Smart Contracts — Web3 Glossary
111 terms • Part of the Cointegrity Web3 Glossary
- Access Control Patterns — Access control patterns are design frameworks that establish and enforce permissions within smart...
- Account Abstraction — Account abstraction is a blockchain architecture innovation that removes the distinction between...
- Admin Key — An Admin Key is a privileged private key that grants centralized administrative control over smart...
- AI-Driven Smart Contracts — AI-driven smart contracts represent an evolution of traditional smart contracts that integrate...
- AI-Powered Smart Contracts — AI-powered smart contracts are self-executing blockchain agreements that integrate artificial...
- Algorand Smart Contract (ASC1) — Algorand Smart Contracts (ASC1) are the smart contract framework native to the Algorand blockchain,...
- AntiGravity IDE (Google) — AntiGravity is an agent-first Integrated Development Environment from Google, announced alongside...
- Application Binary Interface (ABI) — An Application Binary Interface (ABI) is the standardized specification that defines how external...
- Aptos — Aptos is a Layer-1 blockchain built by former Meta engineers using the Move programming language,...
- Automated Contract Deployment — Automated contract deployment refers to systems and processes that streamline the launching of...
- Autonomous NFT Behavior — Autonomous NFT Behavior refers to the capability of intelligent non-fungible tokens, particularly...
- Bitcoin Transaction Locktime — Locktime is a parameter in Bitcoin transactions that specifies the earliest time or block height at...
- BitVM — BitVM is a computational paradigm proposed by researcher Robin Linus that enables verification of...
- Blockchain-Powered Total Rewards — Blockchain-powered total rewards represents an innovative compensation model where companies issue...
- Bonding — Bonding is the process of locking up cryptocurrency tokens in a smart contract to participate in...
- Bytecode — Bytecode is the compiled, low-level machine code generated when high-level smart contract languages...
- Chaincode — Chaincode is the term for smart contracts within the Hyperledger Fabric blockchain framework. It...
- Circuit Breakers — Circuit breakers are emergency safety mechanisms embedded in smart contracts that automatically...
- Commit-Reveal Schemes — Commit-reveal schemes are two-phase cryptographic protocols in smart contracts that separate...
- Composability — Composability in DeFi refers to the ability to seamlessly combine multiple blockchain protocols and...
- Contract Documentation Standards — Contract documentation standards encompass formalized approaches and conventions for documenting...
- Contract Interaction Patterns — Contract interaction patterns are standardized architectural approaches for enabling smart...
- Contract Libraries — Contract libraries are reusable, pre-written smart contract modules that developers can import into...
- Contract Monitoring Systems — Contract monitoring systems are specialized tools, services, and infrastructure that continuously...
- Contract Security Auditing — Contract security auditing is a systematic and comprehensive review process conducted by...
- Contract Testing Frameworks — Contract testing frameworks are specialized development tools and methodologies designed to...
- Contract Upgradability — Contract upgradability encompasses mechanisms that allow smart contracts to be modified, improved,...
- Cross-Chain Automation — Cross-chain automation refers to systems that automatically execute actions across multiple...
- Cross-Chain Message Passing — Cross-chain message passing is a protocol layer that enables blockchains to send arbitrary data,...
- Cross-Chain Smart Contracts — Cross-chain smart contracts are intelligent contracts designed to operate and coordinate actions...
- Cross-Contract Communication — Cross-contract communication refers to the mechanisms and patterns that enable one smart contract...
- Curve AMO — Curve's Algorithmic Market Operations (AMO) is a system of smart contracts and mechanisms that...
- Data Verification — The process of confirming that data recorded on or submitted to a blockchain is accurate,...
- DeFi Smart Contracts — DeFi smart contracts are self-executing programs deployed on blockchain networks that automate...
- Deployment Strategies — Deployment strategies encompass the various methods and approaches for releasing smart contracts to...
- Diamond Standard (EIP-2535) — The Diamond Standard, formalized as EIP-2535, is a smart contract architecture pattern that...
- ERC-20 — ERC-20 is the technical standard that defines how fungible tokens operate on the Ethereum...
- ERC-223 — ERC-223 is a proposed token standard that addresses a critical vulnerability in ERC-20 where tokens...
- ERC-4337 (Account Abstraction) — ERC-4337 is an Ethereum standard that enables smart contract wallets to function as first-class...
- ERC-777 — ERC-777 is an advanced fungible token standard designed to improve upon ERC-20 by introducing...
- ERC-827 — ERC-827 is an extension of the ERC-20 token standard that enhances token functionality by allowing...
- ERC-948 — ERC-948 is an Ethereum token protocol standard specifically designed to facilitate...
- Error Handling Patterns — Error handling patterns in smart contracts are design approaches for gracefully managing failures,...
- Ethereum (ETH) — Ethereum is a decentralized blockchain platform that extends cryptocurrency functionality through...
- Ethereum Agent Settlement Layer — The Ethereum Agent Settlement Layer describes the emerging function of Ethereum and its Layer-2...
- Ethereum Deposit Contract — The Ethereum Deposit Contract is a smart contract deployed on the Ethereum mainnet that serves as...
- Ethereum Launch — Ethereum officially launched on July 30, 2015, with the mining of its genesis block, establishing...
- Ethereum Virtual Machine (EVM) — The Ethereum Virtual Machine is a sandboxed runtime environment that executes smart contract...
- Event Triggers — Event triggers are predefined conditions or external signals that automatically initiate smart...
- Event-Driven Architecture — Event-driven architecture is a smart contract design pattern where contracts emit events to signal...
- EVM Compatibility — EVM compatibility refers to a blockchain's ability to support and execute smart contracts written...
- Execution Environment — An execution environment encompasses the complete computational infrastructure and protocols that...
- Factory Contracts — Factory contracts are smart contracts specifically designed to deploy and manage multiple instances...
- Fallback Function — A fallback function is a special, unnamed function in Ethereum smart contracts that automatically...
- Flash Loan Patterns — Flash loan patterns are smart contract design paradigms that enable uncollateralized loans provided...
- Formal Verification — Formal verification applies mathematical proof techniques to demonstrate that smart contracts...
- Foundry — Foundry is a comprehensive, high-performance toolkit for Ethereum smart contract development built...
- Gas Optimization Techniques — Gas optimization techniques encompass programming practices and architectural strategies that...
- Gavin Wood — Gavin Wood is a British computer scientist and one of Ethereum's co-founders who played a crucial...
- Governance Contracts — Governance contracts are smart contracts that implement decentralized decision-making mechanisms,...
- Hardhat — Hardhat is a development environment and task runner specifically designed for building, testing,...
- Hash Time-Locked Contracts (HTLCs) — Hash Time-Locked Contracts are smart contracts that enable secure payment transfers by conditioning...
- Hashed Timeclock Contracts (HTLCs) — Hashed Timeclock Contracts are cryptographic protocols that enable two parties to exchange assets...
- HashLock — A HashLock is a cryptographic condition embedded in smart contracts that locks funds until the...
- Homomorphic Encryption — Homomorphic encryption is an advanced cryptographic technique that allows mathematical operations...
- Honeypot Tokens — Honeypot tokens are malicious smart contracts designed to trap investors by allowing purchases but...
- Immutable Contract Patterns — Immutable contract patterns refer to design architectures and coding approaches that create smart...
- Immutable Deployed Code Problem — The Immutable Deployed Code Problem is a critical vulnerability in smart contract development where...
- Interchain Accounts — Interchain accounts enable a user or smart contract on one blockchain to create and control an...
- Jules (Google) — Jules is Google's autonomous asynchronous coding agent, designed for software development tasks...
- Merkle Tree Verification — Merkle tree verification is a cryptographic technique embedded in smart contracts that efficiently...
- Message call — A message call is an internal transaction-like operation within the Ethereum Virtual Machine where...
- Meta-Transaction Patterns — Meta-transaction patterns are smart contract design approaches that enable users to interact with...
- Minimal Proxy Pattern — The minimal proxy pattern is a gas-efficient contract deployment technique that creates lightweight...
- Minting — The process of creating new tokens or digital assets on a blockchain network through various...
- Modular Contract Design — Modular contract design is an architectural approach that breaks complex smart contract...
- Multi-Signature Contracts — Multi-signature contracts are smart contracts that require cryptographic authorization from...
- Multi-signature Exploits — Multi-signature exploits target wallets requiring multiple private keys to authorize transactions...
- Multisig Escrow — Multisig escrow — short for multi-signature escrow — is a cryptocurrency transaction structure used...
- Network-Enhanced Virtual Machine (NEVM) — A smart contract platform developed by Syscoin that combines the security of Bitcoin's...
- NFT Smart Contracts — NFT smart contracts are specialized blockchain programs that govern the entire lifecycle of...
- Off-Chain Signing Key Vulnerability — An off-chain signing key vulnerability occurs when a DeFi protocol delegates critical on-chain...
- On-chain Attestations — Cryptographically signed, verifiable claims stored on a blockchain that assert some fact about an...
- OpenHands — OpenHands (formerly OpenDevin) is a highly popular, model-agnostic open-source platform for...
- Oracle Integration Patterns — Oracle integration patterns are standardized architectural approaches for securely incorporating...
- Private Smart Contracts — Private smart contracts are self-executing agreements deployed on blockchain networks where the...
- Proof-of-Donation — Proof-of-Donation is a smart contract feature that automatically allocates a configurable portion...
- Proxy Patterns — Proxy patterns are design patterns in smart contract development that separate a contract's logic...
- Reentrancy Attacks — A reentrancy attack is a critical smart contract vulnerability where a malicious contract...
- Reentrancy Guards — Reentrancy guards are security mechanisms that prevent reentrancy attacks by blocking recursive...
- Script — A script is a small program or list of instructions embedded directly within a cryptocurrency...
- Signature Verification — Signature verification is the smart contract functionality that validates cryptographic signatures...
- Smart Contract Platforms — Smart contract platforms are blockchain networks specifically architected to support the creation,...
- Smart Contract Wallets — Smart contract wallets are cryptocurrency wallets built entirely on blockchain code rather than...
- Smart Contracts — Smart contracts are self-executing digital agreements where terms and conditions are written...
- Solidity — Solidity is a high-level programming language designed specifically for writing smart contracts on...
- StarkNet — StarkNet is a permissionless Layer-2 network developed by StarkWare that employs STARK (Scalable...
- State Machines — State machines are programming patterns that model smart contract behavior as discrete states and...
- Storage Layout Optimization — Storage layout optimization involves strategically organizing smart contract state variables to...
- Sui — Sui is a Layer-1 blockchain designed for global adoption, featuring a novel object-centric data...
- Supply Chain Attack (DeFi) — A DeFi supply chain attack targets the software development infrastructure surrounding a protocol —...
- Supply Chain Smart Contracts — Supply chain smart contracts automate the management and verification of products as they move...
- The DAO Hack and Ethereum Fork — The DAO (Decentralized Autonomous Organization) was a complex smart contract deployed on Ethereum...
- Time-Locked Contracts — Time-locked contracts are smart contracts that enforce temporal restrictions on specific functions,...
- Transaction Triggers — Transaction triggers are predefined conditions or events that automatically execute a transaction...
- Truffle — Truffle is a comprehensive development framework for Ethereum that provides an integrated...
- UserOperations — The transaction format introduced by ERC-4337 (Account Abstraction) that replaces standard Ethereum...
- Version Control for Contracts — Version control for contracts encompasses systems and practices for managing multiple iterations of...
- Vitalik Buterin — Vitalik Buterin is a Russian-Canadian programmer and blockchain researcher who co-founded Ethereum...
- Web Assembly — WebAssembly (WASM) is a low-level binary instruction format designed to run efficiently in a...
- Zero Address (Ethereum) — The zero address, represented as 0x0000000000000000000000000000000000000000, is a special address...
Browse all 2,062+ Web3 terms or speak to a consultant for expert guidance.