-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exhaustive parsing checks #68
Labels
Comments
darosior
added a commit
to darosior/revault_tx
that referenced
this issue
Mar 1, 2021
This also adds a cpfp_txout method to both clarify the code (at the expense of performance) and allow downstream users to more accurately compute fees. Unfortunately this makes revault#68 even harder.. Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
It includes checking the Miniscript s in the PSBT inputs too ... |
darosior
added a commit
to darosior/revault_tx
that referenced
this issue
Mar 2, 2021
This also adds a cpfp_txout method to both clarify the code (at the expense of performance) and allow downstream users to more accurately compute fees. Unfortunately this makes revault#68 even harder.. Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
darosior
added a commit
to darosior/revault_tx
that referenced
this issue
Mar 3, 2021
This also adds a cpfp_txout method to both clarify the code (at the expense of performance) and allow downstream users to more accurately compute fees. Unfortunately this makes revault#68 even harder.. Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
darosior
added a commit
to darosior/revault_tx
that referenced
this issue
Apr 5, 2021
This also adds a cpfp_txout method to both clarify the code (at the expense of performance) and allow downstream users to more accurately compute fees. Unfortunately this makes revault#68 even harder.. Signed-off-by: Antoine Poinsot <darosior@protonmail.com>
This would include checking for duplicated inputs (found by the fuzzer in the Cosigning Server) and all sort of insane transaction in general. |
We need to refuse insane amounts as well, working on it. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Right now, we only sanity-check the PSBTs in
from_psbt_serialized()
are sane with regard to our internal assumptions (unwrap()
s basically). This may be enough, but we may also want complete parsing checks to be sure that whether a transaction is parsed or created with the constructor it will hold to our requirements (eg, no dust amounts, sane feerate, etc..). This is quite some more hairy code though..The text was updated successfully, but these errors were encountered: