Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
@nomiclabs/hardhat-etherscan
Advanced tools
The @nomiclabs/hardhat-etherscan
plugin is deprecated in favor of our new @nomicfoundation/hardhat-verify
plugin.
hardhat-verify
hardhat-verify
is a drop-in replacement of hardhat-etherscan
. To migrate to it:
@nomiclabs/hardhat-etherscan
package@nomicfoundation/hardhat-verify
package@nomicfoundation/hardhat-verify
instead of @nomiclabs/hardhat-etherscan
This plugin helps you verify the source code for your Solidity contracts on Etherscan.
It's smart and it tries to do as much as possible to facilitate the process:
npm install --save-dev @nomiclabs/hardhat-etherscan
And add the following statement to your hardhat.config.js
:
require("@nomiclabs/hardhat-etherscan");
Or, if you are using TypeScript, add this to your hardhat.config.ts
:
import "@nomiclabs/hardhat-etherscan";
This plugin provides the verify
task, which allows you to verify contracts through Etherscan's service.
This plugin does not extend the environment.
You need to add the following Etherscan config to your hardhat.config.js
file:
module.exports = {
networks: {
mainnet: { ... }
},
etherscan: {
// Your API key for Etherscan
// Obtain one at https://etherscan.io/
apiKey: "YOUR_ETHERSCAN_API_KEY"
}
};
Alternatively you can specify more than one block explorer API key, by passing an object under the apiKey
property, see Multiple API keys and alternative block explorers
.
Lastly, run the verify
task, passing the address of the contract, the network where it's deployed, and the constructor arguments that were used to deploy it (if any):
npx hardhat verify --network mainnet DEPLOYED_CONTRACT_ADDRESS "Constructor argument 1"
When the constructor has a complex argument list, you'll need to write a javascript module that exports the argument list. The expected format is the same as a constructor list for an ethers contract. For example, if you have a contract like this:
struct Point {
uint x;
uint y;
}
contract Foo {
constructor (uint x, string s, Point memory point, bytes b) { ... }
}
then you can use an arguments.js
file like this:
module.exports = [
50,
"a string argument",
{
x: 10,
y: 5,
},
// bytes have to be 0x-prefixed
"0xabcdef",
];
Where the third argument represents the value for the point
parameter.
The module can then be loaded by the verify
task when invoked like this:
npx hardhat verify --constructor-args arguments.js DEPLOYED_CONTRACT_ADDRESS
Some library addresses are undetectable. If your contract uses a library only in the constructor, then its address cannot be found in the deployed bytecode.
To supply these missing addresses, you can create a javascript module that exports a library dictionary and pass it through the --libraries
parameter:
hardhat verify --libraries libraries.js OTHER_ARGS
where libraries.js
looks like this:
module.exports = {
SomeLibrary: "0x...",
};
If your project targets multiple EVM-compatible networks that have different explorers, you'll need to set multiple API keys.
To configure the API keys for the chains you are using, provide an object under etherscan/apiKey
with the identifier of each chain as the key. This is not necessarily the same name that you are using to define the network. For example, if you are going to verify contracts in Ethereum mainnet, Optimism and Arbitrum, your config would look like this:
module.exports = {
networks: {
mainnet: { ... },
testnet: { ... }
},
etherscan: {
apiKey: {
mainnet: "YOUR_ETHERSCAN_API_KEY",
optimisticEthereum: "YOUR_OPTIMISTIC_ETHERSCAN_API_KEY",
arbitrumOne: "YOUR_ARBISCAN_API_KEY",
}
}
};
To see the full list of supported networks, run npx hardhat verify --list-networks
. The identifiers shown there are the ones that should be used as keys in the apiKey
object.
If the chain you are using is not in the list, you can manually add the necessary information to verify your contracts on it. For this you need three things: the chain id of the network, the URL of the verification endpoint, and the URL of the explorer.
For example, if Goerli wasn't supported, you could add it like this:
etherscan: {
apiKey: {
goerli: "<goerli-api-key>"
},
customChains: [
{
network: "goerli",
chainId: 5,
urls: {
apiURL: "https://api-goerli.etherscan.io/api",
browserURL: "https://goerli.etherscan.io"
}
}
]
}
Keep in mind that the name you are giving to the network in customChains
is the same one that has to be used in the apiKey
object.
To see which custom chains are supported, run npx hardhat verify --list-networks
.
To call the verification task from within a Hardhat task or script, use the "verify:verify"
subtask. Assuming the same contract as above, you can run the subtask like this:
await hre.run("verify:verify", {
address: contractAddress,
constructorArguments: [
50,
"a string argument",
{
x: 10,
y: 5,
},
"0xabcdef",
],
});
If the verification is not successful, an error will be thrown.
If your contract has libraries with undetectable addresses, you may pass the libraries parameter with a dictionary specifying them:
hre.run("verify:verify", {
// other args
libraries: {
SomeLibrary: "0x...",
}
}
The plugin works by fetching the bytecode in the given address and using it to check which contract in your project corresponds to it. Besides that, some sanity checks are performed locally to make sure that the verification won't fail.
FAQs
Hardhat plugin for verifying contracts on etherscan
The npm package @nomiclabs/hardhat-etherscan receives a total of 53,244 weekly downloads. As such, @nomiclabs/hardhat-etherscan popularity was classified as popular.
We found that @nomiclabs/hardhat-etherscan demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.