Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

t8n tool malicious rlp handling #23770

Closed
winsvega opened this issue Oct 18, 2021 · 1 comment · Fixed by #23771
Closed

t8n tool malicious rlp handling #23770

winsvega opened this issue Oct 18, 2021 · 1 comment · Fixed by #23771

Comments

@winsvega
Copy link
Contributor

winsvega commented Oct 18, 2021

When I feed valid, but incorrect structure rlp to t8ntool, I get an error return code


Error: The command '/home/wins/.retesteth/default/start.sh --input.alloc /dev/shm/05237f72-8cee-4680-8a13-78fb92eeb0af/alloc.json --input.txs /dev/shm/05237f72-8cee-4680-8a13-78fb92eeb0af/txs.rlp --input.env /dev/shm/05237f72-8cee-4680-8a13-78fb92eeb0af/env.json --state.fork Frontier --output.basedir /dev/shm/05237f72-8cee-4680-8a13-78fb92eeb0af --output.result out.json --output.alloc outAlloc.json --state.reward 5000000000000000000' exited with 2560 code. (bcForgedTest/BLOCK_gasLimit_Prefixed0000, fork: Frontier, block: 0)

What I expect:

t8ntool process the input as normal but just treat any malformed transactions as invalid and write outAlloc unchanged with error message for malicious transactions

@YOUSU198
Copy link

YOUSU198 commented Oct 27, 2021 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants