev/smart-contracts

ContractDescriptionLinks
Content OwnershipCreate a content registry and users can create content that is stored in the registry[demo] [source] [docs]
EscrowFacilitates the secure exchange of assets between two parties by acting as a trusted intermediary that holds the assets until the conditions of the agreement are met[demo] [source] [docs]
GiftcardAllows users to create a transactions to lock assets into the smart contract, which can be redeemed by any user[demo] [source] [docs]
Hello WorldA simple lock-and-unlock assets contract, providing a hands-on introduction to end-to-end smart contract validation and transaction building[demo] [source] [docs]
MarketplaceAllows anyone to buy and sell native assets such as NFTs[demo] [source] [docs]
NFT Minting MachineMint NFTs with an automatically incremented index, which increases by one for each newly minted NFT[demo] [source] [docs]
Payment SplitterAllows users to split incoming payments among a group of accounts[demo] [source] [docs]
SwapFacilitates the exchange of assets between two parties[demo] [source] [docs]
VestingAllows users to lock tokens for a period of time and withdraw the funds after the lockup period[demo] [source] [docs]

List of 'Bad' Contracts

This helps developers to better understand how smart contracts work and improves their ability to fix bad contracts.

Unbound value

Unbound value is a vulnerability where the hackers can spam the application by providing excessive unnecessary tokens in a validator, causing permanent lock of value in validator due to protocol limitation of execution units. In the escrow example, we did not specificallly guard this scenario since it did not make economical sense for both initiator and recipient to perform such hack. However, it other application or scenario it may be required to specifically check the length of input / output to prevent such hack from happening.

Infinite mint

Infinite mint is a vulnerability where there is no strict restriction on minting a particular policy where malicious players can mint more than desired tokens from one transaction. Normally it comes from when the validator checks against whether a particular token has been minted without strictly prohibiting other tokens from minting. This vulnerability is dangerous when a complex application relies on certain policy ID for authentication, while malicious players can produce uncontrolled circulation of token with that policy ID, leading to complex hacking scenarios causing loss of funds.

Insufficient stake control

Insufficient stake control is a vulnerability where the value payment only check against payment key but not checking with a full address. Malicious player can fulfill the validator unlocking logic by sending value to an address with his/her own stake key to steal the staking reward and voting power if the user is not aware of that.

Locked value

Locked value is a design where the application would cause permanent lock of value alike burning value permenantly. It will cause loss of fund and value circulation. However, in some scenarios it might be a intented behaviour to produce umtamperable utxos to serve as single proven source of truth for apps. One should consider the economics and tradeoff against the design choice. In the plutus nft example, locked value vulnerability is not considered as severe since only around 2 ADA would be permenantly lock in oracle.

Double satisfaction

This is a vulnerability where a bad actor can unlock multiple script utxos by fulfilling less than intented criteria. This swap example illustrate this vulnerability by not checking there is only 1 script input. It leads to bad actors can extract more value than it was expected from the protocol.

Resources

Keywords

cardano

FAQs

Package last updated on 26 May 2025

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts