-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Linting, security analysis via symbolic execution #12
Comments
Linting idea: recommend any evaluation with only one push be simplified to remove the unnecessary syntax: from |
Linting + autofix idea: find all script segments which include stack juggling operations: |
RE: validation, we can definitely build a symbolic execution engine that demonstrates if a locking script has unhandled unlocking conditions (some set of inputs which unlock the script which aren't represented by a known unlocking script in the template) to verify the security of a particular contract. |
It's probably not too difficult to programmatically determine if e.g. the locking script isn't secure against miners. Simplest check is to see if a checksig operation was done for each path.
If you'd be interested in this feature, please comment here.
The text was updated successfully, but these errors were encountered: