Security News
Combatting Alert Fatigue by Prioritizing Malicious Intent
In 2023, data breaches surged 78% from zero-day and supply chain attacks, but developers are still buried under alerts that are unable to prevent these threats.
elven-tools
Advanced tools
Interacting with custom NFT related Smart Contracts on the Elrond blockchain
🚨 Not enough tests! As for the mainnet, use it at your own risk! 🚨
For now it is designed to deploy the contract: elven-nft-minter-sc.
npm install elven-tools -g
elven-tools --version
or elvent-tools -v
elven-tools --help
or elven-tools -h
- for getting the commands on the root levelelven-tools nft-minter --help
or elven-tools nft-minter -h
- for getting all the commands for the subcommandBe aware that, by default, all will happen on the devnet. See below how to change it.
First steps:
elven-tools derive-pem
- you would need to generate the PEM file for all further operations, do not share it with anyone. It works similar to erdpy wallet derive
. It will take the keyphrase and generate the walletKey.pem
file in the same directory.elven-tools deploy nft-minter
- by default, the tools will take the abi and wasm source code and deploy directly from the defined tag branch of the smart contract. There are two options to work with it, though. You can configure a different branch or tag, or you can download the files and work on them locally.development
create the .elventoolsrc
file in the same directory where the walletKey.pem
file is located, put there { "nftMinter": { "version": "development" } }
. It can be also a tag name of the release in this GitHub repository.walletKey.pem
. It should look like: sc/nft-minter
. Here you will need to put the .wasm and .abi.json files which you can get from the output directory of the Smart Contract.elven-tools nft-minter issue-collection-token
. You will be asked for the name and the ticker. Keep the name without spaces and the ticker short and capitalized.elven-tools nft-minter set-roles
elven-tools nft-minter shuffle
. Anyone can call this anytime, but it should be called once before the minting. Otherwise, the mint process won't work.elven-tools nft-minter start-minting
or setup a drop elven-tools nft-minter set-drop
where the minting will be split into 'waves'. The first version of the Smart Contract mints randomly on demand and sends the NFT to the buyer. More advanced logic will land in version 2.walletKey.pem
for that run elven-tools nft-minter mint
.elven-tools nft-minter --help
; below, you'll find all of them with short descriptions.Examples of how you can configure your Smart Contract in a couple of scenarios and how to use the CLI to do this faster and more efficient: www.elven.tools/docs/elven-tools-workflows.html
For all commands, check out the docs: www.elven.tools/docs/cli-commands.html
For all configuration options check out the docs: www.elven.tools/docs/cli-introduction.html#custom-configuration-options
Please post issues and ideas here.
MIT + GPLv3 (Elrond tooling)
FAQs
Interacting with custom NFT/SFT-related smart contracts on the MultiversX blockchain
The npm package elven-tools receives a total of 16 weekly downloads. As such, elven-tools popularity was classified as not popular.
We found that elven-tools demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
In 2023, data breaches surged 78% from zero-day and supply chain attacks, but developers are still buried under alerts that are unable to prevent these threats.
Security News
Solo open source maintainers face burnout and security challenges, with 60% unpaid and 60% considering quitting.
Security News
License exceptions modify the terms of open source licenses, impacting how software can be used, modified, and distributed. Developers should be aware of the legal implications of these exceptions.