{"id":13801404,"url":"https://github.com/input-output-hk/scrypto","last_synced_at":"2025-10-13T03:52:41.910Z","repository":{"id":3147801,"uuid":"48445606","full_name":"input-output-hk/scrypto","owner":"input-output-hk","description":"Cryptographic primitives for Scala","archived":false,"fork":false,"pushed_at":"2025-03-18T10:41:33.000Z","size":2266,"stargazers_count":205,"open_issues_count":4,"forks_count":48,"subscribers_count":22,"default_branch":"master","last_synced_at":"2025-10-02T08:16:27.457Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Scala","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"cc0-1.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/input-output-hk.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"COPYING","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2015-12-22T17:38:21.000Z","updated_at":"2025-05-31T04:36:01.000Z","dependencies_parsed_at":"2024-06-21T16:51:16.974Z","dependency_job_id":"2a90b97f-27f4-4329-ad1c-c77e3ffff05f","html_url":"https://github.com/input-output-hk/scrypto","commit_stats":{"total_commits":904,"total_committers":26,"mean_commits":34.76923076923077,"dds":"0.49446902654867253","last_synced_commit":"d925f9357d3a3f2ee2b3f1be5d7b82f1eb8f8b54"},"previous_names":["scorexproject/scrypto"],"tags_count":36,"template":false,"template_full_name":null,"purl":"pkg:github/input-output-hk/scrypto","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/input-output-hk%2Fscrypto","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/input-output-hk%2Fscrypto/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/input-output-hk%2Fscrypto/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/input-output-hk%2Fscrypto/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/input-output-hk","download_url":"https://codeload.github.com/input-output-hk/scrypto/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/input-output-hk%2Fscrypto/sbom","scorecard":{"id":489486,"data":{"date":"2025-08-11","repo":{"name":"github.com/input-output-hk/scrypto","commit":"514cd12b339dce761ea81d5cfffb9ccc93a29b8a"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4.6,"checks":[{"name":"Code-Review","score":9,"reason":"Found 9/10 approved changesets -- score normalized to 9","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/ci.yml:1","Warn: no topLevel permission defined: .github/workflows/release.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: COPYING:0","Info: FSF or OSI recognized license: Creative Commons Zero v1.0 Universal: COPYING:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/ci.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:34: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/ci.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:39: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/ci.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:72: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/ci.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:75: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/ci.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:80: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/ci.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:88: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/ci.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/ci.yml:93: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/ci.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/release.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/release.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:23: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/release.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:31: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/release.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:36: update your workflow using https://app.stepsecurity.io/secureworkflow/input-output-hk/scrypto/release.yml/master?enable=pin","Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating aa8y/sbt:1.0 to aa8y/sbt:1.0@sha256:951494eaba2bb77844b9ffed4b67c6e63fc4243d33a0e67905af09e6fdf2e217","Info:   0 out of   8 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   5 third-party GitHubAction dependencies pinned","Info:   0 out of   1 containerImage dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 29 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Vulnerabilities","score":9,"reason":"1 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GHSA-v6h2-p8h4-qcjw"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-19T18:41:11.204Z","repository_id":3147801,"created_at":"2025-08-19T18:41:11.204Z","updated_at":"2025-08-19T18:41:11.204Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279013521,"owners_count":26085368,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-13T02:00:06.723Z","response_time":61,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-04T00:01:22.482Z","updated_at":"2025-10-13T03:52:41.860Z","avatar_url":"https://github.com/input-output-hk.png","language":"Scala","readme":"# Scrypto [![Build Status](https://travis-ci.org/input-output-hk/scrypto.svg?branch=master)](https://travis-ci.org/input-output-hk/scrypto)\n\nScrypto is an open source cryptographic toolkit designed to make it easier and safer for developers to use cryptography in their applications.\n\nIt was extracted from [Scorex](https://github.com/ScorexProject/Scorex-Lagonaki), open-source modular blockchain \u0026 cryptocurrency framework.\n\nPublic Domain.\n\n**If you want to check benchmarks for authenticated AVL+ trees, please visit [dedicated repository](https://github.com/input-output-hk/scrypto-benchmarks).\nUse the repository as code examples for the trees also, though one code example is provided in \"Authenticated Data Structures\" section below.**\n\n## Get Scrypto\n\nScrypto is available on Sonatype for Scala 2.12 / 2.13:\n```scala\nresolvers += \"Sonatype Releases\" at \"https://oss.sonatype.org/content/repositories/releases/\"\n```\n\nYou can use Scrypto in your sbt project by simply adding the following dependency to your build file:\n```scala\nlibraryDependencies += \"org.scorexfoundation\" %% \"scrypto\" % \"3.0.0\"\n```\n\n### Hash functions\n\nSupported hash algorithms are:\n- Blake2b\n- Keccak\n- Sha\n- Whirlpool\n- Skein\n- Stribog\n       \nTake a look at CryptographicHash interface and use supported hash algorithms like\n```scala\nKeccak512(\"some string or bytes\")\n```\nAll provided hash functions are secure, and their implementations are thread safe.\n\n### Commutative hash\n\nYou can create commutative hash from any hash function with `CommutativeHash` case class like `CommutativeHash(Sha256)`.\nA hash function h is commutative if h(x,y)==h(y,x) , for all x and y.\n\n### Binary-to-text Encoding Schemes\n\nScrypto has implementations of few binary-to-text encoding schemes:\n\n- Base16\n- Base58\n- Base64\n\nExample:\n\n```scala\n  val encoded = Base64.encode(data)\n  val restored = Base64.decode(encoded)\n  restored shouldBe data\n```\n\n### Signing functions\n\nScrypto supports following elliptic curves:\n\n- Curve25519(\u0026 Ed25519)\n\nExample:\n\n```scala\n  val curveImpl = new Curve25519\n  val keyPair = curveImpl.createKeyPair()\n  val sig = curveImpl.sign(keyPair._1, message)\n  assert(curveImpl.verify(sig, message, keyPair._2))\n```\n\n**Note on security:** Scrypto provides a simple Scala wrapper for [Curve25519-Java](https://github.com/WhisperSystems/curve25519-java) by\nWhisper Systems, so has the same security properties. JDK's SecureRandom is used to obtain seed bytes.\n\n### Authenticated data structures\n\nScrypto supports two-party authenticated AVL+ trees with the batching compression support and guaranteed verifier efficiency, as described in http://eprint.iacr.org/2016/994. \nThe implementation can be found in the `scorex.crypto.authds.avltree.batch` package. \n\n\nThe overall approach is as follows. The prover has a data structure of (key, value) pairs\nand can perform operations on it using `performOneOperation` method. An operation (see `scorex.crypto.authds.avltree.batch.Operation`) is either a lookup or a modification.\n We provide sample modifications (such as insertions, removals, and additions/subtractions from the value of a given key), but users of this code may define their own (such as subtractions that allow negative values, unlike our subtractions). A modification may be defined to fail under certain conditions (e.g., a deletion of a key that is not there, or a subtraction that results in a negative value), in which case the tree is not modified. If the operation succeeds, it returns the value associated with the key before the operation was performed. The prover can compute the digest of the current state of the data structure via the `digest` method. At any point the prover may use `generateProof`, which will produce a proof covering the batch of operations (except the ones that failed) since the last `generateProof`. \n\nThe verifier is constructed from the digest that preceeded the latest batch of operations and the proof for the latest batch. The verifier can also be given optional parameters for the maximum number of operations (and at most how many of those are deletions) in order to guarantee a bound on the verifier running time in case of a malicious proof, thus mitigating denial of service attacks. Once constructed, the verifier can replay the same sequence of operations to compute the new digest and to be assured that the operations do not fail and their return values are correct. Note that the verifier is not assured that the sequence of operations is the same as the one the prover performed---it is assumed that the prover and verifier agree on the sequence of operations (two-party authenticated data structures are useful when the prover and verifier agree on the sequence of operations). However, if the verifier digest matches the prover digest after the sequence of operations, then the verifier is assured that the state of the data structure is the same, regardless of what sequence of operations led to this state.\n\nWe also provide `unauthenticatedLookup` for the prover, in order to allow the prover to look up values in the data structure without affecting the proof. \n\nHere are code examples for generating proofs and checking them. In this example we demonstrate two batches of operations, starting with the empty tree. In the first batch, a prover inserts three values into the tree; in the second batch, the prover changes the first value, attempts to subtract too much from the second one, which fails, looks up the third value, and attempts to delete a nonexisting value, which also fails. We use 1-byte keys for simplicity; in a real deployment, keys would be longer.\n \n* First, we create a prover and get an initial digest from it (in a real application, this value is a public constant because anyone, including verifiers, can compute it by using the same two lines of code)\n\n```scala\n  import scorex.utils.Longs\n  import scorex.crypto.authds.{ADKey, ADValue}\n  import scorex.crypto.authds.avltree.batch._\n  import scorex.crypto.hash.{Blake2b256, Digest32}\n\n  val prover = new BatchAVLProver(keyLength = 1, valueLengthOpt = Some(8))\n  val initialDigest = prover.digest\n```        \n\n\n* Second, we create the first batch of tree modifications, inserting keys 1, 2, and 3 with values 10, 20, and 30. We use `com.google.common.primitives.Longs.toByteArray` to get 8-byte values out of longs.\n\n```scala\n  val key1 = Array(1:Byte)\n  val key2 = Array(2:Byte)\n  val key3 = Array(3:Byte)\n  val op1 = Insert(ADKey @@ key1, ADValue @@ Longs.toByteArray(10))\n  val op2 = Insert(ADKey @@ key2, ADValue @@ Longs.toByteArray(20))\n  val op3 = Insert(ADKey @@ key3, ADValue @@ Longs.toByteArray(30))\n```\n    \n* The prover applies the three modifications to the empty tree, obtains the first batch proof, and announces the next digest `digest1`.\n    \n```scala    \n  prover.performOneOperation(op1) // Returns Success(None)\n  prover.performOneOperation(op2) // Returns Success(None)\n  prover.performOneOperation(op3) // Returns Success(None)\n  val proof1 = prover.generateProof()\n  val digest1 = prover.digest\n```    \n      \n* A proof is just an array of bytes, so you can immediately send it over a wire or save it to a disk. \n\n* Next, the prover attempts to perform five more modifications: changing the first value to 50, subtracting 40 from the second value (which will fail, because our UpDateLongBy operation is designed to fail on negative values), looking up the third value, deleting the key 5 (which will also fail, because key 5 does not exist), and deleting the third value. After the four operations, the prover obtains a second proof, and announces the new digest `digest2` \n\n```scala\n  val op4 = Update(ADKey @@ key1, ADValue @@ Longs.toByteArray(50))\n  val op5 = UpdateLongBy(ADKey @@ key2, -40)\n  val op6 = Lookup(ADKey @@ key3)\n  val op7 = Remove(ADKey @@ Array(5:Byte))\n  val op8 = Remove(ADKey @@ key3)\n  prover.performOneOperation(op4) // Returns Success(Some(Longs.toByteArray(10)))\n  // Here we can, for example, perform prover.unauthenticatedLookup(key1) to get 50\n  // without affecting the proof or anything else\n  prover.performOneOperation(op5) // Returns Failure\n  prover.performOneOperation(op6) // Returns Success(Some(Longs.toByteArray(30)))\n  prover.performOneOperation(op7) // Returns Failure\n  prover.performOneOperation(op8) // Returns Success(Some(Longs.toByteArray(30)))\n  val proof2 = prover.generateProof() // Proof only for op4 and op6\n  val digest2 = prover.digest\n```\n\n* We now verify the proofs. For each batch, we first construct a verifier using the digest that preceded the batch and the proof of the batch; we also supply an upper bound on the number of operations in the batch and an upper bound on how many of those operations are deletions. Note that the number of operations can be None, in which case there is no guaranteed running time bound; furthermore, the number of deletions can be None, in which case the guaranteed running time bound is not as small as it can be if a good upper bound on the number of deletion is supplied. \n\n* Once the verifier for a particular batch is constructed, we perform the same operations as the prover, one by one (but not the ones that failed for the prover). If verification fails at any point (at construction time or during an operation), the verifier digest will equal None from that point forward, and no further verifier operations will change the digest.  Else, the verifier's new digest is the correct one for the tree as modified by the verifier. Furthermore, if the verifier performed the same modifications as the prover, then the verifier and prover digests will match.\n\n```scala\n  val verifier1 = new BatchAVLVerifier[Digest32, Blake2b256.type](initialDigest, proof1, keyLength = 1, valueLengthOpt = Some(8), maxNumOperations = Some(2), maxDeletes = Some(0))\n  verifier1.performOneOperation(op1) // Returns Success(None)\n  verifier1.performOneOperation(op2) // Returns Success(None)\n  verifier1.performOneOperation(op3) // Returns Success(None)\n  verifier1.digest match {\n    case Some(d1) if d1.sameElements(digest1) =\u003e\n      //If digest1 from the prover is already trusted, then verification of the second batch can simply start here\n      val verifier2 = new BatchAVLVerifier[Digest32, Blake2b256.type](d1, proof2, keyLength = 1, valueLengthOpt = Some(8), maxNumOperations = Some(3), maxDeletes = Some(1))\n      verifier2.performOneOperation(op4) // Returns Success(Some(Longs.toByteArray(10)))\n      verifier2.performOneOperation(op6) // Returns Success(Some(Longs.toByteArray(30)))\n      verifier2.performOneOperation(op8) // Returns Success(Some(Longs.toByteArray(30)))\n      verifier2.digest match {\n        case Some(d2) if d2.sameElements(digest2) =\u003e println(\"first and second digest value and proofs are valid\")\n        case _ =\u003e println(\"second proof or announced digest NOT valid\")\n      }\n    case _ =\u003e\n      println(\"first proof or announced digest NOT valid\")\n  }\n```\n\n# Merkle Tree\n\n[TODO: describe MerkleTree \u0026 MerkleProof classes]\n\n# Tests\n\nRun `sbt test` from a folder containing the framework to launch tests.\n\n# Benchmarks\n\nRun `sbt bench:test` from a folder containing the framework to launch embedded benchmarks.\n\n# License\n\nThe code is under Public Domain CC0 license means you can do anything with it. Full license text is in [COPYING file](https://github.com/ScorexProject/scrypto/blob/master/COPYING)\n\n# Contributing\n\nClone the repository\n```\n$git clone \u003crepository\u003e scrypto\n$cd scrypto\n```\n\nThe code uses [Scalablytyped](https://scalablytyped.org/docs/readme) to generate Scala.js bindings\nfor `@noble/hashes`. This [video](https://youtu.be/hWUAVrNj65c?t=1341) explains how the\nenvironment for ScalablyTyped is configured in this repository.\n\nBefore compiling the library with SBT, you need to install JS dependencies for ScalablyTyped. \nThe configuration is in `package.json`.\n```\n$npm install\nadded 285 packages, and audited 286 packages in 20s\nfound 0 vulnerabilities\n```\n\nThen you can compile the library with SBT and run tests. Please note that Scala-JS compilation of JavaScript code\nmay consume a lot of memory, so makes sense to give more memory to SBT by e.g. running \n`export SBT_OPTS=\"-Xmx3G -XX:+UseConcMarkSweepGC -XX:+CMSClassUnloadingEnabled -XX:MaxPermSize=2G -Xss2M\"` (to give 3G\nof RAM to it) before launching SBT.\n\n```\n$sbt\nsbt:scrypto\u003e compile\nsbt:scrypto\u003e test\n```\n\nYour contributions are always welcome! \nPlease submit a pull request or create an issue to add a new cryptographic primitives or better implementations.\n","funding_links":[],"categories":["Table of Contents","Frameworks and Libs"],"sub_categories":["Cryptography","Scala"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Finput-output-hk%2Fscrypto","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Finput-output-hk%2Fscrypto","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Finput-output-hk%2Fscrypto/lists"}