Compare commits
1 Commits
0c73c8e4cc
...
fix/116-ti
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
28f3a22c32 |
107
LICENSE
107
LICENSE
@@ -672,110 +672,3 @@ may consider it more useful to permit linking proprietary applications with
|
|||||||
the library. If this is what you want to do, use the GNU Lesser General
|
the library. If this is what you want to do, use the GNU Lesser General
|
||||||
Public License instead of this License. But first, please read
|
Public License instead of this License. But first, please read
|
||||||
<https://www.gnu.org/licenses/why-not-lgpl.html>.
|
<https://www.gnu.org/licenses/why-not-lgpl.html>.
|
||||||
|
|
||||||
===========================================================================
|
|
||||||
THIRD-PARTY FILES
|
|
||||||
===========================================================================
|
|
||||||
|
|
||||||
The following files are not original to this project and are distributed
|
|
||||||
under their own licenses. They are NOT covered by the GPL-3.0 license above.
|
|
||||||
|
|
||||||
---------------------------------------------------------------------------
|
|
||||||
File: src/shared/phishingBlocklist.json
|
|
||||||
Source: https://github.com/AugurProject/eth-phishing-detect (config.json)
|
|
||||||
Copyright: Copyright (c) 2018 kumavis
|
|
||||||
License: Don't Be a Dick Public License (DBAD), Version 1.2
|
|
||||||
---------------------------------------------------------------------------
|
|
||||||
|
|
||||||
DON'T BE A DICK PUBLIC LICENSE
|
|
||||||
|
|
||||||
Version 1.2, February 2021
|
|
||||||
|
|
||||||
Copyright (C) 2018 kumavis
|
|
||||||
|
|
||||||
Everyone is permitted to copy and distribute verbatim or modified
|
|
||||||
copies of this license document.
|
|
||||||
|
|
||||||
DON'T BE A DICK PUBLIC LICENSE
|
|
||||||
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
|
||||||
|
|
||||||
1. Do whatever you like with the original work, just don't be a dick.
|
|
||||||
|
|
||||||
Being a dick includes - but is not limited to - the following instances:
|
|
||||||
|
|
||||||
1a. Outright copyright infringement - Don't just copy the original
|
|
||||||
work/works and change the name.
|
|
||||||
1b. Selling the unmodified original with no work done what-so-ever,
|
|
||||||
that's REALLY being a dick.
|
|
||||||
1c. Modifying the original work to contain hidden harmful content.
|
|
||||||
That would make you a PROPER dick.
|
|
||||||
|
|
||||||
2. If you become rich through modifications, related works/services, or
|
|
||||||
supporting the original work, share the love. Only a dick would make
|
|
||||||
loads off this work and not buy the original work's creator(s) a pint.
|
|
||||||
|
|
||||||
3. Code is provided with no warranty. Using somebody else's code and
|
|
||||||
bitching when it goes wrong makes you a DONKEY dick. Fix the problem
|
|
||||||
yourself. A non-dick would submit the fix back or submit a bug report.
|
|
||||||
|
|
||||||
4. If you use code, calling it your own would make you a ROYAL dick.
|
|
||||||
Alternatively, even just a comment giving attribution to where you found
|
|
||||||
the code would be OK.
|
|
||||||
|
|
||||||
---------------------------------------------------------------------------
|
|
||||||
File: src/shared/scamlist.js (address data from MyEtherWallet ethereum-lists)
|
|
||||||
Source: https://github.com/MyEtherWallet/ethereum-lists (addresses-darklist.json)
|
|
||||||
Copyright: Copyright (c) 2020 MyEtherWallet
|
|
||||||
License: MIT License
|
|
||||||
---------------------------------------------------------------------------
|
|
||||||
|
|
||||||
MIT License
|
|
||||||
|
|
||||||
Copyright (c) 2020 MyEtherWallet
|
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
||||||
of this software and associated documentation files (the "Software"), to deal
|
|
||||||
in the Software without restriction, including without limitation the rights
|
|
||||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
||||||
copies of the Software, and to permit persons to whom the Software is
|
|
||||||
furnished to do so, subject to the following conditions:
|
|
||||||
|
|
||||||
The above copyright notice and this permission notice shall be included in all
|
|
||||||
copies or substantial portions of the Software.
|
|
||||||
|
|
||||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
||||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
||||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
||||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
||||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
||||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
||||||
SOFTWARE.
|
|
||||||
|
|
||||||
---------------------------------------------------------------------------
|
|
||||||
File: src/shared/scamlist.js (address data from EtherScamDB)
|
|
||||||
Source: https://github.com/MrLuit/EtherScamDB (scams.yaml)
|
|
||||||
Copyright: Copyright (c) 2018 Luit Hollander
|
|
||||||
License: MIT License
|
|
||||||
---------------------------------------------------------------------------
|
|
||||||
|
|
||||||
MIT License
|
|
||||||
|
|
||||||
Copyright (c) 2018 Luit Hollander
|
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
||||||
of this software and associated documentation files (the "Software"), to deal
|
|
||||||
in the Software without restriction, including without limitation the rights
|
|
||||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
||||||
copies of the Software, and to permit persons to whom the Software is
|
|
||||||
furnished to do so, subject to the following conditions:
|
|
||||||
|
|
||||||
The above copyright notice and this permission notice shall be included in all
|
|
||||||
copies or substantial portions of the Software.
|
|
||||||
|
|
||||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
||||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
||||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
||||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
||||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
||||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
||||||
SOFTWARE.
|
|
||||||
|
|||||||
67
README.md
67
README.md
@@ -15,12 +15,10 @@ Hence, a minimally viable ERC20 browser wallet/signer that works cross-platform.
|
|||||||
Everything you need, nothing you don't. We import as few libraries as possible,
|
Everything you need, nothing you don't. We import as few libraries as possible,
|
||||||
don't implement any crypto, and don't send user-specific data anywhere but a
|
don't implement any crypto, and don't send user-specific data anywhere but a
|
||||||
(user-configurable) Ethereum RPC endpoint (which defaults to a public node). The
|
(user-configurable) Ethereum RPC endpoint (which defaults to a public node). The
|
||||||
extension contacts three user-configurable services: the configured RPC node for
|
extension contacts exactly three external services: the configured RPC node for
|
||||||
blockchain interactions, a public CoinDesk API (no API key) for realtime price
|
blockchain interactions, a public CoinDesk API (no API key) for realtime price
|
||||||
information, and a Blockscout block-explorer API for transaction history and
|
information, and a Blockscout block-explorer API for transaction history and
|
||||||
token balances. It also fetches a community-maintained phishing domain blocklist
|
token balances. All three endpoints are user-configurable.
|
||||||
periodically and performs best-effort Etherscan address label lookups during
|
|
||||||
transaction confirmation.
|
|
||||||
|
|
||||||
In the extension is a hardcoded list of the top ERC20 contract addresses. You
|
In the extension is a hardcoded list of the top ERC20 contract addresses. You
|
||||||
can add any ERC20 contract by contract address if you wish, but the hardcoded
|
can add any ERC20 contract by contract address if you wish, but the hardcoded
|
||||||
@@ -439,10 +437,6 @@ transitions.
|
|||||||
- **When**: User tapped a transaction row from AddressDetail or AddressToken.
|
- **When**: User tapped a transaction row from AddressDetail or AddressToken.
|
||||||
- **Elements**:
|
- **Elements**:
|
||||||
- "Transaction" heading, "Back" button
|
- "Transaction" heading, "Back" button
|
||||||
- Type: transaction classification — one of: Native ETH Transfer, ERC-20
|
|
||||||
Token Transfer, Swap, Token Approval, Contract Call, Contract Creation
|
|
||||||
- Token contract: shown for ERC-20 transfers — color dot + full contract
|
|
||||||
address (tap to copy) + etherscan token link
|
|
||||||
- Status: "Success" or "Failed"
|
- Status: "Success" or "Failed"
|
||||||
- Time: ISO datetime + relative age in parentheses
|
- Time: ISO datetime + relative age in parentheses
|
||||||
- Amount: value + symbol (bold)
|
- Amount: value + symbol (bold)
|
||||||
@@ -451,11 +445,6 @@ transitions.
|
|||||||
- To: blockie + color dot + full address (tap to copy) + etherscan link
|
- To: blockie + color dot + full address (tap to copy) + etherscan link
|
||||||
- ENS name if available
|
- ENS name if available
|
||||||
- Transaction hash: full hash (tap to copy) + etherscan link
|
- Transaction hash: full hash (tap to copy) + etherscan link
|
||||||
- Block: block number (tap to copy) + etherscan block link
|
|
||||||
- Nonce: transaction nonce (tap to copy)
|
|
||||||
- Transaction fee: ETH amount (tap to copy)
|
|
||||||
- Gas price: value in Gwei (tap to copy)
|
|
||||||
- Gas used: integer (tap to copy)
|
|
||||||
- **Transitions**:
|
- **Transitions**:
|
||||||
- "Back" → **AddressToken** (if `selectedToken` set) or **AddressDetail**
|
- "Back" → **AddressToken** (if `selectedToken` set) or **AddressDetail**
|
||||||
|
|
||||||
@@ -578,25 +567,14 @@ What the extension does NOT do:
|
|||||||
|
|
||||||
- No analytics or telemetry services
|
- No analytics or telemetry services
|
||||||
- No token list APIs (user adds tokens manually by contract address)
|
- No token list APIs (user adds tokens manually by contract address)
|
||||||
|
- No phishing/blocklist APIs
|
||||||
- No Infura/Alchemy dependency (any JSON-RPC endpoint works)
|
- No Infura/Alchemy dependency (any JSON-RPC endpoint works)
|
||||||
- No backend servers operated by the developer
|
- No backend servers operated by the developer
|
||||||
|
|
||||||
In addition to the three user-configurable services above (RPC endpoint,
|
These three services (RPC endpoint, CoinDesk price API, and Blockscout API) are
|
||||||
CoinDesk price API, and Blockscout API), AutistMask also contacts:
|
the only external services. All three endpoints are user-configurable. Users who
|
||||||
|
want maximum privacy can point the RPC and Blockscout URLs at their own
|
||||||
- **Phishing domain blocklist**: A community-maintained phishing domain
|
self-hosted instances (price fetching can be disabled in a future version).
|
||||||
blocklist is vendored into the extension at build time. At runtime, the
|
|
||||||
extension fetches the live list once every 24 hours to detect newly added
|
|
||||||
domains. Only the delta (domains not already in the vendored list) is kept in
|
|
||||||
memory, keeping runtime memory usage small. The delta is persisted to
|
|
||||||
localStorage if it is under 256 KiB.
|
|
||||||
- **Etherscan address labels**: When confirming a transaction, the extension
|
|
||||||
performs a best-effort lookup of the recipient address on Etherscan to check
|
|
||||||
for phishing/scam labels. This is a direct page fetch with no API key; the
|
|
||||||
user's browser makes the request.
|
|
||||||
|
|
||||||
Users who want maximum privacy can point the RPC and Blockscout URLs at their
|
|
||||||
own self-hosted instances (price fetching can be disabled in a future version).
|
|
||||||
|
|
||||||
### Dependencies
|
### Dependencies
|
||||||
|
|
||||||
@@ -786,22 +764,6 @@ indexes it as a real token transfer.
|
|||||||
designed as a sharp tool — users who understand the risks can configure the
|
designed as a sharp tool — users who understand the risks can configure the
|
||||||
wallet to show everything unfiltered, unix-style.
|
wallet to show everything unfiltered, unix-style.
|
||||||
|
|
||||||
#### Phishing Domain Protection
|
|
||||||
|
|
||||||
AutistMask protects users from known phishing sites when they connect their
|
|
||||||
wallet or approve transactions/signatures. A community-maintained domain
|
|
||||||
blocklist is vendored into the extension at build time, providing immediate
|
|
||||||
protection without any network requests. At runtime, the extension fetches the
|
|
||||||
live list once every 24 hours and keeps only the delta (newly added domains not
|
|
||||||
in the vendored list) in memory. This architecture keeps runtime memory usage
|
|
||||||
small while ensuring fresh coverage of new phishing domains.
|
|
||||||
|
|
||||||
When a dApp on a blocklisted domain requests a wallet connection, transaction
|
|
||||||
approval, or signature, the approval popup displays a prominent red warning
|
|
||||||
banner alerting the user. The domain checker matches exact hostnames and all
|
|
||||||
parent domains (subdomain matching), with whitelist overrides for legitimate
|
|
||||||
sites that share a parent domain with a blocklisted entry.
|
|
||||||
|
|
||||||
#### Transaction Decoding
|
#### Transaction Decoding
|
||||||
|
|
||||||
When a dApp asks the user to approve a transaction, AutistMask attempts to
|
When a dApp asks the user to approve a transaction, AutistMask attempts to
|
||||||
@@ -884,21 +846,6 @@ Currently supported:
|
|||||||
|
|
||||||
GPL-3.0. See [LICENSE](LICENSE).
|
GPL-3.0. See [LICENSE](LICENSE).
|
||||||
|
|
||||||
### Third-Party Data Files
|
|
||||||
|
|
||||||
This repository includes data files from third-party projects that are not
|
|
||||||
covered by the GPL-3.0 license above. These files, their copyright holders, and
|
|
||||||
their licenses are:
|
|
||||||
|
|
||||||
| File | Source | Copyright | License |
|
|
||||||
| ---------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------- | --------------------------------- | -------------------------------------------------------------- |
|
|
||||||
| `src/shared/phishingBlocklist.json` | [eth-phishing-detect](https://github.com/AugurProject/eth-phishing-detect) community-maintained phishing domain blocklist | Copyright (c) 2018 kumavis | [DBAD (Don't Be a Dick)](https://github.com/philsturgeon/dbad) |
|
|
||||||
| `src/shared/scamlist.js` (address data from MyEtherWallet) | [ethereum-lists](https://github.com/MyEtherWallet/ethereum-lists) `addresses-darklist.json` | Copyright (c) 2020 MyEtherWallet | MIT |
|
|
||||||
| `src/shared/scamlist.js` (address data from EtherScamDB) | [EtherScamDB](https://github.com/MrLuit/EtherScamDB) `scams.yaml` | Copyright (c) 2018 Luit Hollander | MIT |
|
|
||||||
|
|
||||||
The full license texts for these third-party files are included in the
|
|
||||||
[LICENSE](LICENSE) file.
|
|
||||||
|
|
||||||
## Author
|
## Author
|
||||||
|
|
||||||
[@sneak](https://sneak.berlin)
|
[@sneak](https://sneak.berlin)
|
||||||
|
|||||||
@@ -12,11 +12,6 @@ const { refreshBalances, getProvider } = require("../shared/balances");
|
|||||||
const { debugFetch } = require("../shared/log");
|
const { debugFetch } = require("../shared/log");
|
||||||
const { decryptWithPassword } = require("../shared/vault");
|
const { decryptWithPassword } = require("../shared/vault");
|
||||||
const { getSignerForAddress } = require("../shared/wallet");
|
const { getSignerForAddress } = require("../shared/wallet");
|
||||||
const {
|
|
||||||
isPhishingDomain,
|
|
||||||
updatePhishingList,
|
|
||||||
startPeriodicRefresh,
|
|
||||||
} = require("../shared/phishingDomains");
|
|
||||||
|
|
||||||
const storageApi =
|
const storageApi =
|
||||||
typeof browser !== "undefined"
|
typeof browser !== "undefined"
|
||||||
@@ -576,11 +571,6 @@ async function backgroundRefresh() {
|
|||||||
|
|
||||||
setInterval(backgroundRefresh, BACKGROUND_REFRESH_INTERVAL);
|
setInterval(backgroundRefresh, BACKGROUND_REFRESH_INTERVAL);
|
||||||
|
|
||||||
// Fetch the phishing domain blocklist delta on startup and refresh every 24h.
|
|
||||||
// The vendored blocklist is bundled at build time; this fetches only new entries.
|
|
||||||
updatePhishingList();
|
|
||||||
startPeriodicRefresh();
|
|
||||||
|
|
||||||
// When approval window is closed without a response, treat as rejection
|
// When approval window is closed without a response, treat as rejection
|
||||||
if (windowsApi && windowsApi.onRemoved) {
|
if (windowsApi && windowsApi.onRemoved) {
|
||||||
windowsApi.onRemoved.addListener((windowId) => {
|
windowsApi.onRemoved.addListener((windowId) => {
|
||||||
@@ -653,8 +643,6 @@ runtime.onMessage.addListener((msg, sender, sendResponse) => {
|
|||||||
resp.type = "sign";
|
resp.type = "sign";
|
||||||
resp.signParams = approval.signParams;
|
resp.signParams = approval.signParams;
|
||||||
}
|
}
|
||||||
// Flag if the requesting domain is on the phishing blocklist.
|
|
||||||
resp.isPhishingDomain = isPhishingDomain(approval.hostname);
|
|
||||||
sendResponse(resp);
|
sendResponse(resp);
|
||||||
} else {
|
} else {
|
||||||
sendResponse(null);
|
sendResponse(null);
|
||||||
|
|||||||
@@ -107,8 +107,7 @@
|
|||||||
</div>
|
</div>
|
||||||
<div
|
<div
|
||||||
id="add-wallet-phrase-warning"
|
id="add-wallet-phrase-warning"
|
||||||
class="text-xs mb-2 border border-border border-dashed p-2"
|
class="text-xs mb-2 border border-border border-dashed p-2 hidden"
|
||||||
style="visibility: hidden"
|
|
||||||
>
|
>
|
||||||
Write these words down and keep them safe. Anyone with
|
Write these words down and keep them safe. Anyone with
|
||||||
them can take your funds; if you lose them, your wallet
|
them can take your funds; if you lose them, your wallet
|
||||||
@@ -185,7 +184,7 @@
|
|||||||
<!-- active address headline -->
|
<!-- active address headline -->
|
||||||
<div
|
<div
|
||||||
id="total-value"
|
id="total-value"
|
||||||
class="text-2xl font-bold min-h-[2rem] text-fg"
|
class="text-2xl font-bold min-h-[2rem]"
|
||||||
></div>
|
></div>
|
||||||
<div
|
<div
|
||||||
id="total-value-sub"
|
id="total-value-sub"
|
||||||
@@ -376,8 +375,7 @@
|
|||||||
</p>
|
</p>
|
||||||
<div
|
<div
|
||||||
id="export-privkey-flash"
|
id="export-privkey-flash"
|
||||||
class="text-xs mb-2 min-h-[1.25rem]"
|
class="text-xs mb-2 hidden"
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
></div>
|
||||||
<div id="export-privkey-password-section" class="mb-2">
|
<div id="export-privkey-password-section" class="mb-2">
|
||||||
<label class="block mb-1">Password</label>
|
<label class="block mb-1">Password</label>
|
||||||
@@ -581,17 +579,13 @@
|
|||||||
<div class="text-xs text-muted mb-1">Your balance</div>
|
<div class="text-xs text-muted mb-1">Your balance</div>
|
||||||
<div id="confirm-balance" class="text-xs"></div>
|
<div id="confirm-balance" class="text-xs"></div>
|
||||||
</div>
|
</div>
|
||||||
<div id="confirm-fee" class="mb-3" style="visibility: hidden">
|
<div id="confirm-fee" class="mb-3 hidden">
|
||||||
<div class="text-xs text-muted mb-1">
|
<div class="text-xs text-muted mb-1">
|
||||||
Estimated network fee
|
Estimated network fee
|
||||||
</div>
|
</div>
|
||||||
<div id="confirm-fee-amount" class="text-xs"></div>
|
<div id="confirm-fee-amount" class="text-xs"></div>
|
||||||
</div>
|
</div>
|
||||||
<div
|
<div id="confirm-warnings" class="mb-2 hidden"></div>
|
||||||
id="confirm-warnings"
|
|
||||||
class="mb-2"
|
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
|
||||||
<div
|
<div
|
||||||
id="confirm-recipient-warning"
|
id="confirm-recipient-warning"
|
||||||
class="mb-2"
|
class="mb-2"
|
||||||
@@ -605,47 +599,9 @@
|
|||||||
Double-check the address before sending.
|
Double-check the address before sending.
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div
|
|
||||||
id="confirm-contract-warning"
|
|
||||||
class="mb-2"
|
|
||||||
style="visibility: hidden"
|
|
||||||
>
|
|
||||||
<div
|
|
||||||
class="border border-red-500 border-dashed p-2 text-xs font-bold text-red-500"
|
|
||||||
>
|
|
||||||
WARNING: The recipient is a smart contract. Sending ETH
|
|
||||||
or tokens directly to a contract may result in permanent
|
|
||||||
loss of funds.
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
<div
|
|
||||||
id="confirm-burn-warning"
|
|
||||||
class="mb-2"
|
|
||||||
style="visibility: hidden"
|
|
||||||
>
|
|
||||||
<div
|
|
||||||
class="border border-red-500 border-dashed p-2 text-xs font-bold text-red-500"
|
|
||||||
>
|
|
||||||
WARNING: This is a known null/burn address. Funds sent
|
|
||||||
here are permanently destroyed and cannot be recovered.
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
<div
|
|
||||||
id="confirm-etherscan-warning"
|
|
||||||
class="mb-2"
|
|
||||||
style="visibility: hidden"
|
|
||||||
>
|
|
||||||
<div
|
|
||||||
class="border border-red-500 border-dashed p-2 text-xs font-bold text-red-500"
|
|
||||||
>
|
|
||||||
WARNING: Etherscan has flagged this address as
|
|
||||||
phishing/scam. Do not send funds to this address.
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
<div
|
<div
|
||||||
id="confirm-errors"
|
id="confirm-errors"
|
||||||
class="mb-2 border border-border border-dashed p-2"
|
class="mb-2 border border-border border-dashed p-2 hidden"
|
||||||
style="visibility: hidden; min-height: 1.25rem"
|
|
||||||
></div>
|
></div>
|
||||||
<div class="mb-2">
|
<div class="mb-2">
|
||||||
<label class="block mb-1 text-xs">Password</label>
|
<label class="block mb-1 text-xs">Password</label>
|
||||||
@@ -658,7 +614,6 @@
|
|||||||
<div
|
<div
|
||||||
id="confirm-tx-password-error"
|
id="confirm-tx-password-error"
|
||||||
class="text-xs mb-2 min-h-[1.25rem]"
|
class="text-xs mb-2 min-h-[1.25rem]"
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
></div>
|
||||||
<button
|
<button
|
||||||
id="btn-confirm-send"
|
id="btn-confirm-send"
|
||||||
@@ -773,8 +728,7 @@
|
|||||||
</button>
|
</button>
|
||||||
<div
|
<div
|
||||||
id="receive-erc20-warning"
|
id="receive-erc20-warning"
|
||||||
class="text-xs border border-border border-dashed p-2 mt-3"
|
class="text-xs border border-border border-dashed p-2 mt-3 hidden"
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
></div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@@ -802,8 +756,7 @@
|
|||||||
</div>
|
</div>
|
||||||
<div
|
<div
|
||||||
id="add-token-info"
|
id="add-token-info"
|
||||||
class="text-xs text-muted mb-2 min-h-[1.25rem]"
|
class="text-xs text-muted mb-2 hidden"
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
></div>
|
||||||
<div class="mb-2">
|
<div class="mb-2">
|
||||||
<label class="block mb-1 text-xs text-muted"
|
<label class="block mb-1 text-xs text-muted"
|
||||||
@@ -861,7 +814,7 @@
|
|||||||
<div class="bg-well p-3 mx-1 mb-3">
|
<div class="bg-well p-3 mx-1 mb-3">
|
||||||
<h3 class="font-bold mb-1">Display</h3>
|
<h3 class="font-bold mb-1">Display</h3>
|
||||||
<label
|
<label
|
||||||
class="text-xs flex items-center gap-1 cursor-pointer mb-2"
|
class="text-xs flex items-center gap-1 cursor-pointer"
|
||||||
>
|
>
|
||||||
<input
|
<input
|
||||||
type="checkbox"
|
type="checkbox"
|
||||||
@@ -869,17 +822,6 @@
|
|||||||
/>
|
/>
|
||||||
Show tracked tokens with zero balance
|
Show tracked tokens with zero balance
|
||||||
</label>
|
</label>
|
||||||
<div class="text-xs flex items-center gap-1">
|
|
||||||
<label for="settings-theme">Theme:</label>
|
|
||||||
<select
|
|
||||||
id="settings-theme"
|
|
||||||
class="border border-border p-1 bg-bg text-fg text-xs cursor-pointer"
|
|
||||||
>
|
|
||||||
<option value="system">System</option>
|
|
||||||
<option value="light">Light</option>
|
|
||||||
<option value="dark">Dark</option>
|
|
||||||
</select>
|
|
||||||
</div>
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="bg-well p-3 mx-1 mb-3">
|
<div class="bg-well p-3 mx-1 mb-3">
|
||||||
@@ -961,12 +903,6 @@
|
|||||||
/>
|
/>
|
||||||
<span class="text-xs text-muted">gwei</span>
|
<span class="text-xs text-muted">gwei</span>
|
||||||
</div>
|
</div>
|
||||||
<label
|
|
||||||
class="text-xs flex items-center gap-1 cursor-pointer mb-1"
|
|
||||||
>
|
|
||||||
<input type="checkbox" id="settings-utc-timestamps" />
|
|
||||||
UTC Timestamps
|
|
||||||
</label>
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="bg-well p-3 mx-1 mb-3">
|
<div class="bg-well p-3 mx-1 mb-3">
|
||||||
@@ -1002,8 +938,7 @@
|
|||||||
</p>
|
</p>
|
||||||
<div
|
<div
|
||||||
id="delete-wallet-flash"
|
id="delete-wallet-flash"
|
||||||
class="text-xs text-red-500 mb-2 min-h-[1.25rem]"
|
class="text-xs text-red-500 mb-2 hidden"
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
></div>
|
||||||
<div class="mb-2">
|
<div class="mb-2">
|
||||||
<label class="block mb-1">Password</label>
|
<label class="block mb-1">Password</label>
|
||||||
@@ -1078,8 +1013,7 @@
|
|||||||
/>
|
/>
|
||||||
<div
|
<div
|
||||||
id="settings-addtoken-info"
|
id="settings-addtoken-info"
|
||||||
class="text-xs text-muted mt-1 min-h-[1.25rem]"
|
class="text-xs text-muted mt-1 hidden"
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
></div>
|
||||||
<button
|
<button
|
||||||
id="btn-settings-addtoken-manual"
|
id="btn-settings-addtoken-manual"
|
||||||
@@ -1129,13 +1063,6 @@
|
|||||||
<div class="text-xs text-muted mb-1">To</div>
|
<div class="text-xs text-muted mb-1">To</div>
|
||||||
<div id="tx-detail-to" class="text-xs break-all"></div>
|
<div id="tx-detail-to" class="text-xs break-all"></div>
|
||||||
</div>
|
</div>
|
||||||
<div id="tx-detail-token-contract-section" class="mb-4 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Token contract</div>
|
|
||||||
<div
|
|
||||||
id="tx-detail-token-contract"
|
|
||||||
class="text-xs break-all"
|
|
||||||
></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-calldata-section" class="mb-4 hidden">
|
<div id="tx-detail-calldata-section" class="mb-4 hidden">
|
||||||
<div
|
<div
|
||||||
id="tx-detail-calldata-well"
|
id="tx-detail-calldata-well"
|
||||||
@@ -1156,26 +1083,6 @@
|
|||||||
<div class="text-xs text-muted mb-1">Transaction hash</div>
|
<div class="text-xs text-muted mb-1">Transaction hash</div>
|
||||||
<div id="tx-detail-hash" class="text-xs break-all"></div>
|
<div id="tx-detail-hash" class="text-xs break-all"></div>
|
||||||
</div>
|
</div>
|
||||||
<div id="tx-detail-block-section" class="mb-4 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Block</div>
|
|
||||||
<div id="tx-detail-block" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-nonce-section" class="mb-4 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Nonce</div>
|
|
||||||
<div id="tx-detail-nonce" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-fee-section" class="mb-4 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Transaction fee</div>
|
|
||||||
<div id="tx-detail-fee" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-gasprice-section" class="mb-4 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Gas price</div>
|
|
||||||
<div id="tx-detail-gasprice" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-gasused-section" class="mb-4 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Gas used</div>
|
|
||||||
<div id="tx-detail-gasused" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-rawdata-section" class="mb-4 hidden">
|
<div id="tx-detail-rawdata-section" class="mb-4 hidden">
|
||||||
<div class="text-xs text-muted mb-1">Raw data</div>
|
<div class="text-xs text-muted mb-1">Raw data</div>
|
||||||
<div
|
<div
|
||||||
@@ -1188,14 +1095,6 @@
|
|||||||
<!-- ============ TRANSACTION APPROVAL ============ -->
|
<!-- ============ TRANSACTION APPROVAL ============ -->
|
||||||
<div id="view-approve-tx" class="view hidden">
|
<div id="view-approve-tx" class="view hidden">
|
||||||
<h2 class="font-bold mb-2">Transaction Request</h2>
|
<h2 class="font-bold mb-2">Transaction Request</h2>
|
||||||
<div
|
|
||||||
id="approve-tx-phishing-warning"
|
|
||||||
class="mb-3 p-2 text-xs font-bold hidden bg-red-100 text-red-800 border-2 border-red-600 rounded-md"
|
|
||||||
>
|
|
||||||
⚠️ PHISHING WARNING: This site is on a known phishing
|
|
||||||
blocklist. This transaction may steal your funds. Proceed
|
|
||||||
with extreme caution.
|
|
||||||
</div>
|
|
||||||
<p class="mb-2">
|
<p class="mb-2">
|
||||||
<span id="approve-tx-hostname" class="font-bold"></span>
|
<span id="approve-tx-hostname" class="font-bold"></span>
|
||||||
wants to send a transaction.
|
wants to send a transaction.
|
||||||
@@ -1240,8 +1139,7 @@
|
|||||||
</div>
|
</div>
|
||||||
<div
|
<div
|
||||||
id="approve-tx-error"
|
id="approve-tx-error"
|
||||||
class="text-xs mb-2 border border-border border-dashed p-1 min-h-[1.25rem]"
|
class="text-xs mb-2 border border-border border-dashed p-1 min-h-[1.25rem] hidden"
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
></div>
|
||||||
<div class="flex justify-between">
|
<div class="flex justify-between">
|
||||||
<button
|
<button
|
||||||
@@ -1262,14 +1160,6 @@
|
|||||||
<!-- ============ SIGNATURE APPROVAL ============ -->
|
<!-- ============ SIGNATURE APPROVAL ============ -->
|
||||||
<div id="view-approve-sign" class="view hidden">
|
<div id="view-approve-sign" class="view hidden">
|
||||||
<h2 class="font-bold mb-2">Signature Request</h2>
|
<h2 class="font-bold mb-2">Signature Request</h2>
|
||||||
<div
|
|
||||||
id="approve-sign-phishing-warning"
|
|
||||||
class="mb-3 p-2 text-xs font-bold hidden bg-red-100 text-red-800 border-2 border-red-600 rounded-md"
|
|
||||||
>
|
|
||||||
⚠️ PHISHING WARNING: This site is on a known phishing
|
|
||||||
blocklist. Signing this message may authorize theft of your
|
|
||||||
funds. Proceed with extreme caution.
|
|
||||||
</div>
|
|
||||||
<p class="mb-2">
|
<p class="mb-2">
|
||||||
<span id="approve-sign-hostname" class="font-bold"></span>
|
<span id="approve-sign-hostname" class="font-bold"></span>
|
||||||
wants you to sign a message.
|
wants you to sign a message.
|
||||||
@@ -1277,10 +1167,8 @@
|
|||||||
|
|
||||||
<div
|
<div
|
||||||
id="approve-sign-danger-warning"
|
id="approve-sign-danger-warning"
|
||||||
class="mb-3 p-2 text-xs font-bold"
|
class="hidden mb-3 p-2 text-xs font-bold"
|
||||||
style="
|
style="
|
||||||
visibility: hidden;
|
|
||||||
min-height: 1.25rem;
|
|
||||||
background: #fee2e2;
|
background: #fee2e2;
|
||||||
color: #991b1b;
|
color: #991b1b;
|
||||||
border: 2px solid #dc2626;
|
border: 2px solid #dc2626;
|
||||||
@@ -1317,8 +1205,7 @@
|
|||||||
</div>
|
</div>
|
||||||
<div
|
<div
|
||||||
id="approve-sign-error"
|
id="approve-sign-error"
|
||||||
class="text-xs mb-2 border border-border border-dashed p-1 min-h-[1.25rem]"
|
class="text-xs mb-2 border border-border border-dashed p-1 min-h-[1.25rem] hidden"
|
||||||
style="visibility: hidden"
|
|
||||||
></div>
|
></div>
|
||||||
<div class="flex justify-between">
|
<div class="flex justify-between">
|
||||||
<button
|
<button
|
||||||
@@ -1339,14 +1226,6 @@
|
|||||||
<!-- ============ SITE APPROVAL ============ -->
|
<!-- ============ SITE APPROVAL ============ -->
|
||||||
<div id="view-approve-site" class="view hidden">
|
<div id="view-approve-site" class="view hidden">
|
||||||
<h2 class="font-bold mb-2">Connection Request</h2>
|
<h2 class="font-bold mb-2">Connection Request</h2>
|
||||||
<div
|
|
||||||
id="approve-site-phishing-warning"
|
|
||||||
class="mb-3 p-2 text-xs font-bold hidden bg-red-100 text-red-800 border-2 border-red-600 rounded-md"
|
|
||||||
>
|
|
||||||
⚠️ PHISHING WARNING: This site is on a known phishing
|
|
||||||
blocklist. Connecting your wallet may result in loss of
|
|
||||||
funds. Proceed with extreme caution.
|
|
||||||
</div>
|
|
||||||
<div class="mb-3">
|
<div class="mb-3">
|
||||||
<p class="mb-2">
|
<p class="mb-2">
|
||||||
<span id="approve-hostname" class="font-bold"></span>
|
<span id="approve-hostname" class="font-bold"></span>
|
||||||
|
|||||||
@@ -6,7 +6,6 @@ const { state, saveState, loadState } = require("../shared/state");
|
|||||||
const { refreshPrices } = require("../shared/prices");
|
const { refreshPrices } = require("../shared/prices");
|
||||||
const { refreshBalances } = require("../shared/balances");
|
const { refreshBalances } = require("../shared/balances");
|
||||||
const { $, showView } = require("./views/helpers");
|
const { $, showView } = require("./views/helpers");
|
||||||
const { applyTheme } = require("./theme");
|
|
||||||
|
|
||||||
const home = require("./views/home");
|
const home = require("./views/home");
|
||||||
const welcome = require("./views/welcome");
|
const welcome = require("./views/welcome");
|
||||||
@@ -177,7 +176,6 @@ async function init() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
await loadState();
|
await loadState();
|
||||||
applyTheme(state.theme);
|
|
||||||
|
|
||||||
// Auto-default active address
|
// Auto-default active address
|
||||||
if (
|
if (
|
||||||
|
|||||||
@@ -15,18 +15,6 @@
|
|||||||
--color-section: #dddddd;
|
--color-section: #dddddd;
|
||||||
}
|
}
|
||||||
|
|
||||||
html.dark {
|
|
||||||
--color-bg: #000000;
|
|
||||||
--color-fg: #ffffff;
|
|
||||||
--color-muted: #aaaaaa;
|
|
||||||
--color-border: #ffffff;
|
|
||||||
--color-border-light: #444444;
|
|
||||||
--color-hover: #222222;
|
|
||||||
--color-well: #1a1a1a;
|
|
||||||
--color-danger-well: #2a0a0a;
|
|
||||||
--color-section: #2a2a2a;
|
|
||||||
}
|
|
||||||
|
|
||||||
body {
|
body {
|
||||||
width: 396px;
|
width: 396px;
|
||||||
overflow-x: hidden;
|
overflow-x: hidden;
|
||||||
@@ -41,6 +29,6 @@ body {
|
|||||||
|
|
||||||
.copy-flash-fade {
|
.copy-flash-fade {
|
||||||
transition:
|
transition:
|
||||||
background-color 225ms ease-out,
|
background-color 300ms ease-out,
|
||||||
color 225ms ease-out;
|
color 300ms ease-out;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,33 +0,0 @@
|
|||||||
// Theme management: applies light/dark class to <html> based on preference.
|
|
||||||
|
|
||||||
let mediaQuery = null;
|
|
||||||
let mediaHandler = null;
|
|
||||||
|
|
||||||
function applyTheme(theme) {
|
|
||||||
// Clean up previous system listener
|
|
||||||
if (mediaQuery && mediaHandler) {
|
|
||||||
mediaQuery.removeEventListener("change", mediaHandler);
|
|
||||||
mediaHandler = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (theme === "dark") {
|
|
||||||
document.documentElement.classList.add("dark");
|
|
||||||
} else if (theme === "light") {
|
|
||||||
document.documentElement.classList.remove("dark");
|
|
||||||
} else {
|
|
||||||
// system
|
|
||||||
mediaQuery = window.matchMedia("(prefers-color-scheme: dark)");
|
|
||||||
const update = () => {
|
|
||||||
if (mediaQuery.matches) {
|
|
||||||
document.documentElement.classList.add("dark");
|
|
||||||
} else {
|
|
||||||
document.documentElement.classList.remove("dark");
|
|
||||||
}
|
|
||||||
};
|
|
||||||
mediaHandler = update;
|
|
||||||
mediaQuery.addEventListener("change", update);
|
|
||||||
update();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
module.exports = { applyTheme };
|
|
||||||
@@ -7,8 +7,7 @@ const { log } = require("../../shared/log");
|
|||||||
|
|
||||||
function show() {
|
function show() {
|
||||||
$("add-token-address").value = "";
|
$("add-token-address").value = "";
|
||||||
$("add-token-info").textContent = "";
|
$("add-token-info").classList.add("hidden");
|
||||||
$("add-token-info").style.visibility = "hidden";
|
|
||||||
const list = $("common-token-list");
|
const list = $("common-token-list");
|
||||||
list.innerHTML = getTopTokens(25)
|
list.innerHTML = getTopTokens(25)
|
||||||
.map(
|
.map(
|
||||||
@@ -46,7 +45,7 @@ function init(ctx) {
|
|||||||
}
|
}
|
||||||
const infoEl = $("add-token-info");
|
const infoEl = $("add-token-info");
|
||||||
infoEl.textContent = "Looking up token...";
|
infoEl.textContent = "Looking up token...";
|
||||||
infoEl.style.visibility = "visible";
|
infoEl.classList.remove("hidden");
|
||||||
log.debugf("Looking up token contract", contractAddr);
|
log.debugf("Looking up token contract", contractAddr);
|
||||||
try {
|
try {
|
||||||
const info = await lookupTokenInfo(contractAddr, state.rpcUrl);
|
const info = await lookupTokenInfo(contractAddr, state.rpcUrl);
|
||||||
@@ -64,8 +63,7 @@ function init(ctx) {
|
|||||||
const detail = e.shortMessage || e.message || String(e);
|
const detail = e.shortMessage || e.message || String(e);
|
||||||
log.errorf("Token lookup failed for", contractAddr, detail);
|
log.errorf("Token lookup failed for", contractAddr, detail);
|
||||||
showFlash(detail);
|
showFlash(detail);
|
||||||
infoEl.textContent = "";
|
infoEl.classList.add("hidden");
|
||||||
infoEl.style.visibility = "hidden";
|
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|||||||
@@ -71,7 +71,7 @@ function show() {
|
|||||||
$("import-xprv-key").value = "";
|
$("import-xprv-key").value = "";
|
||||||
$("add-wallet-password").value = "";
|
$("add-wallet-password").value = "";
|
||||||
$("add-wallet-password-confirm").value = "";
|
$("add-wallet-password-confirm").value = "";
|
||||||
$("add-wallet-phrase-warning").style.visibility = "hidden";
|
$("add-wallet-phrase-warning").classList.add("hidden");
|
||||||
switchMode("mnemonic");
|
switchMode("mnemonic");
|
||||||
showView("add-wallet");
|
showView("add-wallet");
|
||||||
}
|
}
|
||||||
@@ -281,7 +281,7 @@ function init(ctx) {
|
|||||||
// Generate mnemonic
|
// Generate mnemonic
|
||||||
$("btn-generate-phrase").addEventListener("click", () => {
|
$("btn-generate-phrase").addEventListener("click", () => {
|
||||||
$("wallet-mnemonic").value = generateMnemonic();
|
$("wallet-mnemonic").value = generateMnemonic();
|
||||||
$("add-wallet-phrase-warning").style.visibility = "visible";
|
$("add-wallet-phrase-warning").classList.remove("hidden");
|
||||||
});
|
});
|
||||||
|
|
||||||
// Import / confirm
|
// Import / confirm
|
||||||
|
|||||||
@@ -95,39 +95,23 @@ function show() {
|
|||||||
function isoDate(timestamp) {
|
function isoDate(timestamp) {
|
||||||
const d = new Date(timestamp * 1000);
|
const d = new Date(timestamp * 1000);
|
||||||
const pad = (n) => String(n).padStart(2, "0");
|
const pad = (n) => String(n).padStart(2, "0");
|
||||||
if (state.utcTimestamps) {
|
const off = -d.getTimezoneOffset();
|
||||||
return (
|
const sign = off >= 0 ? "+" : "-";
|
||||||
d.getUTCFullYear() +
|
const absOff = Math.abs(off);
|
||||||
"-" +
|
const tz = sign + pad(Math.floor(absOff / 60)) + ":" + pad(absOff % 60);
|
||||||
pad(d.getUTCMonth() + 1) +
|
|
||||||
"-" +
|
|
||||||
pad(d.getUTCDate()) +
|
|
||||||
"T" +
|
|
||||||
pad(d.getUTCHours()) +
|
|
||||||
":" +
|
|
||||||
pad(d.getUTCMinutes()) +
|
|
||||||
":" +
|
|
||||||
pad(d.getUTCSeconds()) +
|
|
||||||
"Z"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
const offsetMin = -d.getTimezoneOffset();
|
|
||||||
const sign = offsetMin >= 0 ? "+" : "-";
|
|
||||||
const absOff = Math.abs(offsetMin);
|
|
||||||
const tzStr = sign + pad(Math.floor(absOff / 60)) + ":" + pad(absOff % 60);
|
|
||||||
return (
|
return (
|
||||||
d.getFullYear() +
|
d.getFullYear() +
|
||||||
"-" +
|
"-" +
|
||||||
pad(d.getMonth() + 1) +
|
pad(d.getMonth() + 1) +
|
||||||
"-" +
|
"-" +
|
||||||
pad(d.getDate()) +
|
pad(d.getDate()) +
|
||||||
"T" +
|
" " +
|
||||||
pad(d.getHours()) +
|
pad(d.getHours()) +
|
||||||
":" +
|
":" +
|
||||||
pad(d.getMinutes()) +
|
pad(d.getMinutes()) +
|
||||||
":" +
|
":" +
|
||||||
pad(d.getSeconds()) +
|
pad(d.getSeconds()) +
|
||||||
tzStr
|
tz
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -333,8 +317,8 @@ function init(_ctx) {
|
|||||||
$("export-privkey-address").textContent = addr.address;
|
$("export-privkey-address").textContent = addr.address;
|
||||||
$("export-privkey-address").dataset.full = addr.address;
|
$("export-privkey-address").dataset.full = addr.address;
|
||||||
$("export-privkey-password").value = "";
|
$("export-privkey-password").value = "";
|
||||||
|
$("export-privkey-flash").classList.add("hidden");
|
||||||
$("export-privkey-flash").textContent = "";
|
$("export-privkey-flash").textContent = "";
|
||||||
$("export-privkey-flash").style.visibility = "hidden";
|
|
||||||
$("export-privkey-password-section").classList.remove("hidden");
|
$("export-privkey-password-section").classList.remove("hidden");
|
||||||
$("export-privkey-result").classList.add("hidden");
|
$("export-privkey-result").classList.add("hidden");
|
||||||
$("export-privkey-value").textContent = "";
|
$("export-privkey-value").textContent = "";
|
||||||
@@ -345,7 +329,7 @@ function init(_ctx) {
|
|||||||
const password = $("export-privkey-password").value;
|
const password = $("export-privkey-password").value;
|
||||||
if (!password) {
|
if (!password) {
|
||||||
$("export-privkey-flash").textContent = "Password is required.";
|
$("export-privkey-flash").textContent = "Password is required.";
|
||||||
$("export-privkey-flash").style.visibility = "visible";
|
$("export-privkey-flash").classList.remove("hidden");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
const btn = $("btn-export-privkey-confirm");
|
const btn = $("btn-export-privkey-confirm");
|
||||||
@@ -366,10 +350,10 @@ function init(_ctx) {
|
|||||||
$("export-privkey-password-section").classList.add("hidden");
|
$("export-privkey-password-section").classList.add("hidden");
|
||||||
$("export-privkey-value").textContent = privateKey;
|
$("export-privkey-value").textContent = privateKey;
|
||||||
$("export-privkey-result").classList.remove("hidden");
|
$("export-privkey-result").classList.remove("hidden");
|
||||||
$("export-privkey-flash").style.visibility = "hidden";
|
$("export-privkey-flash").classList.add("hidden");
|
||||||
} catch {
|
} catch {
|
||||||
$("export-privkey-flash").textContent = "Wrong password.";
|
$("export-privkey-flash").textContent = "Wrong password.";
|
||||||
$("export-privkey-flash").style.visibility = "visible";
|
$("export-privkey-flash").classList.remove("hidden");
|
||||||
} finally {
|
} finally {
|
||||||
btn.disabled = false;
|
btn.disabled = false;
|
||||||
btn.classList.remove("text-muted");
|
btn.classList.remove("text-muted");
|
||||||
|
|||||||
@@ -48,39 +48,23 @@ function etherscanAddressLink(address) {
|
|||||||
function isoDate(timestamp) {
|
function isoDate(timestamp) {
|
||||||
const d = new Date(timestamp * 1000);
|
const d = new Date(timestamp * 1000);
|
||||||
const pad = (n) => String(n).padStart(2, "0");
|
const pad = (n) => String(n).padStart(2, "0");
|
||||||
if (state.utcTimestamps) {
|
const off = -d.getTimezoneOffset();
|
||||||
return (
|
const sign = off >= 0 ? "+" : "-";
|
||||||
d.getUTCFullYear() +
|
const absOff = Math.abs(off);
|
||||||
"-" +
|
const tz = sign + pad(Math.floor(absOff / 60)) + ":" + pad(absOff % 60);
|
||||||
pad(d.getUTCMonth() + 1) +
|
|
||||||
"-" +
|
|
||||||
pad(d.getUTCDate()) +
|
|
||||||
"T" +
|
|
||||||
pad(d.getUTCHours()) +
|
|
||||||
":" +
|
|
||||||
pad(d.getUTCMinutes()) +
|
|
||||||
":" +
|
|
||||||
pad(d.getUTCSeconds()) +
|
|
||||||
"Z"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
const offsetMin = -d.getTimezoneOffset();
|
|
||||||
const sign = offsetMin >= 0 ? "+" : "-";
|
|
||||||
const absOff = Math.abs(offsetMin);
|
|
||||||
const tzStr = sign + pad(Math.floor(absOff / 60)) + ":" + pad(absOff % 60);
|
|
||||||
return (
|
return (
|
||||||
d.getFullYear() +
|
d.getFullYear() +
|
||||||
"-" +
|
"-" +
|
||||||
pad(d.getMonth() + 1) +
|
pad(d.getMonth() + 1) +
|
||||||
"-" +
|
"-" +
|
||||||
pad(d.getDate()) +
|
pad(d.getDate()) +
|
||||||
"T" +
|
" " +
|
||||||
pad(d.getHours()) +
|
pad(d.getHours()) +
|
||||||
":" +
|
":" +
|
||||||
pad(d.getMinutes()) +
|
pad(d.getMinutes()) +
|
||||||
":" +
|
":" +
|
||||||
pad(d.getSeconds()) +
|
pad(d.getSeconds()) +
|
||||||
tzStr
|
tz
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -13,6 +13,7 @@ const { ERC20_ABI } = require("../../shared/constants");
|
|||||||
const { TOKEN_BY_ADDRESS } = require("../../shared/tokenList");
|
const { TOKEN_BY_ADDRESS } = require("../../shared/tokenList");
|
||||||
const txStatus = require("./txStatus");
|
const txStatus = require("./txStatus");
|
||||||
const uniswap = require("../../shared/uniswap");
|
const uniswap = require("../../shared/uniswap");
|
||||||
|
|
||||||
const runtime =
|
const runtime =
|
||||||
typeof browser !== "undefined" ? browser.runtime : chrome.runtime;
|
typeof browser !== "undefined" ? browser.runtime : chrome.runtime;
|
||||||
|
|
||||||
@@ -154,24 +155,7 @@ function decodeCalldata(data, toAddress) {
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
function showPhishingWarning(elementId, isPhishing) {
|
|
||||||
const el = $(elementId);
|
|
||||||
if (!el) return;
|
|
||||||
// The background script performs the authoritative phishing domain check
|
|
||||||
// and passes the result via the isPhishingDomain flag.
|
|
||||||
if (isPhishing) {
|
|
||||||
el.classList.remove("hidden");
|
|
||||||
} else {
|
|
||||||
el.classList.add("hidden");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
function showTxApproval(details) {
|
function showTxApproval(details) {
|
||||||
showPhishingWarning(
|
|
||||||
"approve-tx-phishing-warning",
|
|
||||||
details.isPhishingDomain,
|
|
||||||
);
|
|
||||||
|
|
||||||
const toAddr = details.txParams.to;
|
const toAddr = details.txParams.to;
|
||||||
const token = toAddr ? TOKEN_BY_ADDRESS.get(toAddr.toLowerCase()) : null;
|
const token = toAddr ? TOKEN_BY_ADDRESS.get(toAddr.toLowerCase()) : null;
|
||||||
const ethValue = formatEther(details.txParams.value || "0");
|
const ethValue = formatEther(details.txParams.value || "0");
|
||||||
@@ -285,7 +269,7 @@ function showTxApproval(details) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
$("approve-tx-password").value = "";
|
$("approve-tx-password").value = "";
|
||||||
hideError("approve-tx-error");
|
$("approve-tx-error").classList.add("hidden");
|
||||||
|
|
||||||
showView("approve-tx");
|
showView("approve-tx");
|
||||||
}
|
}
|
||||||
@@ -339,11 +323,6 @@ function formatTypedDataHtml(jsonStr) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function showSignApproval(details) {
|
function showSignApproval(details) {
|
||||||
showPhishingWarning(
|
|
||||||
"approve-sign-phishing-warning",
|
|
||||||
details.isPhishingDomain,
|
|
||||||
);
|
|
||||||
|
|
||||||
const sp = details.signParams;
|
const sp = details.signParams;
|
||||||
|
|
||||||
$("approve-sign-hostname").textContent = details.hostname;
|
$("approve-sign-hostname").textContent = details.hostname;
|
||||||
@@ -372,10 +351,10 @@ function showSignApproval(details) {
|
|||||||
if (warningEl) {
|
if (warningEl) {
|
||||||
if (sp.dangerWarning) {
|
if (sp.dangerWarning) {
|
||||||
warningEl.textContent = sp.dangerWarning;
|
warningEl.textContent = sp.dangerWarning;
|
||||||
warningEl.style.visibility = "visible";
|
warningEl.classList.remove("hidden");
|
||||||
} else {
|
} else {
|
||||||
warningEl.textContent = "";
|
warningEl.textContent = "";
|
||||||
warningEl.style.visibility = "hidden";
|
warningEl.classList.add("hidden");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -403,11 +382,6 @@ function show(id) {
|
|||||||
showSignApproval(details);
|
showSignApproval(details);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
// Site connection approval
|
|
||||||
showPhishingWarning(
|
|
||||||
"approve-site-phishing-warning",
|
|
||||||
details.isPhishingDomain,
|
|
||||||
);
|
|
||||||
$("approve-hostname").textContent = details.hostname;
|
$("approve-hostname").textContent = details.hostname;
|
||||||
$("approve-address").innerHTML = approvalAddressHtml(
|
$("approve-address").innerHTML = approvalAddressHtml(
|
||||||
state.activeAddress,
|
state.activeAddress,
|
||||||
|
|||||||
@@ -25,11 +25,8 @@ const { getSignerForAddress } = require("../../shared/wallet");
|
|||||||
const { decryptWithPassword } = require("../../shared/vault");
|
const { decryptWithPassword } = require("../../shared/vault");
|
||||||
const { formatUsd, getPrice } = require("../../shared/prices");
|
const { formatUsd, getPrice } = require("../../shared/prices");
|
||||||
const { getProvider } = require("../../shared/balances");
|
const { getProvider } = require("../../shared/balances");
|
||||||
const {
|
const { isScamAddress } = require("../../shared/scamlist");
|
||||||
getLocalWarnings,
|
const { ERC20_ABI } = require("../../shared/constants");
|
||||||
getFullWarnings,
|
|
||||||
} = require("../../shared/addressWarnings");
|
|
||||||
const { ERC20_ABI, isBurnAddress } = require("../../shared/constants");
|
|
||||||
const { log } = require("../../shared/log");
|
const { log } = require("../../shared/log");
|
||||||
const makeBlockie = require("ethereum-blockies-base64");
|
const makeBlockie = require("ethereum-blockies-base64");
|
||||||
const txStatus = require("./txStatus");
|
const txStatus = require("./txStatus");
|
||||||
@@ -170,23 +167,28 @@ function show(txInfo) {
|
|||||||
$("confirm-balance").textContent = valueWithUsd(bal + " ETH", balUsd);
|
$("confirm-balance").textContent = valueWithUsd(bal + " ETH", balUsd);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for warnings (synchronous local checks)
|
// Check for warnings
|
||||||
const localWarnings = getLocalWarnings(txInfo.to, {
|
const warnings = [];
|
||||||
fromAddress: txInfo.from,
|
if (isScamAddress(txInfo.to)) {
|
||||||
});
|
warnings.push(
|
||||||
|
"This address is on a known scam/fraud list. Do not send funds to this address.",
|
||||||
|
);
|
||||||
|
}
|
||||||
|
if (txInfo.to.toLowerCase() === txInfo.from.toLowerCase()) {
|
||||||
|
warnings.push("You are sending to your own address.");
|
||||||
|
}
|
||||||
|
|
||||||
const warningsEl = $("confirm-warnings");
|
const warningsEl = $("confirm-warnings");
|
||||||
if (localWarnings.length > 0) {
|
if (warnings.length > 0) {
|
||||||
warningsEl.innerHTML = localWarnings
|
warningsEl.innerHTML = warnings
|
||||||
.map(
|
.map(
|
||||||
(w) =>
|
(w) =>
|
||||||
`<div class="border border-border border-dashed p-2 mb-1 text-xs font-bold">WARNING: ${w.message}</div>`,
|
`<div class="border border-border border-dashed p-2 mb-1 text-xs font-bold">WARNING: ${w}</div>`,
|
||||||
)
|
)
|
||||||
.join("");
|
.join("");
|
||||||
warningsEl.style.visibility = "visible";
|
warningsEl.classList.remove("hidden");
|
||||||
} else {
|
} else {
|
||||||
warningsEl.innerHTML = "";
|
warningsEl.classList.add("hidden");
|
||||||
warningsEl.style.visibility = "hidden";
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for errors
|
// Check for errors
|
||||||
@@ -224,12 +226,11 @@ function show(txInfo) {
|
|||||||
errorsEl.innerHTML = errors
|
errorsEl.innerHTML = errors
|
||||||
.map((e) => `<div class="text-xs">${e}</div>`)
|
.map((e) => `<div class="text-xs">${e}</div>`)
|
||||||
.join("");
|
.join("");
|
||||||
errorsEl.style.visibility = "visible";
|
errorsEl.classList.remove("hidden");
|
||||||
sendBtn.disabled = true;
|
sendBtn.disabled = true;
|
||||||
sendBtn.classList.add("text-muted");
|
sendBtn.classList.add("text-muted");
|
||||||
} else {
|
} else {
|
||||||
errorsEl.innerHTML = "";
|
errorsEl.classList.add("hidden");
|
||||||
errorsEl.style.visibility = "hidden";
|
|
||||||
sendBtn.disabled = false;
|
sendBtn.disabled = false;
|
||||||
sendBtn.classList.remove("text-muted");
|
sendBtn.classList.remove("text-muted");
|
||||||
}
|
}
|
||||||
@@ -239,21 +240,13 @@ function show(txInfo) {
|
|||||||
hideError("confirm-tx-password-error");
|
hideError("confirm-tx-password-error");
|
||||||
|
|
||||||
// Gas estimate — show placeholder then fetch async
|
// Gas estimate — show placeholder then fetch async
|
||||||
$("confirm-fee").style.visibility = "visible";
|
$("confirm-fee").classList.remove("hidden");
|
||||||
$("confirm-fee-amount").textContent = "Estimating...";
|
$("confirm-fee-amount").textContent = "Estimating...";
|
||||||
state.viewData = { pendingTx: txInfo };
|
state.viewData = { pendingTx: txInfo };
|
||||||
showView("confirm-tx");
|
showView("confirm-tx");
|
||||||
|
|
||||||
// Reset async warnings to hidden (space always reserved, no layout shift)
|
// Reset recipient warning to hidden (space always reserved, no layout shift)
|
||||||
$("confirm-recipient-warning").style.visibility = "hidden";
|
$("confirm-recipient-warning").style.visibility = "hidden";
|
||||||
$("confirm-contract-warning").style.visibility = "hidden";
|
|
||||||
$("confirm-burn-warning").style.visibility = "hidden";
|
|
||||||
$("confirm-etherscan-warning").style.visibility = "hidden";
|
|
||||||
|
|
||||||
// Show burn warning via reserved element (in addition to inline warning)
|
|
||||||
if (isBurnAddress(txInfo.to)) {
|
|
||||||
$("confirm-burn-warning").style.visibility = "visible";
|
|
||||||
}
|
|
||||||
|
|
||||||
estimateGas(txInfo);
|
estimateGas(txInfo);
|
||||||
checkRecipientHistory(txInfo);
|
checkRecipientHistory(txInfo);
|
||||||
@@ -300,21 +293,19 @@ async function estimateGas(txInfo) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
async function checkRecipientHistory(txInfo) {
|
async function checkRecipientHistory(txInfo) {
|
||||||
|
const el = $("confirm-recipient-warning");
|
||||||
try {
|
try {
|
||||||
const provider = getProvider(state.rpcUrl);
|
const provider = getProvider(state.rpcUrl);
|
||||||
const asyncWarnings = await getFullWarnings(txInfo.to, provider, {
|
// Skip warning for contract addresses — they may legitimately
|
||||||
fromAddress: txInfo.from,
|
// have zero outgoing transactions (getTransactionCount returns
|
||||||
});
|
// the nonce, i.e. sent-tx count only).
|
||||||
for (const w of asyncWarnings) {
|
const code = await provider.getCode(txInfo.to);
|
||||||
if (w.type === "contract") {
|
if (code && code !== "0x") {
|
||||||
$("confirm-contract-warning").style.visibility = "visible";
|
return;
|
||||||
}
|
}
|
||||||
if (w.type === "new-address") {
|
const txCount = await provider.getTransactionCount(txInfo.to);
|
||||||
$("confirm-recipient-warning").style.visibility = "visible";
|
if (txCount === 0) {
|
||||||
}
|
el.style.visibility = "visible";
|
||||||
if (w.type === "etherscan-phishing") {
|
|
||||||
$("confirm-etherscan-warning").style.visibility = "visible";
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
log.errorf("recipient history check failed:", e.message);
|
log.errorf("recipient history check failed:", e.message);
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ function show(walletIdx) {
|
|||||||
wallet.name || "Wallet " + (walletIdx + 1);
|
wallet.name || "Wallet " + (walletIdx + 1);
|
||||||
$("delete-wallet-password").value = "";
|
$("delete-wallet-password").value = "";
|
||||||
$("delete-wallet-flash").textContent = "";
|
$("delete-wallet-flash").textContent = "";
|
||||||
$("delete-wallet-flash").style.visibility = "hidden";
|
$("delete-wallet-flash").classList.add("hidden");
|
||||||
showView("delete-wallet-confirm");
|
showView("delete-wallet-confirm");
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -29,14 +29,14 @@ function init(_ctx) {
|
|||||||
if (!pw) {
|
if (!pw) {
|
||||||
$("delete-wallet-flash").textContent =
|
$("delete-wallet-flash").textContent =
|
||||||
"Please enter your password.";
|
"Please enter your password.";
|
||||||
$("delete-wallet-flash").style.visibility = "visible";
|
$("delete-wallet-flash").classList.remove("hidden");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (deleteWalletIndex === null) {
|
if (deleteWalletIndex === null) {
|
||||||
$("delete-wallet-flash").textContent =
|
$("delete-wallet-flash").textContent =
|
||||||
"No wallet selected for deletion.";
|
"No wallet selected for deletion.";
|
||||||
$("delete-wallet-flash").style.visibility = "visible";
|
$("delete-wallet-flash").classList.remove("hidden");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -52,7 +52,7 @@ function init(_ctx) {
|
|||||||
await decryptWithPassword(wallet.encryptedSecret, pw);
|
await decryptWithPassword(wallet.encryptedSecret, pw);
|
||||||
} catch (_e) {
|
} catch (_e) {
|
||||||
$("delete-wallet-flash").textContent = "Wrong password.";
|
$("delete-wallet-flash").textContent = "Wrong password.";
|
||||||
$("delete-wallet-flash").style.visibility = "visible";
|
$("delete-wallet-flash").classList.remove("hidden");
|
||||||
btn.disabled = false;
|
btn.disabled = false;
|
||||||
btn.classList.remove("text-muted");
|
btn.classList.remove("text-muted");
|
||||||
return;
|
return;
|
||||||
|
|||||||
@@ -40,13 +40,11 @@ function $(id) {
|
|||||||
function showError(id, msg) {
|
function showError(id, msg) {
|
||||||
const el = $(id);
|
const el = $(id);
|
||||||
el.textContent = msg;
|
el.textContent = msg;
|
||||||
el.style.visibility = "visible";
|
el.classList.remove("hidden");
|
||||||
}
|
}
|
||||||
|
|
||||||
function hideError(id) {
|
function hideError(id) {
|
||||||
const el = $(id);
|
$(id).classList.add("hidden");
|
||||||
el.textContent = "";
|
|
||||||
el.style.visibility = "hidden";
|
|
||||||
}
|
}
|
||||||
|
|
||||||
function showView(name) {
|
function showView(name) {
|
||||||
@@ -228,39 +226,23 @@ function formatAddressHtml(address, ensName, maxLen, title) {
|
|||||||
function isoDate(timestamp) {
|
function isoDate(timestamp) {
|
||||||
const d = new Date(timestamp * 1000);
|
const d = new Date(timestamp * 1000);
|
||||||
const pad = (n) => String(n).padStart(2, "0");
|
const pad = (n) => String(n).padStart(2, "0");
|
||||||
if (state.utcTimestamps) {
|
const off = -d.getTimezoneOffset();
|
||||||
return (
|
const sign = off >= 0 ? "+" : "-";
|
||||||
d.getUTCFullYear() +
|
const absOff = Math.abs(off);
|
||||||
"-" +
|
const tz = sign + pad(Math.floor(absOff / 60)) + ":" + pad(absOff % 60);
|
||||||
pad(d.getUTCMonth() + 1) +
|
|
||||||
"-" +
|
|
||||||
pad(d.getUTCDate()) +
|
|
||||||
"T" +
|
|
||||||
pad(d.getUTCHours()) +
|
|
||||||
":" +
|
|
||||||
pad(d.getUTCMinutes()) +
|
|
||||||
":" +
|
|
||||||
pad(d.getUTCSeconds()) +
|
|
||||||
"Z"
|
|
||||||
);
|
|
||||||
}
|
|
||||||
const offsetMin = -d.getTimezoneOffset();
|
|
||||||
const sign = offsetMin >= 0 ? "+" : "-";
|
|
||||||
const absOff = Math.abs(offsetMin);
|
|
||||||
const tzStr = sign + pad(Math.floor(absOff / 60)) + ":" + pad(absOff % 60);
|
|
||||||
return (
|
return (
|
||||||
d.getFullYear() +
|
d.getFullYear() +
|
||||||
"-" +
|
"-" +
|
||||||
pad(d.getMonth() + 1) +
|
pad(d.getMonth() + 1) +
|
||||||
"-" +
|
"-" +
|
||||||
pad(d.getDate()) +
|
pad(d.getDate()) +
|
||||||
"T" +
|
" " +
|
||||||
pad(d.getHours()) +
|
pad(d.getHours()) +
|
||||||
":" +
|
":" +
|
||||||
pad(d.getMinutes()) +
|
pad(d.getMinutes()) +
|
||||||
":" +
|
":" +
|
||||||
pad(d.getSeconds()) +
|
pad(d.getSeconds()) +
|
||||||
tzStr
|
tz
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -290,8 +272,8 @@ function flashCopyFeedback(el) {
|
|||||||
el.classList.add("copy-flash-fade");
|
el.classList.add("copy-flash-fade");
|
||||||
setTimeout(() => {
|
setTimeout(() => {
|
||||||
el.classList.remove("copy-flash-fade");
|
el.classList.remove("copy-flash-fade");
|
||||||
}, 275);
|
}, 350);
|
||||||
}, 75);
|
}, 100);
|
||||||
}
|
}
|
||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
|
|||||||
@@ -53,10 +53,9 @@ function show() {
|
|||||||
"This is an ERC-20 token. Only send " +
|
"This is an ERC-20 token. Only send " +
|
||||||
symbol +
|
symbol +
|
||||||
" on the Ethereum network to this address. Sending tokens on other networks will result in permanent loss.";
|
" on the Ethereum network to this address. Sending tokens on other networks will result in permanent loss.";
|
||||||
warningEl.style.visibility = "visible";
|
warningEl.classList.remove("hidden");
|
||||||
} else {
|
} else {
|
||||||
warningEl.textContent = "";
|
warningEl.classList.add("hidden");
|
||||||
warningEl.style.visibility = "hidden";
|
|
||||||
}
|
}
|
||||||
showView("receive");
|
showView("receive");
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,5 +1,4 @@
|
|||||||
const { $, showView, showFlash, escapeHtml } = require("./helpers");
|
const { $, showView, showFlash, escapeHtml } = require("./helpers");
|
||||||
const { applyTheme } = require("../theme");
|
|
||||||
const { state, saveState } = require("../../shared/state");
|
const { state, saveState } = require("../../shared/state");
|
||||||
const { ETHEREUM_MAINNET_CHAIN_ID } = require("../../shared/constants");
|
const { ETHEREUM_MAINNET_CHAIN_ID } = require("../../shared/constants");
|
||||||
const { log, debugFetch } = require("../../shared/log");
|
const { log, debugFetch } = require("../../shared/log");
|
||||||
@@ -215,13 +214,6 @@ function init(ctx) {
|
|||||||
await saveState();
|
await saveState();
|
||||||
});
|
});
|
||||||
|
|
||||||
$("settings-theme").value = state.theme;
|
|
||||||
$("settings-theme").addEventListener("change", async () => {
|
|
||||||
state.theme = $("settings-theme").value;
|
|
||||||
await saveState();
|
|
||||||
applyTheme(state.theme);
|
|
||||||
});
|
|
||||||
|
|
||||||
$("settings-hide-low-holders").checked = state.hideLowHolderTokens;
|
$("settings-hide-low-holders").checked = state.hideLowHolderTokens;
|
||||||
$("settings-hide-low-holders").addEventListener("change", async () => {
|
$("settings-hide-low-holders").addEventListener("change", async () => {
|
||||||
state.hideLowHolderTokens = $("settings-hide-low-holders").checked;
|
state.hideLowHolderTokens = $("settings-hide-low-holders").checked;
|
||||||
@@ -249,12 +241,6 @@ function init(ctx) {
|
|||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
$("settings-utc-timestamps").checked = state.utcTimestamps;
|
|
||||||
$("settings-utc-timestamps").addEventListener("change", async () => {
|
|
||||||
state.utcTimestamps = $("settings-utc-timestamps").checked;
|
|
||||||
await saveState();
|
|
||||||
});
|
|
||||||
|
|
||||||
$("btn-main-add-wallet").addEventListener("click", ctx.showAddWalletView);
|
$("btn-main-add-wallet").addEventListener("click", ctx.showAddWalletView);
|
||||||
|
|
||||||
$("btn-settings-add-token").addEventListener(
|
$("btn-settings-add-token").addEventListener(
|
||||||
|
|||||||
@@ -73,8 +73,7 @@ function renderDropdown() {
|
|||||||
|
|
||||||
function show() {
|
function show() {
|
||||||
$("settings-addtoken-address").value = "";
|
$("settings-addtoken-address").value = "";
|
||||||
$("settings-addtoken-info").textContent = "";
|
$("settings-addtoken-info").classList.add("hidden");
|
||||||
$("settings-addtoken-info").style.visibility = "hidden";
|
|
||||||
renderTop10();
|
renderTop10();
|
||||||
renderDropdown();
|
renderDropdown();
|
||||||
showView("settings-addtoken");
|
showView("settings-addtoken");
|
||||||
@@ -130,7 +129,7 @@ function init(_ctx) {
|
|||||||
}
|
}
|
||||||
const infoEl = $("settings-addtoken-info");
|
const infoEl = $("settings-addtoken-info");
|
||||||
infoEl.textContent = "Looking up token...";
|
infoEl.textContent = "Looking up token...";
|
||||||
infoEl.style.visibility = "visible";
|
infoEl.classList.remove("hidden");
|
||||||
log.debugf("Looking up token contract", addr);
|
log.debugf("Looking up token contract", addr);
|
||||||
try {
|
try {
|
||||||
const info = await lookupTokenInfo(addr, state.rpcUrl);
|
const info = await lookupTokenInfo(addr, state.rpcUrl);
|
||||||
@@ -144,8 +143,7 @@ function init(_ctx) {
|
|||||||
await saveState();
|
await saveState();
|
||||||
showFlash("Added " + info.symbol);
|
showFlash("Added " + info.symbol);
|
||||||
$("settings-addtoken-address").value = "";
|
$("settings-addtoken-address").value = "";
|
||||||
infoEl.textContent = "";
|
infoEl.classList.add("hidden");
|
||||||
infoEl.style.visibility = "hidden";
|
|
||||||
renderTop10();
|
renderTop10();
|
||||||
renderDropdown();
|
renderDropdown();
|
||||||
ctx.doRefreshAndRender();
|
ctx.doRefreshAndRender();
|
||||||
@@ -153,8 +151,7 @@ function init(_ctx) {
|
|||||||
const detail = e.shortMessage || e.message || String(e);
|
const detail = e.shortMessage || e.message || String(e);
|
||||||
log.errorf("Token lookup failed for", addr, detail);
|
log.errorf("Token lookup failed for", addr, detail);
|
||||||
showFlash(detail);
|
showFlash(detail);
|
||||||
infoEl.textContent = "";
|
infoEl.classList.add("hidden");
|
||||||
infoEl.style.visibility = "hidden";
|
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -13,7 +13,6 @@ const {
|
|||||||
timeAgo,
|
timeAgo,
|
||||||
} = require("./helpers");
|
} = require("./helpers");
|
||||||
const { state } = require("../../shared/state");
|
const { state } = require("../../shared/state");
|
||||||
const { formatEther, formatUnits } = require("ethers");
|
|
||||||
const makeBlockie = require("ethereum-blockies-base64");
|
const makeBlockie = require("ethereum-blockies-base64");
|
||||||
const { log, debugFetch } = require("../../shared/log");
|
const { log, debugFetch } = require("../../shared/log");
|
||||||
const { decodeCalldata } = require("./approval");
|
const { decodeCalldata } = require("./approval");
|
||||||
@@ -27,25 +26,6 @@ const EXT_ICON =
|
|||||||
|
|
||||||
let ctx;
|
let ctx;
|
||||||
|
|
||||||
/**
|
|
||||||
* Determine a human-readable transaction type string from tx fields.
|
|
||||||
*/
|
|
||||||
function getTransactionType(tx) {
|
|
||||||
if (!tx.to) return "Contract Creation";
|
|
||||||
if (tx.direction === "contract") {
|
|
||||||
if (tx.directionLabel === "Swap") return "Swap";
|
|
||||||
if (
|
|
||||||
tx.method === "approve" ||
|
|
||||||
tx.directionLabel === "Approve" ||
|
|
||||||
tx.method === "setApprovalForAll"
|
|
||||||
)
|
|
||||||
return "Token Approval";
|
|
||||||
return "Contract Call";
|
|
||||||
}
|
|
||||||
if (tx.symbol && tx.symbol !== "ETH") return "ERC-20 Token Transfer";
|
|
||||||
return "Native ETH Transfer";
|
|
||||||
}
|
|
||||||
|
|
||||||
function copyableHtml(text, extraClass) {
|
function copyableHtml(text, extraClass) {
|
||||||
const cls =
|
const cls =
|
||||||
"underline decoration-dashed cursor-pointer" +
|
"underline decoration-dashed cursor-pointer" +
|
||||||
@@ -119,7 +99,6 @@ function show(tx) {
|
|||||||
direction: tx.direction || null,
|
direction: tx.direction || null,
|
||||||
isContractCall: tx.isContractCall || false,
|
isContractCall: tx.isContractCall || false,
|
||||||
method: tx.method || null,
|
method: tx.method || null,
|
||||||
contractAddress: tx.contractAddress || null,
|
|
||||||
},
|
},
|
||||||
};
|
};
|
||||||
render();
|
render();
|
||||||
@@ -156,54 +135,30 @@ function render() {
|
|||||||
nativeEl.parentElement.classList.add("hidden");
|
nativeEl.parentElement.classList.add("hidden");
|
||||||
}
|
}
|
||||||
|
|
||||||
// Always show transaction type as the first field
|
// Show type label for contract interactions (Swap, Execute, etc.)
|
||||||
const typeSection = $("tx-detail-type-section");
|
const typeSection = $("tx-detail-type-section");
|
||||||
const typeEl = $("tx-detail-type");
|
const typeEl = $("tx-detail-type");
|
||||||
const headingEl = $("tx-detail-heading");
|
const headingEl = $("tx-detail-heading");
|
||||||
if (typeSection && typeEl) {
|
if (tx.direction === "contract" && tx.directionLabel) {
|
||||||
typeEl.textContent = getTransactionType(tx);
|
if (typeSection) {
|
||||||
typeSection.classList.remove("hidden");
|
typeEl.textContent = tx.directionLabel;
|
||||||
|
typeSection.classList.remove("hidden");
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (typeSection) typeSection.classList.add("hidden");
|
||||||
}
|
}
|
||||||
if (headingEl) headingEl.textContent = "Transaction";
|
if (headingEl) headingEl.textContent = "Transaction";
|
||||||
|
|
||||||
// Token contract address (for ERC-20 transfers)
|
// Hide calldata and raw data sections; re-fetch if this is a contract call
|
||||||
const tokenContractSection = $("tx-detail-token-contract-section");
|
|
||||||
const tokenContractEl = $("tx-detail-token-contract");
|
|
||||||
if (tokenContractSection && tokenContractEl) {
|
|
||||||
if (tx.contractAddress) {
|
|
||||||
const dot = addressDotHtml(tx.contractAddress);
|
|
||||||
const link = `https://etherscan.io/token/${tx.contractAddress}`;
|
|
||||||
tokenContractEl.innerHTML =
|
|
||||||
`<div class="flex items-center">${dot}` +
|
|
||||||
copyableHtml(tx.contractAddress, "break-all") +
|
|
||||||
etherscanLinkHtml(link) +
|
|
||||||
`</div>`;
|
|
||||||
tokenContractSection.classList.remove("hidden");
|
|
||||||
} else {
|
|
||||||
tokenContractSection.classList.add("hidden");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Hide calldata and raw data sections; always fetch full tx details
|
|
||||||
const calldataSection = $("tx-detail-calldata-section");
|
const calldataSection = $("tx-detail-calldata-section");
|
||||||
if (calldataSection) calldataSection.classList.add("hidden");
|
if (calldataSection) calldataSection.classList.add("hidden");
|
||||||
const rawDataSection = $("tx-detail-rawdata-section");
|
const rawDataSection = $("tx-detail-rawdata-section");
|
||||||
if (rawDataSection) rawDataSection.classList.add("hidden");
|
if (rawDataSection) rawDataSection.classList.add("hidden");
|
||||||
|
|
||||||
// Hide on-chain detail sections until populated
|
if (tx.isContractCall || tx.direction === "contract") {
|
||||||
for (const id of [
|
loadCalldata(tx.hash, tx.to);
|
||||||
"tx-detail-block-section",
|
|
||||||
"tx-detail-nonce-section",
|
|
||||||
"tx-detail-fee-section",
|
|
||||||
"tx-detail-gasprice-section",
|
|
||||||
"tx-detail-gasused-section",
|
|
||||||
]) {
|
|
||||||
const el = $(id);
|
|
||||||
if (el) el.classList.add("hidden");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
loadFullTxDetails(tx.hash, tx.to, tx.isContractCall);
|
|
||||||
|
|
||||||
const isoStr = isoDate(tx.timestamp);
|
const isoStr = isoDate(tx.timestamp);
|
||||||
$("tx-detail-time").innerHTML =
|
$("tx-detail-time").innerHTML =
|
||||||
copyableHtml(isoStr) + " (" + escapeHtml(timeAgo(tx.timestamp)) + ")";
|
copyableHtml(isoStr) + " (" + escapeHtml(timeAgo(tx.timestamp)) + ")";
|
||||||
@@ -222,90 +177,7 @@ function render() {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
function showDetailField(sectionId, contentId, value) {
|
async function loadCalldata(txHash, toAddress) {
|
||||||
const section = $(sectionId);
|
|
||||||
const el = $(contentId);
|
|
||||||
if (!section || !el) return;
|
|
||||||
el.innerHTML = copyableHtml(value, "");
|
|
||||||
section.classList.remove("hidden");
|
|
||||||
}
|
|
||||||
|
|
||||||
function populateOnChainDetails(txData) {
|
|
||||||
// Block number
|
|
||||||
if (txData.block_number != null) {
|
|
||||||
const blockLink = `https://etherscan.io/block/${txData.block_number}`;
|
|
||||||
const blockSection = $("tx-detail-block-section");
|
|
||||||
const blockEl = $("tx-detail-block");
|
|
||||||
if (blockSection && blockEl) {
|
|
||||||
blockEl.innerHTML =
|
|
||||||
copyableHtml(String(txData.block_number), "") +
|
|
||||||
etherscanLinkHtml(blockLink);
|
|
||||||
blockSection.classList.remove("hidden");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Nonce
|
|
||||||
if (txData.nonce != null) {
|
|
||||||
showDetailField(
|
|
||||||
"tx-detail-nonce-section",
|
|
||||||
"tx-detail-nonce",
|
|
||||||
String(txData.nonce),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Transaction fee
|
|
||||||
const feeWei = txData.fee?.value || txData.tx_fee;
|
|
||||||
if (feeWei) {
|
|
||||||
const feeEth = formatEther(String(feeWei));
|
|
||||||
showDetailField(
|
|
||||||
"tx-detail-fee-section",
|
|
||||||
"tx-detail-fee",
|
|
||||||
feeEth + " ETH",
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Gas price
|
|
||||||
const gasPrice = txData.gas_price;
|
|
||||||
if (gasPrice) {
|
|
||||||
const gwei = formatUnits(String(gasPrice), "gwei");
|
|
||||||
showDetailField(
|
|
||||||
"tx-detail-gasprice-section",
|
|
||||||
"tx-detail-gasprice",
|
|
||||||
gwei + " Gwei",
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Gas used
|
|
||||||
const gasUsed = txData.gas_used;
|
|
||||||
if (gasUsed) {
|
|
||||||
showDetailField(
|
|
||||||
"tx-detail-gasused-section",
|
|
||||||
"tx-detail-gasused",
|
|
||||||
String(gasUsed),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Bind copy handlers for newly added elements
|
|
||||||
for (const id of [
|
|
||||||
"tx-detail-block-section",
|
|
||||||
"tx-detail-nonce-section",
|
|
||||||
"tx-detail-fee-section",
|
|
||||||
"tx-detail-gasprice-section",
|
|
||||||
"tx-detail-gasused-section",
|
|
||||||
]) {
|
|
||||||
const section = $(id);
|
|
||||||
if (!section) continue;
|
|
||||||
section.querySelectorAll("[data-copy]").forEach((el) => {
|
|
||||||
el.onclick = () => {
|
|
||||||
navigator.clipboard.writeText(el.dataset.copy);
|
|
||||||
showFlash("Copied!");
|
|
||||||
flashCopyFeedback(el);
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async function loadFullTxDetails(txHash, toAddress, isContractCall) {
|
|
||||||
const section = $("tx-detail-calldata-section");
|
const section = $("tx-detail-calldata-section");
|
||||||
const actionEl = $("tx-detail-calldata-action");
|
const actionEl = $("tx-detail-calldata-action");
|
||||||
const detailsEl = $("tx-detail-calldata-details");
|
const detailsEl = $("tx-detail-calldata-details");
|
||||||
@@ -320,10 +192,6 @@ async function loadFullTxDetails(txHash, toAddress, isContractCall) {
|
|||||||
);
|
);
|
||||||
if (!resp.ok) return;
|
if (!resp.ok) return;
|
||||||
const txData = await resp.json();
|
const txData = await resp.json();
|
||||||
|
|
||||||
// Populate on-chain detail fields (block, nonce, gas, fee)
|
|
||||||
populateOnChainDetails(txData);
|
|
||||||
|
|
||||||
const inputData = txData.raw_input || txData.input || null;
|
const inputData = txData.raw_input || txData.input || null;
|
||||||
if (!inputData || inputData === "0x") return;
|
if (!inputData || inputData === "0x") return;
|
||||||
|
|
||||||
|
|||||||
@@ -1,114 +0,0 @@
|
|||||||
// Address warning module.
|
|
||||||
// Provides local and async (RPC-based) warning checks for Ethereum addresses.
|
|
||||||
// Returns arrays of {type, message, severity} objects.
|
|
||||||
|
|
||||||
const { isScamAddress } = require("./scamlist");
|
|
||||||
const { isBurnAddress } = require("./constants");
|
|
||||||
const { checkEtherscanLabel } = require("./etherscanLabels");
|
|
||||||
const { log } = require("./log");
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Check an address against local-only lists (scam, burn, self-send).
|
|
||||||
* Synchronous — no network calls.
|
|
||||||
*
|
|
||||||
* @param {string} address - The target address to check.
|
|
||||||
* @param {object} [options] - Optional context.
|
|
||||||
* @param {string} [options.fromAddress] - Sender address (for self-send check).
|
|
||||||
* @returns {Array<{type: string, message: string, severity: string}>}
|
|
||||||
*/
|
|
||||||
function getLocalWarnings(address, options = {}) {
|
|
||||||
const warnings = [];
|
|
||||||
const addr = address.toLowerCase();
|
|
||||||
|
|
||||||
if (isScamAddress(addr)) {
|
|
||||||
warnings.push({
|
|
||||||
type: "scam",
|
|
||||||
message:
|
|
||||||
"This address is on a known scam/fraud list. Do not send funds to this address.",
|
|
||||||
severity: "critical",
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
if (isBurnAddress(addr)) {
|
|
||||||
warnings.push({
|
|
||||||
type: "burn",
|
|
||||||
message:
|
|
||||||
"This is a known null/burn address. Funds sent here are permanently destroyed and cannot be recovered.",
|
|
||||||
severity: "critical",
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
if (options.fromAddress && addr === options.fromAddress.toLowerCase()) {
|
|
||||||
warnings.push({
|
|
||||||
type: "self-send",
|
|
||||||
message: "You are sending to your own address.",
|
|
||||||
severity: "warning",
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
return warnings;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Check an address against local lists AND via RPC queries.
|
|
||||||
* Async — performs network calls to check contract status and tx history.
|
|
||||||
*
|
|
||||||
* @param {string} address - The target address to check.
|
|
||||||
* @param {object} provider - An ethers.js provider instance.
|
|
||||||
* @param {object} [options] - Optional context.
|
|
||||||
* @param {string} [options.fromAddress] - Sender address (for self-send check).
|
|
||||||
* @returns {Promise<Array<{type: string, message: string, severity: string}>>}
|
|
||||||
*/
|
|
||||||
async function getFullWarnings(address, provider, options = {}) {
|
|
||||||
const warnings = getLocalWarnings(address, options);
|
|
||||||
|
|
||||||
let isContract = false;
|
|
||||||
try {
|
|
||||||
const code = await provider.getCode(address);
|
|
||||||
if (code && code !== "0x") {
|
|
||||||
isContract = true;
|
|
||||||
warnings.push({
|
|
||||||
type: "contract",
|
|
||||||
message:
|
|
||||||
"This address is a smart contract, not a regular wallet.",
|
|
||||||
severity: "warning",
|
|
||||||
});
|
|
||||||
}
|
|
||||||
} catch (e) {
|
|
||||||
log.errorf("contract check failed:", e.message);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Skip tx count check for contracts — they may legitimately have
|
|
||||||
// zero inbound EOA transactions.
|
|
||||||
if (!isContract) {
|
|
||||||
try {
|
|
||||||
const txCount = await provider.getTransactionCount(address);
|
|
||||||
if (txCount === 0) {
|
|
||||||
warnings.push({
|
|
||||||
type: "new-address",
|
|
||||||
message:
|
|
||||||
"This address has never sent a transaction. Double-check it is correct.",
|
|
||||||
severity: "info",
|
|
||||||
});
|
|
||||||
}
|
|
||||||
} catch (e) {
|
|
||||||
log.errorf("tx count check failed:", e.message);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Etherscan label check (best-effort async — network failures are silent).
|
|
||||||
// Runs for ALL addresses including contracts, since many dangerous
|
|
||||||
// flagged addresses on Etherscan (drainers, phishing contracts) are contracts.
|
|
||||||
try {
|
|
||||||
const etherscanWarning = await checkEtherscanLabel(address);
|
|
||||||
if (etherscanWarning) {
|
|
||||||
warnings.push(etherscanWarning);
|
|
||||||
}
|
|
||||||
} catch (e) {
|
|
||||||
log.errorf("etherscan label check failed:", e.message);
|
|
||||||
}
|
|
||||||
|
|
||||||
return warnings;
|
|
||||||
}
|
|
||||||
|
|
||||||
module.exports = { getLocalWarnings, getFullWarnings };
|
|
||||||
@@ -20,19 +20,6 @@ const ERC20_ABI = [
|
|||||||
"function approve(address spender, uint256 amount) returns (bool)",
|
"function approve(address spender, uint256 amount) returns (bool)",
|
||||||
];
|
];
|
||||||
|
|
||||||
// Known null/burn addresses that permanently destroy funds.
|
|
||||||
const BURN_ADDRESSES = new Set([
|
|
||||||
"0x0000000000000000000000000000000000000000",
|
|
||||||
"0x0000000000000000000000000000000000000001",
|
|
||||||
"0x000000000000000000000000000000000000dead",
|
|
||||||
"0xdead000000000000000000000000000000000000",
|
|
||||||
"0x00000000000000000000000000000000deadbeef",
|
|
||||||
]);
|
|
||||||
|
|
||||||
function isBurnAddress(address) {
|
|
||||||
return BURN_ADDRESSES.has(address.toLowerCase());
|
|
||||||
}
|
|
||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
DEBUG,
|
DEBUG,
|
||||||
DEBUG_MNEMONIC,
|
DEBUG_MNEMONIC,
|
||||||
@@ -41,6 +28,4 @@ module.exports = {
|
|||||||
DEFAULT_BLOCKSCOUT_URL,
|
DEFAULT_BLOCKSCOUT_URL,
|
||||||
BIP44_ETH_PATH,
|
BIP44_ETH_PATH,
|
||||||
ERC20_ABI,
|
ERC20_ABI,
|
||||||
BURN_ADDRESSES,
|
|
||||||
isBurnAddress,
|
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,102 +0,0 @@
|
|||||||
// Etherscan address label lookup via page scraping.
|
|
||||||
// Extension users make the requests directly to Etherscan — no proxy needed.
|
|
||||||
// This is a best-effort enrichment: network failures return null silently.
|
|
||||||
|
|
||||||
const ETHERSCAN_BASE = "https://etherscan.io/address/";
|
|
||||||
|
|
||||||
// Patterns in the page title that indicate a flagged address.
|
|
||||||
// Title format: "Fake_Phishing184810 | Address: 0x... | Etherscan"
|
|
||||||
const PHISHING_LABEL_PATTERNS = [/^Fake_Phishing/i, /^Phish:/i, /^Exploiter/i];
|
|
||||||
|
|
||||||
// Patterns in the page body that indicate a scam/phishing warning.
|
|
||||||
const SCAM_BODY_PATTERNS = [
|
|
||||||
/used in a\s+(?:\w+\s+)?phishing scam/i,
|
|
||||||
/used in a\s+(?:\w+\s+)?scam/i,
|
|
||||||
/wallet\s+drainer/i,
|
|
||||||
];
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Parse the Etherscan address page HTML to extract label info.
|
|
||||||
* Exported for unit testing (no fetch needed).
|
|
||||||
*
|
|
||||||
* @param {string} html - Raw HTML of the Etherscan address page.
|
|
||||||
* @returns {{ label: string|null, isPhishing: boolean, warning: string|null }}
|
|
||||||
*/
|
|
||||||
function parseEtherscanPage(html) {
|
|
||||||
// Extract <title> content
|
|
||||||
const titleMatch = html.match(/<title[^>]*>([^<]+)<\/title>/i);
|
|
||||||
let label = null;
|
|
||||||
let isPhishing = false;
|
|
||||||
let warning = null;
|
|
||||||
|
|
||||||
if (titleMatch) {
|
|
||||||
const title = titleMatch[1].trim();
|
|
||||||
// Title: "LABEL | Address: 0x... | Etherscan" or "Address: 0x... | Etherscan"
|
|
||||||
const labelMatch = title.match(/^(.+?)\s*\|\s*Address:/);
|
|
||||||
if (labelMatch) {
|
|
||||||
const candidate = labelMatch[1].trim();
|
|
||||||
// Only treat as a label if it's not just "Address" (unlabeled addresses)
|
|
||||||
if (candidate.toLowerCase() !== "address") {
|
|
||||||
label = candidate;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check label against phishing patterns
|
|
||||||
if (label) {
|
|
||||||
for (const pat of PHISHING_LABEL_PATTERNS) {
|
|
||||||
if (pat.test(label)) {
|
|
||||||
isPhishing = true;
|
|
||||||
warning = `Etherscan labels this address as "${label}" (Phish/Hack).`;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check page body for scam warning banners
|
|
||||||
if (!isPhishing) {
|
|
||||||
for (const pat of SCAM_BODY_PATTERNS) {
|
|
||||||
if (pat.test(html)) {
|
|
||||||
isPhishing = true;
|
|
||||||
warning = label
|
|
||||||
? `Etherscan labels this address as "${label}" and reports it was used in a scam.`
|
|
||||||
: "Etherscan reports this address was flagged for phishing/scam activity.";
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return { label, isPhishing, warning };
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Fetch an address page from Etherscan and check for scam/phishing labels.
|
|
||||||
* Returns a warning object if the address is flagged, or null.
|
|
||||||
* Network failures return null silently (best-effort check).
|
|
||||||
*
|
|
||||||
* @param {string} address - Ethereum address to check.
|
|
||||||
* @returns {Promise<{type: string, message: string, severity: string}|null>}
|
|
||||||
*/
|
|
||||||
async function checkEtherscanLabel(address) {
|
|
||||||
try {
|
|
||||||
const resp = await fetch(ETHERSCAN_BASE + address, {
|
|
||||||
headers: { Accept: "text/html" },
|
|
||||||
});
|
|
||||||
if (!resp.ok) return null;
|
|
||||||
const html = await resp.text();
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
if (result.isPhishing) {
|
|
||||||
return {
|
|
||||||
type: "etherscan-phishing",
|
|
||||||
message: result.warning,
|
|
||||||
severity: "critical",
|
|
||||||
};
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
} catch {
|
|
||||||
// Network errors are expected — Etherscan may rate-limit or block.
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
module.exports = { parseEtherscanPage, checkEtherscanLabel };
|
|
||||||
File diff suppressed because it is too large
Load Diff
@@ -1,238 +0,0 @@
|
|||||||
// Domain-based phishing detection using a vendored blocklist with delta updates.
|
|
||||||
//
|
|
||||||
// A community-maintained phishing domain blocklist is vendored in
|
|
||||||
// phishingBlocklist.json and bundled at build time. At runtime, we fetch
|
|
||||||
// the live list periodically and keep only the delta (new entries not in
|
|
||||||
// the vendored list) in memory. This keeps runtime memory usage small.
|
|
||||||
//
|
|
||||||
// The domain-checker checks the in-memory delta first (fresh/recent scam
|
|
||||||
// sites), then falls back to the vendored list.
|
|
||||||
//
|
|
||||||
// If the delta is under 256 KiB it is persisted to localStorage so it
|
|
||||||
// survives extension/service-worker restarts.
|
|
||||||
|
|
||||||
const vendoredConfig = require("./phishingBlocklist.json");
|
|
||||||
|
|
||||||
const BLOCKLIST_URL =
|
|
||||||
"https://raw.githubusercontent.com/MetaMask/eth-phishing-detect/main/src/config.json";
|
|
||||||
|
|
||||||
const CACHE_TTL_MS = 24 * 60 * 60 * 1000; // 24 hours
|
|
||||||
const REFRESH_INTERVAL_MS = 24 * 60 * 60 * 1000; // 24 hours
|
|
||||||
const DELTA_STORAGE_KEY = "phishing-delta";
|
|
||||||
const MAX_DELTA_BYTES = 256 * 1024; // 256 KiB
|
|
||||||
|
|
||||||
// Vendored sets — built once from the bundled JSON.
|
|
||||||
const vendoredBlacklist = new Set(
|
|
||||||
(vendoredConfig.blacklist || []).map((d) => d.toLowerCase()),
|
|
||||||
);
|
|
||||||
const vendoredWhitelist = new Set(
|
|
||||||
(vendoredConfig.whitelist || []).map((d) => d.toLowerCase()),
|
|
||||||
);
|
|
||||||
|
|
||||||
// Delta sets — only entries from live list that are NOT in vendored.
|
|
||||||
let deltaBlacklist = new Set();
|
|
||||||
let deltaWhitelist = new Set();
|
|
||||||
let lastFetchTime = 0;
|
|
||||||
let fetchPromise = null;
|
|
||||||
let refreshTimer = null;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Load delta entries from localStorage on startup.
|
|
||||||
* Called once during module initialization in the background script.
|
|
||||||
*/
|
|
||||||
function loadDeltaFromStorage() {
|
|
||||||
try {
|
|
||||||
const raw = localStorage.getItem(DELTA_STORAGE_KEY);
|
|
||||||
if (!raw) return;
|
|
||||||
const data = JSON.parse(raw);
|
|
||||||
if (data.blacklist && Array.isArray(data.blacklist)) {
|
|
||||||
deltaBlacklist = new Set(
|
|
||||||
data.blacklist.map((d) => d.toLowerCase()),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
if (data.whitelist && Array.isArray(data.whitelist)) {
|
|
||||||
deltaWhitelist = new Set(
|
|
||||||
data.whitelist.map((d) => d.toLowerCase()),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
} catch {
|
|
||||||
// localStorage unavailable or corrupt — start empty
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Persist delta to localStorage if it fits within MAX_DELTA_BYTES.
|
|
||||||
*/
|
|
||||||
function saveDeltaToStorage() {
|
|
||||||
try {
|
|
||||||
const data = {
|
|
||||||
blacklist: Array.from(deltaBlacklist),
|
|
||||||
whitelist: Array.from(deltaWhitelist),
|
|
||||||
};
|
|
||||||
const json = JSON.stringify(data);
|
|
||||||
if (json.length < MAX_DELTA_BYTES) {
|
|
||||||
localStorage.setItem(DELTA_STORAGE_KEY, json);
|
|
||||||
} else {
|
|
||||||
// Too large — remove stale key if present
|
|
||||||
localStorage.removeItem(DELTA_STORAGE_KEY);
|
|
||||||
}
|
|
||||||
} catch {
|
|
||||||
// localStorage unavailable — skip silently
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Load a pre-parsed config and compute the delta against the vendored list.
|
|
||||||
* Used for both live fetches and testing.
|
|
||||||
*
|
|
||||||
* @param {{ blacklist?: string[], whitelist?: string[] }} config
|
|
||||||
*/
|
|
||||||
function loadConfig(config) {
|
|
||||||
const liveBlacklist = (config.blacklist || []).map((d) => d.toLowerCase());
|
|
||||||
const liveWhitelist = (config.whitelist || []).map((d) => d.toLowerCase());
|
|
||||||
|
|
||||||
// Delta = entries in the live list that are NOT in the vendored list
|
|
||||||
deltaBlacklist = new Set(
|
|
||||||
liveBlacklist.filter((d) => !vendoredBlacklist.has(d)),
|
|
||||||
);
|
|
||||||
deltaWhitelist = new Set(
|
|
||||||
liveWhitelist.filter((d) => !vendoredWhitelist.has(d)),
|
|
||||||
);
|
|
||||||
|
|
||||||
lastFetchTime = Date.now();
|
|
||||||
saveDeltaToStorage();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Generate hostname variants for subdomain matching.
|
|
||||||
* "sub.evil.com" yields ["sub.evil.com", "evil.com"].
|
|
||||||
*
|
|
||||||
* @param {string} hostname
|
|
||||||
* @returns {string[]}
|
|
||||||
*/
|
|
||||||
function hostnameVariants(hostname) {
|
|
||||||
const h = hostname.toLowerCase();
|
|
||||||
const variants = [h];
|
|
||||||
const parts = h.split(".");
|
|
||||||
// Parent domains: a.b.c.d -> b.c.d, c.d
|
|
||||||
for (let i = 1; i < parts.length - 1; i++) {
|
|
||||||
variants.push(parts.slice(i).join("."));
|
|
||||||
}
|
|
||||||
return variants;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Check if a hostname is on the phishing blocklist.
|
|
||||||
* Checks delta first (fresh/recent scam sites), then vendored list.
|
|
||||||
* Whitelisted domains (delta + vendored) are never flagged.
|
|
||||||
*
|
|
||||||
* @param {string} hostname - The hostname to check.
|
|
||||||
* @returns {boolean}
|
|
||||||
*/
|
|
||||||
function isPhishingDomain(hostname) {
|
|
||||||
if (!hostname) return false;
|
|
||||||
const variants = hostnameVariants(hostname);
|
|
||||||
|
|
||||||
// Whitelist takes priority — check delta whitelist first, then vendored
|
|
||||||
for (const v of variants) {
|
|
||||||
if (deltaWhitelist.has(v) || vendoredWhitelist.has(v)) return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check delta blacklist first (fresh/recent scam sites), then vendored
|
|
||||||
for (const v of variants) {
|
|
||||||
if (deltaBlacklist.has(v) || vendoredBlacklist.has(v)) return true;
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Fetch the latest blocklist and compute delta against vendored data.
|
|
||||||
* De-duplicates concurrent fetches. Results are cached for CACHE_TTL_MS.
|
|
||||||
*
|
|
||||||
* @returns {Promise<void>}
|
|
||||||
*/
|
|
||||||
async function updatePhishingList() {
|
|
||||||
// Skip if recently fetched
|
|
||||||
if (Date.now() - lastFetchTime < CACHE_TTL_MS && lastFetchTime > 0) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// De-duplicate concurrent calls
|
|
||||||
if (fetchPromise) return fetchPromise;
|
|
||||||
|
|
||||||
fetchPromise = (async () => {
|
|
||||||
try {
|
|
||||||
const resp = await fetch(BLOCKLIST_URL);
|
|
||||||
if (!resp.ok) throw new Error("HTTP " + resp.status);
|
|
||||||
const config = await resp.json();
|
|
||||||
loadConfig(config);
|
|
||||||
} catch {
|
|
||||||
// Silently fail — vendored list still provides coverage.
|
|
||||||
// We'll retry next time.
|
|
||||||
} finally {
|
|
||||||
fetchPromise = null;
|
|
||||||
}
|
|
||||||
})();
|
|
||||||
|
|
||||||
return fetchPromise;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Start periodic refresh of the phishing list.
|
|
||||||
* Should be called once from the background script on startup.
|
|
||||||
*/
|
|
||||||
function startPeriodicRefresh() {
|
|
||||||
if (refreshTimer) return;
|
|
||||||
refreshTimer = setInterval(updatePhishingList, REFRESH_INTERVAL_MS);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the total blocklist size (vendored + delta) for diagnostics.
|
|
||||||
*
|
|
||||||
* @returns {number}
|
|
||||||
*/
|
|
||||||
function getBlocklistSize() {
|
|
||||||
return vendoredBlacklist.size + deltaBlacklist.size;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return the delta blocklist size for diagnostics.
|
|
||||||
*
|
|
||||||
* @returns {number}
|
|
||||||
*/
|
|
||||||
function getDeltaSize() {
|
|
||||||
return deltaBlacklist.size;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Reset internal state (for testing).
|
|
||||||
*/
|
|
||||||
function _reset() {
|
|
||||||
deltaBlacklist = new Set();
|
|
||||||
deltaWhitelist = new Set();
|
|
||||||
lastFetchTime = 0;
|
|
||||||
fetchPromise = null;
|
|
||||||
if (refreshTimer) {
|
|
||||||
clearInterval(refreshTimer);
|
|
||||||
refreshTimer = null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Load persisted delta on module initialization
|
|
||||||
loadDeltaFromStorage();
|
|
||||||
|
|
||||||
module.exports = {
|
|
||||||
isPhishingDomain,
|
|
||||||
updatePhishingList,
|
|
||||||
startPeriodicRefresh,
|
|
||||||
loadConfig,
|
|
||||||
getBlocklistSize,
|
|
||||||
getDeltaSize,
|
|
||||||
hostnameVariants,
|
|
||||||
_reset,
|
|
||||||
// Exposed for testing only
|
|
||||||
_getVendoredBlacklistSize: () => vendoredBlacklist.size,
|
|
||||||
_getVendoredWhitelistSize: () => vendoredWhitelist.size,
|
|
||||||
_getDeltaBlacklist: () => deltaBlacklist,
|
|
||||||
_getDeltaWhitelist: () => deltaWhitelist,
|
|
||||||
};
|
|
||||||
File diff suppressed because it is too large
Load Diff
@@ -23,10 +23,8 @@ const DEFAULT_STATE = {
|
|||||||
hideFraudContracts: true,
|
hideFraudContracts: true,
|
||||||
hideDustTransactions: true,
|
hideDustTransactions: true,
|
||||||
dustThresholdGwei: 100000,
|
dustThresholdGwei: 100000,
|
||||||
utcTimestamps: false,
|
|
||||||
fraudContracts: [],
|
fraudContracts: [],
|
||||||
tokenHolderCache: {},
|
tokenHolderCache: {},
|
||||||
theme: "system",
|
|
||||||
};
|
};
|
||||||
|
|
||||||
const state = {
|
const state = {
|
||||||
@@ -55,10 +53,8 @@ async function saveState() {
|
|||||||
hideFraudContracts: state.hideFraudContracts,
|
hideFraudContracts: state.hideFraudContracts,
|
||||||
hideDustTransactions: state.hideDustTransactions,
|
hideDustTransactions: state.hideDustTransactions,
|
||||||
dustThresholdGwei: state.dustThresholdGwei,
|
dustThresholdGwei: state.dustThresholdGwei,
|
||||||
utcTimestamps: state.utcTimestamps,
|
|
||||||
fraudContracts: state.fraudContracts,
|
fraudContracts: state.fraudContracts,
|
||||||
tokenHolderCache: state.tokenHolderCache,
|
tokenHolderCache: state.tokenHolderCache,
|
||||||
theme: state.theme,
|
|
||||||
currentView: state.currentView,
|
currentView: state.currentView,
|
||||||
selectedWallet: state.selectedWallet,
|
selectedWallet: state.selectedWallet,
|
||||||
selectedAddress: state.selectedAddress,
|
selectedAddress: state.selectedAddress,
|
||||||
@@ -112,11 +108,8 @@ async function loadState() {
|
|||||||
saved.dustThresholdGwei !== undefined
|
saved.dustThresholdGwei !== undefined
|
||||||
? saved.dustThresholdGwei
|
? saved.dustThresholdGwei
|
||||||
: 100000;
|
: 100000;
|
||||||
state.utcTimestamps =
|
|
||||||
saved.utcTimestamps !== undefined ? saved.utcTimestamps : false;
|
|
||||||
state.fraudContracts = saved.fraudContracts || [];
|
state.fraudContracts = saved.fraudContracts || [];
|
||||||
state.tokenHolderCache = saved.tokenHolderCache || {};
|
state.tokenHolderCache = saved.tokenHolderCache || {};
|
||||||
state.theme = saved.theme || "system";
|
|
||||||
state.currentView = saved.currentView || null;
|
state.currentView = saved.currentView || null;
|
||||||
state.selectedWallet =
|
state.selectedWallet =
|
||||||
saved.selectedWallet !== undefined ? saved.selectedWallet : null;
|
saved.selectedWallet !== undefined ? saved.selectedWallet : null;
|
||||||
|
|||||||
@@ -153,38 +153,24 @@ async function fetchRecentTransactions(address, blockscoutUrl, count = 25) {
|
|||||||
|
|
||||||
// When a token transfer shares a hash with a normal tx, the normal tx
|
// When a token transfer shares a hash with a normal tx, the normal tx
|
||||||
// is the contract call (0 ETH) and the token transfer has the real
|
// is the contract call (0 ETH) and the token transfer has the real
|
||||||
// amount and symbol. For contract calls (swaps), a single transaction
|
// amount and symbol. A single transaction (e.g. a swap) can produce
|
||||||
// can produce multiple token transfers (input, intermediates, output).
|
// multiple token transfers (one per token involved), so we key token
|
||||||
// We consolidate these into the original tx entry using the token
|
// transfers by hash + contract address to keep all of them. We also
|
||||||
// transfer where the user *receives* tokens (the swap output), so
|
// preserve contract-call metadata (direction, label, method) from the
|
||||||
// the transaction list shows the final result rather than confusing
|
// matching normal tx so swaps display correctly.
|
||||||
// intermediate hops. We preserve the original tx's from/to so the
|
|
||||||
// user sees their own address, not a router or Permit2 contract.
|
|
||||||
for (const tt of ttJson.items || []) {
|
for (const tt of ttJson.items || []) {
|
||||||
const parsed = parseTokenTransfer(tt, addrLower);
|
const parsed = parseTokenTransfer(tt, addrLower);
|
||||||
const existing = txsByHash.get(parsed.hash);
|
const existing = txsByHash.get(parsed.hash);
|
||||||
if (existing && existing.direction === "contract") {
|
if (existing && existing.direction === "contract") {
|
||||||
// For contract calls (swaps), consolidate into the original
|
parsed.direction = "contract";
|
||||||
// tx entry. Prefer the "received" transfer (swap output)
|
parsed.directionLabel = existing.directionLabel;
|
||||||
// for the display amount. If no received transfer exists,
|
parsed.isContractCall = true;
|
||||||
// fall back to the first "sent" transfer (swap input).
|
parsed.method = existing.method;
|
||||||
const isReceived = parsed.direction === "received";
|
// Remove the bare-hash normal tx so it doesn't appear as a
|
||||||
const needsAmount = !existing.exactValue;
|
// duplicate with empty value; token transfers replace it.
|
||||||
if (isReceived || needsAmount) {
|
txsByHash.delete(parsed.hash);
|
||||||
existing.value = parsed.value;
|
|
||||||
existing.exactValue = parsed.exactValue;
|
|
||||||
existing.rawAmount = parsed.rawAmount;
|
|
||||||
existing.rawUnit = parsed.rawUnit;
|
|
||||||
existing.symbol = parsed.symbol;
|
|
||||||
existing.contractAddress = parsed.contractAddress;
|
|
||||||
existing.holders = parsed.holders;
|
|
||||||
}
|
|
||||||
// Keep the original tx's from/to (the user's address and the
|
|
||||||
// contract they called), not the token transfer's from/to
|
|
||||||
// which may be a router or Permit2 contract.
|
|
||||||
continue;
|
|
||||||
}
|
}
|
||||||
// Non-contract token transfers get their own entries.
|
// Use composite key so multiple token transfers per tx are kept.
|
||||||
const ttKey = parsed.hash + ":" + (parsed.contractAddress || "");
|
const ttKey = parsed.hash + ":" + (parsed.contractAddress || "");
|
||||||
txsByHash.set(ttKey, parsed);
|
txsByHash.set(ttKey, parsed);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -359,12 +359,9 @@ function decode(data, toAddress) {
|
|||||||
const s = decodeV3SwapExactIn(inputs[i]);
|
const s = decodeV3SwapExactIn(inputs[i]);
|
||||||
if (s) {
|
if (s) {
|
||||||
if (!inputToken) inputToken = s.tokenIn;
|
if (!inputToken) inputToken = s.tokenIn;
|
||||||
|
if (!outputToken) outputToken = s.tokenOut;
|
||||||
if (!inputAmount) inputAmount = s.amountIn;
|
if (!inputAmount) inputAmount = s.amountIn;
|
||||||
// Always update output: in multi-step swaps (V3 → V4),
|
if (!minOutput) minOutput = s.amountOutMin;
|
||||||
// the last swap step determines the final output token
|
|
||||||
// and minimum received amount.
|
|
||||||
outputToken = s.tokenOut;
|
|
||||||
minOutput = s.amountOutMin;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -372,9 +369,9 @@ function decode(data, toAddress) {
|
|||||||
const s = decodeV2SwapExactIn(inputs[i]);
|
const s = decodeV2SwapExactIn(inputs[i]);
|
||||||
if (s) {
|
if (s) {
|
||||||
if (!inputToken) inputToken = s.tokenIn;
|
if (!inputToken) inputToken = s.tokenIn;
|
||||||
|
if (!outputToken) outputToken = s.tokenOut;
|
||||||
if (!inputAmount) inputAmount = s.amountIn;
|
if (!inputAmount) inputAmount = s.amountIn;
|
||||||
outputToken = s.tokenOut;
|
if (!minOutput) minOutput = s.amountOutMin;
|
||||||
minOutput = s.amountOutMin;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -391,11 +388,12 @@ function decode(data, toAddress) {
|
|||||||
const v4 = decodeV4Swap(inputs[i]);
|
const v4 = decodeV4Swap(inputs[i]);
|
||||||
if (v4) {
|
if (v4) {
|
||||||
if (!inputToken && v4.tokenIn) inputToken = v4.tokenIn;
|
if (!inputToken && v4.tokenIn) inputToken = v4.tokenIn;
|
||||||
|
if (!outputToken && v4.tokenOut)
|
||||||
|
outputToken = v4.tokenOut;
|
||||||
if (!inputAmount && v4.amountIn)
|
if (!inputAmount && v4.amountIn)
|
||||||
inputAmount = v4.amountIn;
|
inputAmount = v4.amountIn;
|
||||||
// Always update output: last swap step wins
|
if (!minOutput && v4.amountOutMin)
|
||||||
if (v4.tokenOut) outputToken = v4.tokenOut;
|
minOutput = v4.amountOutMin;
|
||||||
if (v4.amountOutMin) minOutput = v4.amountOutMin;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -489,7 +487,10 @@ function decode(data, toAddress) {
|
|||||||
const deadlineDate = new Date(Number(deadline) * 1000);
|
const deadlineDate = new Date(Number(deadline) * 1000);
|
||||||
details.push({
|
details.push({
|
||||||
label: "Deadline",
|
label: "Deadline",
|
||||||
value: deadlineDate.toISOString().replace("T", " ").slice(0, 19),
|
value: deadlineDate
|
||||||
|
.toISOString()
|
||||||
|
.replace("T", " ")
|
||||||
|
.replace(".000Z", "Z"),
|
||||||
});
|
});
|
||||||
|
|
||||||
return {
|
return {
|
||||||
|
|||||||
@@ -1,100 +0,0 @@
|
|||||||
const { parseEtherscanPage } = require("../src/shared/etherscanLabels");
|
|
||||||
|
|
||||||
describe("etherscanLabels", () => {
|
|
||||||
describe("parseEtherscanPage", () => {
|
|
||||||
test("detects Fake_Phishing label in title", () => {
|
|
||||||
const html = `<html><head><title>Fake_Phishing184810 | Address: 0x00000c07...3ea470000 | Etherscan</title></head><body></body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBe("Fake_Phishing184810");
|
|
||||||
expect(result.isPhishing).toBe(true);
|
|
||||||
expect(result.warning).toContain("Fake_Phishing184810");
|
|
||||||
expect(result.warning).toContain("Phish/Hack");
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects Fake_Phishing with different number", () => {
|
|
||||||
const html = `<html><head><title>Fake_Phishing5169 | Address: 0x3e0defb8...99a7a8a74 | Etherscan</title></head><body></body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBe("Fake_Phishing5169");
|
|
||||||
expect(result.isPhishing).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects Exploiter label", () => {
|
|
||||||
const html = `<html><head><title>Exploiter 42 | Address: 0xabcdef...1234 | Etherscan</title></head><body></body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBe("Exploiter 42");
|
|
||||||
expect(result.isPhishing).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects scam warning in body text", () => {
|
|
||||||
const html =
|
|
||||||
`<html><head><title>Address: 0xabcdef...1234 | Etherscan</title></head>` +
|
|
||||||
`<body>There are reports that this address was used in a Phishing scam.</body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBeNull();
|
|
||||||
expect(result.isPhishing).toBe(true);
|
|
||||||
expect(result.warning).toContain("phishing/scam");
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects scam warning with label in body", () => {
|
|
||||||
const html =
|
|
||||||
`<html><head><title>SomeScammer | Address: 0xabcdef...1234 | Etherscan</title></head>` +
|
|
||||||
`<body>There are reports that this address was used in a scam.</body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBe("SomeScammer");
|
|
||||||
expect(result.isPhishing).toBe(true);
|
|
||||||
expect(result.warning).toContain("SomeScammer");
|
|
||||||
});
|
|
||||||
|
|
||||||
test("returns clean result for legitimate address", () => {
|
|
||||||
const html = `<html><head><title>vitalik.eth | Address: 0xd8dA6BF2...37aA96045 | Etherscan</title></head><body>Overview</body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBe("vitalik.eth");
|
|
||||||
expect(result.isPhishing).toBe(false);
|
|
||||||
expect(result.warning).toBeNull();
|
|
||||||
});
|
|
||||||
|
|
||||||
test("returns clean result for unlabeled address", () => {
|
|
||||||
const html = `<html><head><title>Address: 0x1234567890...abcdef | Etherscan</title></head><body>Overview</body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBeNull();
|
|
||||||
expect(result.isPhishing).toBe(false);
|
|
||||||
expect(result.warning).toBeNull();
|
|
||||||
});
|
|
||||||
|
|
||||||
test("handles exchange labels correctly (not phishing)", () => {
|
|
||||||
const html = `<html><head><title>Coinbase 10 | Address: 0xa9d1e08c...b81d3e43 | Etherscan</title></head><body>Overview</body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBe("Coinbase 10");
|
|
||||||
expect(result.isPhishing).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("handles contract names correctly (not phishing)", () => {
|
|
||||||
const html = `<html><head><title>Beacon Deposit Contract | Address: 0x00000000...03d7705Fa | Etherscan</title></head><body>Overview</body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBe("Beacon Deposit Contract");
|
|
||||||
expect(result.isPhishing).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("handles empty HTML gracefully", () => {
|
|
||||||
const result = parseEtherscanPage("");
|
|
||||||
expect(result.label).toBeNull();
|
|
||||||
expect(result.isPhishing).toBe(false);
|
|
||||||
expect(result.warning).toBeNull();
|
|
||||||
});
|
|
||||||
|
|
||||||
test("handles malformed title tag", () => {
|
|
||||||
const html = `<html><head><title></title></head><body></body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.label).toBeNull();
|
|
||||||
expect(result.isPhishing).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects wallet drainer warning", () => {
|
|
||||||
const html =
|
|
||||||
`<html><head><title>Address: 0xabc...def | Etherscan</title></head>` +
|
|
||||||
`<body>This is a known wallet drainer contract.</body></html>`;
|
|
||||||
const result = parseEtherscanPage(html);
|
|
||||||
expect(result.isPhishing).toBe(true);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
});
|
|
||||||
@@ -1,259 +0,0 @@
|
|||||||
// Provide a localStorage mock for Node.js test environment.
|
|
||||||
// Must be set before requiring the module since it calls loadDeltaFromStorage()
|
|
||||||
// at module load time.
|
|
||||||
const localStorageStore = {};
|
|
||||||
global.localStorage = {
|
|
||||||
getItem: (key) =>
|
|
||||||
Object.prototype.hasOwnProperty.call(localStorageStore, key)
|
|
||||||
? localStorageStore[key]
|
|
||||||
: null,
|
|
||||||
setItem: (key, value) => {
|
|
||||||
localStorageStore[key] = String(value);
|
|
||||||
},
|
|
||||||
removeItem: (key) => {
|
|
||||||
delete localStorageStore[key];
|
|
||||||
},
|
|
||||||
};
|
|
||||||
|
|
||||||
const {
|
|
||||||
isPhishingDomain,
|
|
||||||
loadConfig,
|
|
||||||
getBlocklistSize,
|
|
||||||
getDeltaSize,
|
|
||||||
hostnameVariants,
|
|
||||||
_reset,
|
|
||||||
_getVendoredBlacklistSize,
|
|
||||||
_getVendoredWhitelistSize,
|
|
||||||
_getDeltaBlacklist,
|
|
||||||
_getDeltaWhitelist,
|
|
||||||
} = require("../src/shared/phishingDomains");
|
|
||||||
|
|
||||||
// Reset delta state before each test to avoid cross-test contamination.
|
|
||||||
// Note: vendored sets are immutable and always present.
|
|
||||||
beforeEach(() => {
|
|
||||||
_reset();
|
|
||||||
// Clear localStorage mock between tests
|
|
||||||
for (const key of Object.keys(localStorageStore)) {
|
|
||||||
delete localStorageStore[key];
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
describe("phishingDomains", () => {
|
|
||||||
describe("vendored blocklist", () => {
|
|
||||||
test("vendored blacklist is loaded from bundled JSON", () => {
|
|
||||||
// The vendored blocklist should have a large number of entries
|
|
||||||
expect(_getVendoredBlacklistSize()).toBeGreaterThan(100000);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("vendored whitelist is loaded from bundled JSON", () => {
|
|
||||||
expect(_getVendoredWhitelistSize()).toBeGreaterThan(0);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects domains from vendored blacklist", () => {
|
|
||||||
// These are well-known phishing domains in the vendored list
|
|
||||||
expect(isPhishingDomain("hopprotocol.pro")).toBe(true);
|
|
||||||
expect(isPhishingDomain("blast-pools.pages.dev")).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("vendored whitelist overrides vendored blacklist", () => {
|
|
||||||
// opensea.pro is whitelisted in the vendored config
|
|
||||||
expect(isPhishingDomain("opensea.pro")).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("getBlocklistSize includes vendored entries", () => {
|
|
||||||
expect(getBlocklistSize()).toBeGreaterThan(100000);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
|
|
||||||
describe("hostnameVariants", () => {
|
|
||||||
test("returns exact hostname plus parent domains", () => {
|
|
||||||
const variants = hostnameVariants("sub.evil.com");
|
|
||||||
expect(variants).toEqual(["sub.evil.com", "evil.com"]);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("returns just the hostname for a bare domain", () => {
|
|
||||||
const variants = hostnameVariants("example.com");
|
|
||||||
expect(variants).toEqual(["example.com"]);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("handles deep subdomain chains", () => {
|
|
||||||
const variants = hostnameVariants("a.b.c.d.com");
|
|
||||||
expect(variants).toEqual([
|
|
||||||
"a.b.c.d.com",
|
|
||||||
"b.c.d.com",
|
|
||||||
"c.d.com",
|
|
||||||
"d.com",
|
|
||||||
]);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("lowercases hostnames", () => {
|
|
||||||
const variants = hostnameVariants("Evil.COM");
|
|
||||||
expect(variants).toEqual(["evil.com"]);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
|
|
||||||
describe("delta computation via loadConfig", () => {
|
|
||||||
test("loadConfig computes delta of new entries not in vendored list", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: [
|
|
||||||
"brand-new-scam-site-xyz123.com",
|
|
||||||
"hopprotocol.pro", // already in vendored
|
|
||||||
],
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
// Only the new domain should be in the delta
|
|
||||||
expect(
|
|
||||||
_getDeltaBlacklist().has("brand-new-scam-site-xyz123.com"),
|
|
||||||
).toBe(true);
|
|
||||||
expect(_getDeltaBlacklist().has("hopprotocol.pro")).toBe(false);
|
|
||||||
expect(getDeltaSize()).toBe(1);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("delta whitelist entries are computed correctly", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: [],
|
|
||||||
whitelist: [
|
|
||||||
"new-safe-site-xyz789.com",
|
|
||||||
"opensea.pro", // already in vendored whitelist
|
|
||||||
],
|
|
||||||
});
|
|
||||||
expect(_getDeltaWhitelist().has("new-safe-site-xyz789.com")).toBe(
|
|
||||||
true,
|
|
||||||
);
|
|
||||||
expect(_getDeltaWhitelist().has("opensea.pro")).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("re-loading config replaces previous delta", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["first-scam-xyz.com"],
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
expect(isPhishingDomain("first-scam-xyz.com")).toBe(true);
|
|
||||||
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["second-scam-xyz.com"],
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
expect(isPhishingDomain("first-scam-xyz.com")).toBe(false);
|
|
||||||
expect(isPhishingDomain("second-scam-xyz.com")).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("getBlocklistSize includes both vendored and delta", () => {
|
|
||||||
const baseSize = getBlocklistSize();
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["delta-only-scam-xyz.com"],
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
expect(getBlocklistSize()).toBe(baseSize + 1);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
|
|
||||||
describe("isPhishingDomain with delta + vendored", () => {
|
|
||||||
test("detects domain from delta blacklist", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["fresh-scam-xyz.com"],
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
expect(isPhishingDomain("fresh-scam-xyz.com")).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects domain from vendored blacklist", () => {
|
|
||||||
// No delta loaded — vendored still works
|
|
||||||
expect(isPhishingDomain("hopprotocol.pro")).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("returns false for clean domains", () => {
|
|
||||||
expect(isPhishingDomain("etherscan.io")).toBe(false);
|
|
||||||
expect(isPhishingDomain("example.com")).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects subdomain of blacklisted domain (vendored)", () => {
|
|
||||||
expect(isPhishingDomain("app.hopprotocol.pro")).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("detects subdomain of blacklisted domain (delta)", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["delta-phish-xyz.com"],
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
expect(isPhishingDomain("sub.delta-phish-xyz.com")).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("delta whitelist overrides vendored blacklist", () => {
|
|
||||||
// hopprotocol.pro is in the vendored blacklist
|
|
||||||
expect(isPhishingDomain("hopprotocol.pro")).toBe(true);
|
|
||||||
loadConfig({
|
|
||||||
blacklist: [],
|
|
||||||
whitelist: ["hopprotocol.pro"],
|
|
||||||
});
|
|
||||||
// Now whitelisted via delta — should not be flagged
|
|
||||||
expect(isPhishingDomain("hopprotocol.pro")).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("vendored whitelist overrides delta blacklist", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["opensea.pro"], // opensea.pro is vendored-whitelisted
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
expect(isPhishingDomain("opensea.pro")).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("case-insensitive matching", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["Delta-Scam-XYZ.COM"],
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
expect(isPhishingDomain("delta-scam-xyz.com")).toBe(true);
|
|
||||||
expect(isPhishingDomain("DELTA-SCAM-XYZ.COM")).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("returns false for empty/null hostname", () => {
|
|
||||||
expect(isPhishingDomain("")).toBe(false);
|
|
||||||
expect(isPhishingDomain(null)).toBe(false);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("handles config with no blacklist/whitelist keys", () => {
|
|
||||||
loadConfig({});
|
|
||||||
expect(getDeltaSize()).toBe(0);
|
|
||||||
// Vendored list still works
|
|
||||||
expect(isPhishingDomain("hopprotocol.pro")).toBe(true);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
|
|
||||||
describe("localStorage persistence", () => {
|
|
||||||
test("saveDeltaToStorage persists delta under 256KiB", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["persisted-scam-xyz.com"],
|
|
||||||
whitelist: ["persisted-safe-xyz.com"],
|
|
||||||
});
|
|
||||||
const stored = localStorage.getItem("phishing-delta");
|
|
||||||
expect(stored).not.toBeNull();
|
|
||||||
const data = JSON.parse(stored);
|
|
||||||
expect(data.blacklist).toContain("persisted-scam-xyz.com");
|
|
||||||
expect(data.whitelist).toContain("persisted-safe-xyz.com");
|
|
||||||
});
|
|
||||||
|
|
||||||
test("delta is cleared on _reset", () => {
|
|
||||||
loadConfig({
|
|
||||||
blacklist: ["temp-scam-xyz.com"],
|
|
||||||
whitelist: [],
|
|
||||||
});
|
|
||||||
expect(getDeltaSize()).toBe(1);
|
|
||||||
_reset();
|
|
||||||
expect(getDeltaSize()).toBe(0);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
|
|
||||||
describe("real-world blocklist patterns", () => {
|
|
||||||
test("detects known phishing domains from vendored list", () => {
|
|
||||||
expect(isPhishingDomain("uniswap-trade.web.app")).toBe(true);
|
|
||||||
expect(isPhishingDomain("hopprotocol.pro")).toBe(true);
|
|
||||||
expect(isPhishingDomain("blast-pools.pages.dev")).toBe(true);
|
|
||||||
});
|
|
||||||
|
|
||||||
test("does not flag legitimate whitelisted domains", () => {
|
|
||||||
expect(isPhishingDomain("opensea.io")).toBe(false);
|
|
||||||
expect(isPhishingDomain("etherscan.io")).toBe(false);
|
|
||||||
});
|
|
||||||
});
|
|
||||||
});
|
|
||||||
Reference in New Issue
Block a user