Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Solidity language server providing smart contract development support including compilation, linting, security analysis, and code intelligence for .sol files. Use when working with Ethereum smart contracts, Substrate pallets, or any Solidity code that needs compilation, security checks, gas optimization, or code navigation. Essential for ClawChain pallet development.
Solidity language server providing smart contract development support including compilation, linting, security analysis, and code intelligence for .sol files. Use when working with Ethereum smart contracts, Substrate pallets, or any Solidity code that needs compilation, security checks, gas optimization, or code navigation. Essential for ClawChain pallet development.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Solidity language server integration providing comprehensive smart contract development support through solc (Solidity compiler) and solhint (linter).
Compilation: Compile Solidity smart contracts with solc Linting: Static analysis with solhint for best practices and security Security: Detect common vulnerabilities (reentrancy, overflow, etc.) Gas optimization: Identify expensive operations Code intelligence: Syntax highlighting, error detection Supported extensions: .sol
Install Solidity compiler and linter: # Solidity compiler npm install -g solc # Solidity linter npm install -g solhint Verify installation: solcjs --version solhint --version
solcjs --bin --abi contract.sol Compile with optimization: solcjs --optimize --bin --abi contract.sol
Run solhint on a file: solhint contracts/MyContract.sol Run on entire project: solhint 'contracts/**/*.sol'
solhint includes security rules by default. For advanced security analysis, consider: # Install slither (requires Python) pip3 install slither-analyzer # Run security analysis slither contracts/
Create .solhint.json in project root: { "extends": "solhint:recommended", "rules": { "compiler-version": ["error", "^0.8.0"], "func-visibility": ["warn", {"ignoreConstructors": true}], "max-line-length": ["warn", 120], "not-rely-on-time": "warn", "avoid-low-level-calls": "warn", "no-inline-assembly": "warn" } }
For full development environments, see references/frameworks.md.
When developing smart contracts: Write: Edit Solidity code Lint: Run solhint to catch issues early Compile: Use solcjs to verify compilation Analyze: Run security tools before deployment Test: Write comprehensive unit tests
Compiler version mismatch: Specify pragma version in contract Gas optimization: Use view/pure where possible Security: Never use tx.origin for authentication Best practices: Follow Checks-Effects-Interactions pattern
Solidity Documentation Solhint GitHub Solidity Security Best Practices See references/frameworks.md for Hardhat/Foundry setup
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.