This repository contains a Certora Run GitHub Action that allows you to run Certora Prover on your contracts in parallel, receive the results as a comment on the pull request.
To use this action, add the Certora Run Application to the repository and add the following to your GitHub Actions workflow:
jobs:
certora_run_submission:
runs-on: ubuntu-latest
permissions:
contents: read
statuses: write
pull-requests: write
id-token: write
steps:
- name: Checkout repository
uses: actions/checkout@v4
- name: Submit verification jobs to Certora Prover
uses: Certora/certora-run-action@v2
with:
# Add your configurations as lines, each line is separated.
# Specify additional options for each configuration by adding them after the configuration.
configurations: |-
tests/evm/conf-verified.conf
tests/evm/conf-verified.conf --rule monotone --method "counter()"
tests/evm/conf-verified.conf --rule invertible
tests/evm/conf-verified.conf --method "counter()"
solc-versions: 0.7.6 0.8.1
job-name: "Verified Rules"
certora-key: ${{ secrets.CERTORAKEY }}
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}This action will download all the specified Solidity versions, start certora-cli on
every configuration file, and run the tests asynchronously. If one of the configurations
fails to start, the action will be marked as failed, and all other jobs will continue to run.
Once all the tests are finished, Certora Run GitHub Application will mark the commit
statuses as either success or failure, and comment on the pull request with the
results.
Both solidity compilers and certora-cli dependencies are cached between runs.
Example:
name: Certora Prover Submission Workflow
description: |-
This workflow submits Certora Prover jobs on the specified configurations. Once all
jobs are successfully submitted, it will add a pending commit status to the commit.
This status will be periodically updated with verification results of the jobs, along
with the verification summary comment on the pull request.
For more information, please visit https://github.com/certora/certora-run-action.
on:
push:
branches:
- main
pull_request:
branches:
- main
workflow_dispatch:
jobs:
certora_run_submission:
runs-on: ubuntu-latest
permissions:
contents: read
statuses: write
pull-requests: write
id-token: write
steps:
- name: Checkout repository
uses: actions/checkout@v4
with:
submodules: recursive
# (Optional) Add installation steps for your project
- name: Setup Node.js
uses: actions/setup-node@v4
- name: Install dependencies
run: npm install
# (Optional) Run Certora munge script
- name: Certora munge
run: ./certora/scripts/munge.sh
# Submit verification jobs to Certora Prover
- name: Submit verification jobs to Certora Prover
uses: Certora/certora-run-action@v2
with:
# Add your configurations as lines, each line is separated.
# Specify additional options for each configuration by adding them after the configuration.
configurations: |-
tests/evm/conf-verified.conf
tests/evm/conf-verified.conf --rule monotone --method "counter()"
tests/evm/conf-verified.conf --rule invertible
tests/evm/conf-verified.conf --method "counter()"
solc-versions: 0.7.6 0.8.1
job-name: "Verified Rules"
certora-key: ${{ secrets.CERTORAKEY }}
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
# Submit verification jobs to Certora Solana Prover
- name: Submit verification jobs to Certora Solana Prover
uses: Certora/certora-run-action@v2
with:
working-directory: tests/solana
# Specify solana ecosystem
ecosystem: solana
configurations: |-
Default.conf
job-name: "Verified Solana Rules"
certora-key: ${{ secrets.CERTORAKEY }}
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
# Submit verification jobs to Certora Sui Prover
- name: Submit verification jobs to Certora Sui Prover
uses: Certora/certora-run-action@v2
with:
working-directory: tests/sui
# Specify sui ecosystem
ecosystem: sui
configurations: |-
Default.conf
job-name: "Verified Sui Rules"
certora-key: ${{ secrets.CERTORAKEY }}
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}This action requires the following permissions:
contents: read- Clone the repository and read the configuration files.statuses: write- Write the status of the run to the GitHub UI.pull-requests: write- Write the run status & comment on the pull request.id-token: write- enables GitHub to request a signed OIDC token.
besides the permissions, the action requires the following secrets:
CERTORAKEY- API key for Certora Prover.
General inputs for:
configurations- List of configuration files to run.cli-version- Version of thecertora-clito use (optional). By default, the latest version is used. This action is compatible with versions7.9.0and above.cli-release- Release type of thecertora-clito use (optional). Default isstable. Options arestable,alpha,beta, or a custom branch name. Everything other thanstableshould only be used for testing purposes and is not recommended for production use.ecosystem- Name of the CLI ecosystem, the options areevm,solana, andsui.evmis the default ecosystem.server- Server to run the tests on (optional). Default isproduction.job-name- Name of the job (optional).install-java- Install Java for type checking (optional). Default istrue.compilation-steps-only- Compile the spec and the code without sending a verification request to the cloud (optional). Default isfalse.comment-fail-only- Add a report comment to the pr only when the job fails (optional). Default ittrue.certora-key- API key for Certora Prover.working-directory- Working directory to run the action in (optional). Default is the root of the repository.use-hard-links- Whether to use hard links when copying files (optional). If you expect to modify the files in the run directory duringcertoraRunexecution, you should set this tofalse.debug-level- Debug level for the action (optional). Default is0. Possible values are0,1,2, and3. Higher values will produce more debug output.
EVM specific inputs (ecosystem: evm):
solc-versions- List of Solidity versions to download. The first version in the list will also be available assolcin the environment. Each version will be available as bothsolc<version>andsolc-<version>in the environment.solc-remove-version-prefix- Prefix to remove from the Solidity version (optional).vyper-version- The version of Vyper to install. Can belatest, or a specific version like0.3.3. If not specified, Vyper will not be installed.
Solana specific inputs (ecosystem: solana):
rust-version- The version of Rust to install. If not specified, the latest stable version will be used. The minimum supported version is1.82.0.rust-additional-versions- Additional versions of Rust to install, separated by spaces. Example:1.75 1.79.certora-sbf-version- The version ofcargo-certora-sbfto install. If not specified, the latest version will be used.certora-sbf-options- Additional options to pass to thecargo certora-sbfcommand. This can be used to specify additional flags or configurations for the Certora SBF tool.rust-setup- Whether to set up Rust for Solana. The default istrue. If you need more control over the Solana installation or options, you could use the Certora Rust Setup Action directly in your workflow.
This action does not automatically install the Sui CLI. If your workflow requires running Sui commands, make sure the CLI is installed beforehand. You can install it manually using the following commands:
curl -sSfL https://raw.githubusercontent.com/MystenLabs/suiup/main/install.sh | sh
export PATH="$HOME/.local/bin:$PATH"
suiup install -y sui@testnetFirst, it will add a comment with details about runs:
Then you can see the live status of the runs:
And finally, once the first job finishes, GH App will add and update a review with the results:
If you are migrating from v1 to v2, you need to update the action reference in your workflow file:
- Permissions: In order to provide verification using GitHub OIDC, we need to
enable
id-token: writepermission. This way we can authenticate to Certora and verify that Certora Run Application was installed on the repository. Update your workflow file to include theid-token: writepermission:
permissions:
contents: read
statuses: write
pull-requests: write
+ id-token: write- CLI Release: The
use-beta/use-alphainputs have been replaced withcli-release. The default value isstable, so if you want to use the beta version, you need to specify it explicitly:
- name: Submit verification jobs to Certora Prover
- uses: Certora/certora-run-action@v1
+ uses: Certora/certora-run-action@v2
with:
configurations: |-
tests/evm/conf-verified.conf
solc-versions: 0.7.6 0.8.1
- use-beta: true
+ cli-release: betaFor local development, you can use the act tool to run the action locally. The easiest way to set up everything is through a combination of nix and direnv.
In order to set up the environment, follow these steps:
direnv allowThen, you can run the action with the following command:
act workflow_dispatch \
-s GITHUB_TOKEN="$(gh auth token)" \
-s CERTORAKEY="$CERTORAKEY" \
-W .github/workflows/main.yml \
--container-architecture=linux/amd64For testing, please create a PR using the Certora Action Test repository. The PR should start several workflows on all of our environments.


