-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Copilot siwe #204
Copilot siwe #204
Conversation
…MateuszStawski/core into feat/introduce-copliot-redesign
Co-authored-by: Daniel Chutkowski <[email protected]> Co-authored-by: SolutionsEngineer <[email protected]> Co-authored-by: 21142 <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Correctly implements dynamically forming the SIWE message by receiving a domain parameter in the API. Changed the type in the extension side and sent it in the hook handle function.
please siwtch targeted branch to copilot-dev @MateuszStawski |
Is this correctly implemented from the backend api side already? is verification successful? @daniel0ar |
As it is right now, the API won't respond with a jwt token unless verification is succesful. In my tests, all signed messages sent by the user are being verified succesfully with the provided publicClient on the API The only thing I would add for security is the nonce verification too, like this (line 29 of const valid = await publicClient.verifySiweMessage({
address: walletAddress,
message,
signature,
nonce,
}); and line 21 of the same file: const { signature, walletAddress, message, nonce } = req.body; This means that the user on the extension side should also send the nonce they received from This can be a separate PR or it can be included here. |
lets do separate |
No description provided.