Skip to main content

Vyper Programming Language for Ethereum

Project description

<img src=”https://raw.githubusercontent.com/ethereum/vyper/master/logo/vyper-logo-transparent.svg?sanitize=true” alt=”” width=”110”>

[![Join the chat at https://gitter.im/bethereum/vyper](https://badges.gitter.im/ethereum/vyper.svg)](https://gitter.im/ethereum/vyper?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge) [![Build Status](https://travis-ci.org/ethereum/vyper.svg?branch=master)](https://travis-ci.org/ethereum/vyper) [![Documentation Status](https://readthedocs.org/projects/vyper/badge/?version=latest)](http://vyper.readthedocs.io/en/latest/?badge=latest) [![Coverage Status](https://coveralls.io/repos/github/ethereum/vyper/badge.svg?branch=master)](https://coveralls.io/github/ethereum/vyper?branch=master)

# Principles and Goals

Vyper is a smart contract development language built with the following goals:

  • Security - it should be possible and natural to build secure smart contracts in Vyper.

  • Language and compiler simplicity - the language and the compiler implementation should strive to be simple.

  • Auditability - Vyper code should be maximally human-readable. Furthermore, it should be maximally difficult to write misleading code. Simplicity for the reader is more important than simplicity for the writer, and simplicity for readers with low prior experience with Vyper (and low prior experience with programming in general) is particularly important.

Some examples of what Vyper does NOT have and why:

  • Modifiers - e.g. in Solidity you can do function foo() mod1 { … }, where mod1 can be defined elsewhere in the code to include a check that is done before execution, a check that is done after execution, some state changes, or possibly other things. Vyper does not have this, because it makes it too easy to write misleading code. mod1 just _looks_ too innocuous for something that could add arbitrary pre-conditions, post-conditions or state changes. Also, it encourages people to write code where the execution jumps around the file, harming auditability. The usual use case for a modifier is something that performs a single check before execution of a program; our recommendation is to simply inline these checks as asserts.

  • Class inheritance - requires people to jump between multiple files to understand what a program is doing, and requires people to understand the rules of precedence in case of conflicts (which class’ function X is the one that’s actually used?). Hence, it makes code too complicated to understand.

  • Inline assembly - adding inline assembly would make it no longer possible to Ctrl+F for a variable name to find all instances where that variable is read or modified.

  • Function overloading - This can cause lots of confusion on which function is called at any given time. Thus it’s easier to write missleading code (foo("hello") logs “hello” but foo("hello", "world") steals you funds). Another problem with function overloading is that it makes the code much harder to search through as you have to keep track on which call refers to which function.

  • Operator overloading - waaay too easy to write misleading code (what do you mean “+” means “send all my money to the developer”? I didn’t catch the part of the code that says that!).

  • Recursive calling - cannot set an upper bound on gas limits, opening the door for gas limit attacks.

  • Infinite-length loops - cannot set an upper bound on gas limits, opening the door for gas limit attacks.

  • Binary fixed point - decimal fixed point is better, because any decimal fixed point value written as a literal in code has an exact representation, whereas with binary fixed point approximations are often required (e.g. 0.2 -> 0.001100110011…, which needs to be truncated), leading to unintuitive results, e.g. in python 0.3 + 0.3 + 0.3 + 0.1 != 1.

Some changes that may be considered after Metropolis when [STATICCALL](https://github.com/ethereum/EIPs/pull/214/files) becomes available include:

  • Forbidding state changes after non-static calls unless the address being non-statically called is explicitly marked “trusted”. This would reduce risk of re-entrancy attacks.

  • Forbidding “inline” non-static calls, e.g. send(some_address, contract.do_something_and_return_a_weivalue()), enforcing clear separation between “call to get a response” and “call to do something”.

Vyper does NOT strive to be a 100% replacement for everything that can be done in Solidity; it will deliberately forbid things or make things harder if it deems fit to do so for the goal of increasing security.

Note: Vyper is beta software, use with care

# Installation See the [Vyper documentation](https://vyper.readthedocs.io/en/latest/installing-vyper.html) for build instructions.

# Compiling a contract To compile a contract, use: `bash vyper your_file_name.vy `

Alternative for GitHub syntax highlighting: Add a `.gitattributes` file with the line `*.vy linguist-language=Python`

There is also an [online compiler](https://vyper.online/) available you can use to experiment with the language and compile to bytecode and/or LLL.

Note: While the vyper version of the online compiler is updated on a regular basis it might be a bit behind the latest version found in the master branch of this repository.

## Testing (using pytest) `bash python setup.py test `

# Contributing * See Issues tab, and feel free to submit your own issues * Add PRs if you discover a solution to an existing issue * For further discussions and questions talk to us on [gitter](https://gitter.im/ethereum/vyper) * For more information, see [Contributing](http://vyper.readthedocs.io/en/latest/contributing.html)

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vyper-0.1.0b2.tar.gz (61.3 kB view details)

Uploaded Source

Built Distribution

vyper-0.1.0b2-py3-none-any.whl (69.4 kB view details)

Uploaded Python 3

File details

Details for the file vyper-0.1.0b2.tar.gz.

File metadata

  • Download URL: vyper-0.1.0b2.tar.gz
  • Upload date:
  • Size: 61.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.11.0 pkginfo/1.4.2 requests/2.19.1 setuptools/40.2.0 requests-toolbelt/0.8.0 tqdm/4.25.0 CPython/3.6.5

File hashes

Hashes for vyper-0.1.0b2.tar.gz
Algorithm Hash digest
SHA256 14b4e169dbc4f3cc0573c04e21260137bc9546ffb7e7bed4d9effa6b491407bc
MD5 260c774e23ef3f83b4db0b5f7dcceb63
BLAKE2b-256 d803b2a41d7ee2e96a05d277b99c5794d7689437a01b8e4b5ac21f7fa8055e35

See more details on using hashes here.

File details

Details for the file vyper-0.1.0b2-py3-none-any.whl.

File metadata

  • Download URL: vyper-0.1.0b2-py3-none-any.whl
  • Upload date:
  • Size: 69.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.11.0 pkginfo/1.4.2 requests/2.19.1 setuptools/40.2.0 requests-toolbelt/0.8.0 tqdm/4.25.0 CPython/3.6.5

File hashes

Hashes for vyper-0.1.0b2-py3-none-any.whl
Algorithm Hash digest
SHA256 d39eb2e1fe5bc89b418fa78e49e1c9785891d38fabffe70cfa367e7bf8ced0c9
MD5 7b9541d03726f84a8827235ea0b434ea
BLAKE2b-256 1a20e110f3988c515034c4ef8cc0d6ddfe06c8981f27a82d5bbb66e7de878786

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page