Armani Ferrante f067624add Token PDAs and CLI scripts (#400) 4 ๋…„ ์ „
..
cashiers-check 24824ca9f5 examples: Import TOKEN_PROGRAM_ID from @solana/spl-token (#415) 4 ๋…„ ์ „
cfo f067624add Token PDAs and CLI scripts (#400) 4 ๋…„ ์ „
chat ba99c9c920 lang: Framework defined error codes (#354) 4 ๋…„ ์ „
composite 2f780e0d27 ts: Reorganize program namespaces into well typed elements (#322) 4 ๋…„ ์ „
errors ba99c9c920 lang: Framework defined error codes (#354) 4 ๋…„ ์ „
escrow fcb7a3e17b examples: Add escrow (#410) 4 ๋…„ ์ „
events a9179600cd cli: Add provider section to Anchor.toml (#305) 4 ๋…„ ์ „
ido-pool 21fc2d15f4 lang, ts: Consistent domain delimiters (#321) 4 ๋…„ ์ „
interface 2f780e0d27 ts: Reorganize program namespaces into well typed elements (#322) 4 ๋…„ ์ „
lockup 24824ca9f5 examples: Import TOKEN_PROGRAM_ID from @solana/spl-token (#415) 4 ๋…„ ์ „
misc f067624add Token PDAs and CLI scripts (#400) 4 ๋…„ ์ „
multisig 2f780e0d27 ts: Reorganize program namespaces into well typed elements (#322) 4 ๋…„ ์ „
pyth 2b3a41408c examples: Update pyth to v2 (#385) 4 ๋…„ ์ „
spl dd64779273 spl: Implement token::set_authority (#307) 4 ๋…„ ์ „
swap 5aaa4499f6 example: Fix typo in test (#416) 4 ๋…„ ์ „
sysvars a9179600cd cli: Add provider section to Anchor.toml (#305) 4 ๋…„ ์ „
tutorial a6ebaabac4 lang: Initialize program derived addresses with instruction data (#386) 4 ๋…„ ์ „
typescript a9179600cd cli: Add provider section to Anchor.toml (#305) 4 ๋…„ ์ „
zero-copy 24824ca9f5 examples: Import TOKEN_PROGRAM_ID from @solana/spl-token (#415) 4 ๋…„ ์ „
README.md 0d4a820231 examples: Spelling corrections (#315) 4 ๋…„ ์ „

README.md

Examples

The examples presented here are for educational purposes only. No program here is guaranteed to be safe or secure in any way. In many cases, they are simply just simple integration tests to illustrate some particular functionality of the framework. If used, one should audit any programs used and take full responsibility for the consequences that occur due to any outstanding bugs or security vulnerabilities that exist.