Back to Blog

How to create aeternity fungible token? [tutorial]

1 min read·Posted underTech Talks &Tutorials

Updated on

Cover Image for How to create aeternity fungible token? [tutorial]

In this short tutorial I’ll be showing you how to create a fungible token on aeternity blockchain network.

In this tutorial you will create a AEX-9 (fungible token standard on aeternity) token in few easy steps.

Prerequisites:

Note: This will be a short tutorial on creating a fungible token with allowances.

Step 1. Go to waellet Utilities section and select Fungible Tokens

waellet_1

Step 2. Click Deploy fungible token button.

waellet_3

Step 3. Fill the form with the details needed for the token – Token Name, Token Symbol, and decimals.

waellet_5

Step 4. Click deploy, confirm/sign the transaction and you are ready.

waellet_7
waellet_8

The Allowances section of waellet will allow you to interact with the contract and set allowances for addresses of your choice.


The Mint/Burn section allows us to mint (create new tokens) or burn (remove tokens from circulation) tokens.

After confirming the transaction you’ve successfully minted tokens to the address you specified in the previous step.

Have a project in mind?

Let's talk about what you're building.


Milen
About the author

Milen

Milen Radkov has experience building and delivering successful complex software systems and projects for both big enterprises and small startups. Being actively developing across different blockchain protocols, platforms and projects for the past 5 years, he has gained extensive experience in blockchain development, architectures, consensus algorithms and token economics. Milen is a well-known figure in the blockchain space.


More Stories

Cover Image for The zkEVM Race: Ethereum’s Most Difficult Engineering Problem

The zkEVM Race: Ethereum’s Most Difficult Engineering Problem

Every blockchain faces the same uncomfortable question eventually: what happens when more people want to use it than it can handle? For Ethereum, that question stopped being theoretical years ago. At peak congestion, a simple token swap can cost more in gas fees than the tokens themselves are worth. The network processes roughly 15 transactions […]

Read more
Cover Image for The Hidden Threats in Code Review Requests: A Cautionary Tale for Developers

The Hidden Threats in Code Review Requests: A Cautionary Tale for Developers

As developers, we’re often approached to troubleshoot or optimize projects. While most requests are legitimate, sometimes they conceal malicious intent. Recently, we’ve been encountering situations that underscore the importance of vigilance in our field. Here’s a detailed account of what happened in one of the requests, how we uncovered the threat, and the lessons we […]

Read more