How to Configure a Smart Contract Security Continuous Integration System

A tutorial from MythX to help you set up your tooling for continuous monitoring and security checks.

Consensys
ConsenSys Media
2 min readMar 16, 2020

--

This is the third and last post in the MythX series on integrating security analysis of smart contracts into your Continuous Integration (CI) system. In the first part we built a CircleCI configuration. In the second part we built a small and beautiful Travis CI configuration.

“But I am using a completely different CI system!” — You, maybe.

Fret not. The avid reader might have noticed a common pattern in the past two posts: In setups we used the MythX CLI and a basic Python runtime. If you have not read the previous articles yet, it is recommended to do so. Do not worry, I will wait here.

Generalizing our Approach

Sending things to MythX for analysis is rather simple if you are using one of our many tools and integrations. Roughly speaking we always do the following:

  1. Download and set up an official tool
  2. Run the tool on one or multiple target files
  3. Wait for the results be returned by the MythX API
  4. If the report contains anything critical, fail the job

Read the full tutorial on the MythX blog

Originally published at https://blog.mythx.io on March 16, 2020.

--

--

Consensys
ConsenSys Media

A complete suite of products to create and participate in web3.