-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exhaustive parsing checks #68
Labels
Comments
darosior
added
enhancement
New feature or request
question
Further information is requested
labels
Feb 27, 2021
darosior
added a commit
to darosior/revault_tx
that referenced
this issue
Mar 1, 2021
This also adds a cpfp_txout method to both clarify the code (at the expense of performance) and allow downstream users to more accurately compute fees. Unfortunately this makes revault#68 even harder.. Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
It includes checking the Miniscript s in the PSBT inputs too ... |
darosior
added a commit
to darosior/revault_tx
that referenced
this issue
Mar 2, 2021
This also adds a cpfp_txout method to both clarify the code (at the expense of performance) and allow downstream users to more accurately compute fees. Unfortunately this makes revault#68 even harder.. Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
darosior
added a commit
to darosior/revault_tx
that referenced
this issue
Mar 3, 2021
This also adds a cpfp_txout method to both clarify the code (at the expense of performance) and allow downstream users to more accurately compute fees. Unfortunately this makes revault#68 even harder.. Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
darosior
added a commit
to darosior/revault_tx
that referenced
this issue
Apr 5, 2021
This also adds a cpfp_txout method to both clarify the code (at the expense of performance) and allow downstream users to more accurately compute fees. Unfortunately this makes revault#68 even harder.. Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
This would include checking for duplicated inputs (found by the fuzzer in the Cosigning Server) and all sort of insane transaction in general. |
darosior
added
good first issue
Good for newcomers
high prio
and removed
question
Further information is requested
labels
Apr 28, 2021
We need to refuse insane amounts as well, working on it. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Right now, we only sanity-check the PSBTs in
from_psbt_serialized()
are sane with regard to our internal assumptions (unwrap()
s basically). This may be enough, but we may also want complete parsing checks to be sure that whether a transaction is parsed or created with the constructor it will hold to our requirements (eg, no dust amounts, sane feerate, etc..). This is quite some more hairy code though..The text was updated successfully, but these errors were encountered: