Book Image

Mastering Blockchain Programming with Solidity

By : Jitendra Chittoda
Book Image

Mastering Blockchain Programming with Solidity

By: Jitendra Chittoda

Overview of this book

Solidity is among the most popular and contract-oriented programming languages used for writing decentralized applications (DApps) on Ethereum blockchain. If you’re looking to perfect your skills in writing professional-grade smart contracts using Solidity, this book can help. You will get started with a detailed introduction to blockchain, smart contracts, and Ethereum, while also gaining useful insights into the Solidity programming language. A dedicated section will then take you through the different Ethereum Request for Comments (ERC) standards, including ERC-20, ERC-223, and ERC-721, and demonstrate how you can choose among these standards while writing smart contracts. As you approach later chapters, you will cover the different smart contracts available for use in libraries such as OpenZeppelin. You’ll also learn to use different open source tools to test, review and improve the quality of your code and make it production-ready. Toward the end of this book, you’ll get to grips with techniques such as adding security to smart contracts, and gain insights into various security considerations. By the end of this book, you will have the skills you need to write secure, production-ready smart contracts in Solidity from scratch for decentralized applications on Ethereum blockchain.
Table of Contents (21 chapters)
Free Chapter
1
Section 1: Getting Started with Blockchain, Ethereum, and Solidity
5
Section 2: Deep Dive into Development Tools
9
Section 3: Mastering ERC Standards and Libraries
16
Section 4: Design Patterns and Best Practices

Controlling contracts with multisig

In the previous chapters, we looked at different contracts that maintain access rights for a contract, such as  Ownable.sol, MinterRole.sol, and PauserRole.sol. These access roles are basically given to an EOA. However, if the private key of that EOA account is stolen, then an attacker can potentially steal funds or perform malicious activities on the contracts.

If you transfer these kinds of access rights to an already deployed multisig address, more security will be provided. To do this, you can perform the following steps:

  1. Deploy a new multisig wallet and initialize it with the required number of owners.
  2. Ensure that the multisig wallet deployment is working and that the required number of owners are able to sign the transactions and execute it. This is done to ensure that the setup is working.
  3. The ownership...