Code must be thoroughly tested with quality unit tests.
We defer to the Moloch Testing Guide for specific recommendations, though not all of it is relevant here. Note the introduction:
Tests should be written, not only to verify correctness of the target code, but to be comprehensively reviewed by other programmers. Therefore, for mission critical Solidity code, the quality of the tests are just as important (if not more so) than the code itself, and should be written with the highest standards of clarity and elegance.
Every addition or change to the code must come with relevant and comprehensive tests.
Refactors should avoid simultaneous changes to tests.
Flaky tests are not acceptable.
The test suite should run automatically for every change in the repository, and in pull requests tests must pass before merging.
The test suite coverage must be kept as close to 100% as possible, enforced in pull requests.
In some cases unit tests may be insufficient and complementary techniques should be used:
- Property-based tests (aka. fuzzing) for math-heavy code.
- Formal verification for state machines.
Solidity code should be written in a consistent format enforced by a linter, following the official Solidity Style Guide. See below for further Solidity Conventions.
The code should be simple and straightforward, prioritizing readability and understandability. Consistency and predictability should be maintained across the codebase. In particular, this applies to naming, which should be systematic, clear, and concise.
Sometimes these guidelines may be broken if doing so brings significant efficiency gains, but explanatory comments should be added.
Modularity should be pursued, but not at the cost of the above priorities.
For contributors, project guidelines and processes must be documented publicly.
For users, features must be abundantly documented. Documentation should include answers to common questions, solutions to common problems, and recommendations for critical decisions that the user may face.
All changes to the core codebase (excluding tests, auxiliary scripts, etc.) must be documented in a changelog, except for purely cosmetic or documentation changes.
All changes must be submitted through pull requests and go through peer code review.
The review must be approached by the reviewer in a similar way as if it was an audit of the code in question (but importantly it is not a substitute for and should not be considered an audit).
Reviewers should enforce code and project guidelines.
External contributions must be reviewed separately by multiple maintainers.
Automation should be used as much as possible to reduce the possibility of human error and forgetfulness.
Automations that make use of sensitive credentials must use secure secret management, and must be strengthened against attacks such as those on GitHub Actions worklows.
Some other examples of automation are:
- Looking for common security vulnerabilities or errors in our code (eg. reentrancy analysis).
- Keeping dependencies up to date and monitoring for vulnerable dependencies.
Pull requests are squash-merged to keep the master
branch history clean. The title of the pull request becomes the commit message, so it should be written in a consistent format:
- Begin with a capital letter.
- Do not end with a period.
- Write in the imperative: "Add feature X" and not "Adds feature X" or "Added feature X".
This repository does not follow conventional commits, so do not prefix the title with "fix:" or "feat:".
Work in progress pull requests should be submitted as Drafts and should not be prefixed with "WIP:".
Branch names don't matter, and commit messages within a pull request mostly don't matter either, although they can help the review process.
In addition to the official Solidity Style Guide we have a number of other conventions that must be followed.
-
All state variables should be private.
Changes to state should be accompanied by events, and in some cases it is not correct to arbitrarily set state. Encapsulating variables as private and only allowing modification via setters enables us to ensure that events and other rules are followed reliably and prevents this kind of user error.
-
Internal or private state variables or functions should have an underscore prefix.
contract TestContract { uint256 private _privateVar; uint256 internal _internalVar; function _testInternal() internal { ... } function _testPrivate() private { ... } }
-
Functions should be declared virtual, with few exceptions listed below. The contract logic should be written considering that these functions may be overridden by developers, e.g. getting a value using an internal getter rather than reading directly from a state variable.
If function A is an "alias" of function B, i.e. it invokes function B without significant additional logic, then function A should not be virtual so that any user overrides are implemented on B, preventing inconsistencies.
-
Events should generally be emitted immediately after the state change that they represent, and should be named in the past tense. Some exceptions may be made for gas efficiency if the result doesn't affect observable ordering of events.
function _burn(address who, uint256 value) internal { super._burn(who, value); emit TokensBurned(who, value); }
Some standards (e.g. ERC-20) use present tense, and in those cases the standard specification is used.
-
Interface names should have a capital I prefix.
interface IERC777 {
-
Contracts not intended to be used standalone should be marked abstract so they are required to be inherited to other contracts.
abstract contract AccessControl is ..., {
-
Unchecked arithmetic blocks should contain comments explaining why overflow is guaranteed not to happen. If the reason is immediately apparent from the line above the unchecked block, the comment may be omitted.
-
Custom errors should be declared following the EIP-6093 rationale whenever reasonable. Also, consider the following:
-
The domain prefix should be picked in the following order:
- Use
ERC<number>
if the error is a violation of an ERC specification. - Use the name of the underlying component where it belongs (eg.
Governor
,ECDSA
, orTimelock
).
- Use
-
The location of custom errors should be decided in the following order:
- Take the errors from their underlying ERCs if they're already defined.
- Declare the errors in the underlying interface/library if the error makes sense in its context.
- Declare the error in the implementation if the underlying interface/library is not suitable to do so (eg. interface/library already specified in an ERC).
- Declare the error in an extension if the error only happens in such extension or child contracts.
-
Custom error names should not be declared twice along the library to avoid duplicated identifier declarations when inheriting from multiple contracts.
-