Compare commits
5 Commits
feat/issue
...
6bafb18ebd
| Author | SHA1 | Date | |
|---|---|---|---|
| 6bafb18ebd | |||
| 0d06df6cbe | |||
| b8d81a4c8a | |||
|
|
01839d9c47 | ||
|
|
9eef2ea602 |
@@ -437,10 +437,6 @@ transitions.
|
|||||||
- **When**: User tapped a transaction row from AddressDetail or AddressToken.
|
- **When**: User tapped a transaction row from AddressDetail or AddressToken.
|
||||||
- **Elements**:
|
- **Elements**:
|
||||||
- "Transaction" heading, "Back" button
|
- "Transaction" heading, "Back" button
|
||||||
- Type: transaction classification — one of: Native ETH Transfer, ERC-20
|
|
||||||
Token Transfer, Swap, Token Approval, Contract Call, Contract Creation
|
|
||||||
- Token contract: shown for ERC-20 transfers — color dot + full contract
|
|
||||||
address (tap to copy) + etherscan token link
|
|
||||||
- Status: "Success" or "Failed"
|
- Status: "Success" or "Failed"
|
||||||
- Time: ISO datetime + relative age in parentheses
|
- Time: ISO datetime + relative age in parentheses
|
||||||
- Amount: value + symbol (bold)
|
- Amount: value + symbol (bold)
|
||||||
@@ -449,11 +445,6 @@ transitions.
|
|||||||
- To: blockie + color dot + full address (tap to copy) + etherscan link
|
- To: blockie + color dot + full address (tap to copy) + etherscan link
|
||||||
- ENS name if available
|
- ENS name if available
|
||||||
- Transaction hash: full hash (tap to copy) + etherscan link
|
- Transaction hash: full hash (tap to copy) + etherscan link
|
||||||
- Block: block number (tap to copy) + etherscan block link
|
|
||||||
- Nonce: transaction nonce (tap to copy)
|
|
||||||
- Transaction fee: ETH amount (tap to copy)
|
|
||||||
- Gas price: value in Gwei (tap to copy)
|
|
||||||
- Gas used: integer (tap to copy)
|
|
||||||
- **Transitions**:
|
- **Transitions**:
|
||||||
- "Back" → **AddressToken** (if `selectedToken` set) or **AddressDetail**
|
- "Back" → **AddressToken** (if `selectedToken` set) or **AddressDetail**
|
||||||
|
|
||||||
|
|||||||
@@ -12,6 +12,10 @@ const { refreshBalances, getProvider } = require("../shared/balances");
|
|||||||
const { debugFetch } = require("../shared/log");
|
const { debugFetch } = require("../shared/log");
|
||||||
const { decryptWithPassword } = require("../shared/vault");
|
const { decryptWithPassword } = require("../shared/vault");
|
||||||
const { getSignerForAddress } = require("../shared/wallet");
|
const { getSignerForAddress } = require("../shared/wallet");
|
||||||
|
const {
|
||||||
|
isPhishingDomain,
|
||||||
|
updatePhishingList,
|
||||||
|
} = require("../shared/phishingDomains");
|
||||||
|
|
||||||
const storageApi =
|
const storageApi =
|
||||||
typeof browser !== "undefined"
|
typeof browser !== "undefined"
|
||||||
@@ -571,6 +575,10 @@ async function backgroundRefresh() {
|
|||||||
|
|
||||||
setInterval(backgroundRefresh, BACKGROUND_REFRESH_INTERVAL);
|
setInterval(backgroundRefresh, BACKGROUND_REFRESH_INTERVAL);
|
||||||
|
|
||||||
|
// Fetch the MetaMask eth-phishing-detect domain blocklist on startup.
|
||||||
|
// Refreshes every 24 hours automatically.
|
||||||
|
updatePhishingList();
|
||||||
|
|
||||||
// When approval window is closed without a response, treat as rejection
|
// When approval window is closed without a response, treat as rejection
|
||||||
if (windowsApi && windowsApi.onRemoved) {
|
if (windowsApi && windowsApi.onRemoved) {
|
||||||
windowsApi.onRemoved.addListener((windowId) => {
|
windowsApi.onRemoved.addListener((windowId) => {
|
||||||
@@ -643,6 +651,8 @@ runtime.onMessage.addListener((msg, sender, sendResponse) => {
|
|||||||
resp.type = "sign";
|
resp.type = "sign";
|
||||||
resp.signParams = approval.signParams;
|
resp.signParams = approval.signParams;
|
||||||
}
|
}
|
||||||
|
// Flag if the requesting domain is on the phishing blocklist.
|
||||||
|
resp.isPhishingDomain = isPhishingDomain(approval.hostname);
|
||||||
sendResponse(resp);
|
sendResponse(resp);
|
||||||
} else {
|
} else {
|
||||||
sendResponse(null);
|
sendResponse(null);
|
||||||
|
|||||||
231428
src/data/phishing-domains.json
Normal file
231428
src/data/phishing-domains.json
Normal file
File diff suppressed because it is too large
Load Diff
@@ -605,6 +605,43 @@
|
|||||||
Double-check the address before sending.
|
Double-check the address before sending.
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
<div
|
||||||
|
id="confirm-contract-warning"
|
||||||
|
class="mb-2"
|
||||||
|
style="visibility: hidden"
|
||||||
|
>
|
||||||
|
<div
|
||||||
|
class="border border-red-500 border-dashed p-2 text-xs font-bold text-red-500"
|
||||||
|
>
|
||||||
|
WARNING: The recipient is a smart contract. Sending ETH
|
||||||
|
or tokens directly to a contract may result in permanent
|
||||||
|
loss of funds.
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div
|
||||||
|
id="confirm-burn-warning"
|
||||||
|
class="mb-2"
|
||||||
|
style="visibility: hidden"
|
||||||
|
>
|
||||||
|
<div
|
||||||
|
class="border border-red-500 border-dashed p-2 text-xs font-bold text-red-500"
|
||||||
|
>
|
||||||
|
WARNING: This is a known null/burn address. Funds sent
|
||||||
|
here are permanently destroyed and cannot be recovered.
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div
|
||||||
|
id="confirm-etherscan-warning"
|
||||||
|
class="mb-2"
|
||||||
|
style="visibility: hidden"
|
||||||
|
>
|
||||||
|
<div
|
||||||
|
class="border border-red-500 border-dashed p-2 text-xs font-bold text-red-500"
|
||||||
|
>
|
||||||
|
WARNING: Etherscan has flagged this address as
|
||||||
|
phishing/scam. Do not send funds to this address.
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
<div
|
<div
|
||||||
id="confirm-errors"
|
id="confirm-errors"
|
||||||
class="mb-2 border border-border border-dashed p-2"
|
class="mb-2 border border-border border-dashed p-2"
|
||||||
@@ -1064,140 +1101,74 @@
|
|||||||
<h2 id="tx-detail-heading" class="font-bold mb-2">
|
<h2 id="tx-detail-heading" class="font-bold mb-2">
|
||||||
Transaction
|
Transaction
|
||||||
</h2>
|
</h2>
|
||||||
|
<div id="tx-detail-type-section" class="mb-4 hidden">
|
||||||
<!-- ── Identity ── -->
|
<div class="text-xs text-muted mb-1">Type</div>
|
||||||
<div class="tx-detail-group mb-1">
|
<div id="tx-detail-type" class="text-xs font-bold"></div>
|
||||||
<div class="mb-3">
|
|
||||||
<div class="text-xs text-muted mb-1">
|
|
||||||
Transaction hash
|
|
||||||
</div>
|
|
||||||
<div
|
|
||||||
id="tx-detail-hash"
|
|
||||||
class="text-xs break-all"
|
|
||||||
></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-type-section" class="mb-3 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Type</div>
|
|
||||||
<div
|
|
||||||
id="tx-detail-type"
|
|
||||||
class="text-xs font-bold"
|
|
||||||
></div>
|
|
||||||
</div>
|
|
||||||
<div class="mb-3">
|
|
||||||
<div class="text-xs text-muted mb-1">Status</div>
|
|
||||||
<div id="tx-detail-status" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div class="mb-1">
|
|
||||||
<div class="text-xs text-muted mb-1">Time</div>
|
|
||||||
<div id="tx-detail-time" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
</div>
|
</div>
|
||||||
|
<div class="mb-4">
|
||||||
<!-- ── Value ── -->
|
<div class="text-xs text-muted mb-1">Status</div>
|
||||||
<div class="tx-detail-group mb-1">
|
<div id="tx-detail-status" class="text-xs"></div>
|
||||||
<div class="mb-3">
|
</div>
|
||||||
<div class="text-xs text-muted mb-1">Amount</div>
|
<div class="mb-4">
|
||||||
<div id="tx-detail-value" class="text-xs"></div>
|
<div class="text-xs text-muted mb-1">Time</div>
|
||||||
</div>
|
<div id="tx-detail-time" class="text-xs"></div>
|
||||||
<div class="mb-3 hidden">
|
</div>
|
||||||
<div class="text-xs text-muted mb-1">
|
<div class="mb-4">
|
||||||
Native quantity
|
<div class="text-xs text-muted mb-1">Amount</div>
|
||||||
</div>
|
<div id="tx-detail-value" class="text-xs"></div>
|
||||||
<div id="tx-detail-native" class="text-xs"></div>
|
</div>
|
||||||
</div>
|
<div class="mb-4 hidden">
|
||||||
|
<div class="text-xs text-muted mb-1">Native quantity</div>
|
||||||
|
<div id="tx-detail-native" class="text-xs"></div>
|
||||||
|
</div>
|
||||||
|
<div class="mb-4">
|
||||||
|
<div class="text-xs text-muted mb-1">From</div>
|
||||||
|
<div id="tx-detail-from" class="text-xs break-all"></div>
|
||||||
|
</div>
|
||||||
|
<div class="mb-4">
|
||||||
|
<div class="text-xs text-muted mb-1">To</div>
|
||||||
|
<div id="tx-detail-to" class="text-xs break-all"></div>
|
||||||
|
</div>
|
||||||
|
<div id="tx-detail-calldata-section" class="mb-4 hidden">
|
||||||
<div
|
<div
|
||||||
id="tx-detail-token-contract-section"
|
id="tx-detail-calldata-well"
|
||||||
class="mb-1 hidden"
|
class="mb-3 border border-border border-dashed p-2"
|
||||||
>
|
>
|
||||||
<div class="text-xs text-muted mb-1">
|
<div class="text-xs text-muted mb-1">Action</div>
|
||||||
Token contract
|
|
||||||
</div>
|
|
||||||
<div
|
<div
|
||||||
id="tx-detail-token-contract"
|
id="tx-detail-calldata-action"
|
||||||
class="text-xs break-all"
|
class="text-xs font-bold mb-2"
|
||||||
|
></div>
|
||||||
|
<div
|
||||||
|
id="tx-detail-calldata-details"
|
||||||
|
class="text-xs"
|
||||||
></div>
|
></div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
<div class="mb-4">
|
||||||
<!-- ── Parties ── -->
|
<div class="text-xs text-muted mb-1">Transaction hash</div>
|
||||||
<div class="tx-detail-group mb-1">
|
<div id="tx-detail-hash" class="text-xs break-all"></div>
|
||||||
<div class="mb-3">
|
|
||||||
<div class="text-xs text-muted mb-1">From</div>
|
|
||||||
<div
|
|
||||||
id="tx-detail-from"
|
|
||||||
class="text-xs break-all"
|
|
||||||
></div>
|
|
||||||
</div>
|
|
||||||
<div class="mb-1">
|
|
||||||
<div class="text-xs text-muted mb-1">To</div>
|
|
||||||
<div id="tx-detail-to" class="text-xs break-all"></div>
|
|
||||||
</div>
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- ── Protocol ── -->
|
|
||||||
<div id="tx-detail-calldata-section" class="mb-1 hidden">
|
|
||||||
<div class="tx-detail-group mb-1">
|
|
||||||
<div
|
|
||||||
id="tx-detail-calldata-well"
|
|
||||||
class="border border-border border-dashed p-2"
|
|
||||||
>
|
|
||||||
<div class="text-xs text-muted mb-1">Action</div>
|
|
||||||
<div
|
|
||||||
id="tx-detail-calldata-action"
|
|
||||||
class="text-xs font-bold mb-2"
|
|
||||||
></div>
|
|
||||||
<div
|
|
||||||
id="tx-detail-calldata-details"
|
|
||||||
class="text-xs"
|
|
||||||
></div>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<!-- ── On-chain details ── -->
|
|
||||||
<div
|
|
||||||
id="tx-detail-onchain-group"
|
|
||||||
class="tx-detail-group mb-1 hidden"
|
|
||||||
>
|
|
||||||
<div id="tx-detail-block-section" class="mb-3 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Block</div>
|
|
||||||
<div id="tx-detail-block" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-nonce-section" class="mb-3 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Nonce</div>
|
|
||||||
<div id="tx-detail-nonce" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-fee-section" class="mb-3 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">
|
|
||||||
Transaction fee
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-fee" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-gasprice-section" class="mb-3 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Gas price</div>
|
|
||||||
<div id="tx-detail-gasprice" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
<div id="tx-detail-gasused-section" class="mb-1 hidden">
|
|
||||||
<div class="text-xs text-muted mb-1">Gas used</div>
|
|
||||||
<div id="tx-detail-gasused" class="text-xs"></div>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<!-- ── Raw data ── -->
|
|
||||||
<div id="tx-detail-rawdata-section" class="mb-4 hidden">
|
<div id="tx-detail-rawdata-section" class="mb-4 hidden">
|
||||||
<div class="tx-detail-group">
|
<div class="text-xs text-muted mb-1">Raw data</div>
|
||||||
<div class="text-xs text-muted mb-1">Raw data</div>
|
<div
|
||||||
<div
|
id="tx-detail-rawdata"
|
||||||
id="tx-detail-rawdata"
|
class="text-xs break-all font-mono border border-border border-dashed p-2"
|
||||||
class="text-xs break-all font-mono border border-border border-dashed p-2"
|
></div>
|
||||||
></div>
|
|
||||||
</div>
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- ============ TRANSACTION APPROVAL ============ -->
|
<!-- ============ TRANSACTION APPROVAL ============ -->
|
||||||
<div id="view-approve-tx" class="view hidden">
|
<div id="view-approve-tx" class="view hidden">
|
||||||
<h2 class="font-bold mb-2">Transaction Request</h2>
|
<h2 class="font-bold mb-2">Transaction Request</h2>
|
||||||
|
<div
|
||||||
|
id="approve-tx-phishing-warning"
|
||||||
|
class="mb-3 p-2 text-xs font-bold hidden bg-red-100 text-red-800 border-2 border-red-600 rounded-md"
|
||||||
|
>
|
||||||
|
⚠️ PHISHING WARNING: This site is on MetaMask's phishing
|
||||||
|
blocklist. This transaction may steal your funds. Proceed
|
||||||
|
with extreme caution.
|
||||||
|
</div>
|
||||||
<p class="mb-2">
|
<p class="mb-2">
|
||||||
<span id="approve-tx-hostname" class="font-bold"></span>
|
<span id="approve-tx-hostname" class="font-bold"></span>
|
||||||
wants to send a transaction.
|
wants to send a transaction.
|
||||||
@@ -1264,6 +1235,14 @@
|
|||||||
<!-- ============ SIGNATURE APPROVAL ============ -->
|
<!-- ============ SIGNATURE APPROVAL ============ -->
|
||||||
<div id="view-approve-sign" class="view hidden">
|
<div id="view-approve-sign" class="view hidden">
|
||||||
<h2 class="font-bold mb-2">Signature Request</h2>
|
<h2 class="font-bold mb-2">Signature Request</h2>
|
||||||
|
<div
|
||||||
|
id="approve-sign-phishing-warning"
|
||||||
|
class="mb-3 p-2 text-xs font-bold hidden bg-red-100 text-red-800 border-2 border-red-600 rounded-md"
|
||||||
|
>
|
||||||
|
⚠️ PHISHING WARNING: This site is on MetaMask's phishing
|
||||||
|
blocklist. Signing this message may authorize theft of your
|
||||||
|
funds. Proceed with extreme caution.
|
||||||
|
</div>
|
||||||
<p class="mb-2">
|
<p class="mb-2">
|
||||||
<span id="approve-sign-hostname" class="font-bold"></span>
|
<span id="approve-sign-hostname" class="font-bold"></span>
|
||||||
wants you to sign a message.
|
wants you to sign a message.
|
||||||
@@ -1333,6 +1312,14 @@
|
|||||||
<!-- ============ SITE APPROVAL ============ -->
|
<!-- ============ SITE APPROVAL ============ -->
|
||||||
<div id="view-approve-site" class="view hidden">
|
<div id="view-approve-site" class="view hidden">
|
||||||
<h2 class="font-bold mb-2">Connection Request</h2>
|
<h2 class="font-bold mb-2">Connection Request</h2>
|
||||||
|
<div
|
||||||
|
id="approve-site-phishing-warning"
|
||||||
|
class="mb-3 p-2 text-xs font-bold hidden bg-red-100 text-red-800 border-2 border-red-600 rounded-md"
|
||||||
|
>
|
||||||
|
⚠️ PHISHING WARNING: This site is on MetaMask's phishing
|
||||||
|
blocklist. Connecting your wallet may result in loss of
|
||||||
|
funds. Proceed with extreme caution.
|
||||||
|
</div>
|
||||||
<div class="mb-3">
|
<div class="mb-3">
|
||||||
<p class="mb-2">
|
<p class="mb-2">
|
||||||
<span id="approve-hostname" class="font-bold"></span>
|
<span id="approve-hostname" class="font-bold"></span>
|
||||||
|
|||||||
@@ -44,11 +44,3 @@ body {
|
|||||||
background-color 225ms ease-out,
|
background-color 225ms ease-out,
|
||||||
color 225ms ease-out;
|
color 225ms ease-out;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Transaction detail view — visual grouping of related fields */
|
|
||||||
.tx-detail-group {
|
|
||||||
border-bottom: 1px solid var(--color-border-light);
|
|
||||||
padding-bottom: 0.5rem;
|
|
||||||
margin-bottom: 0.5rem;
|
|
||||||
padding-top: 0.25rem;
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -13,6 +13,7 @@ const { ERC20_ABI } = require("../../shared/constants");
|
|||||||
const { TOKEN_BY_ADDRESS } = require("../../shared/tokenList");
|
const { TOKEN_BY_ADDRESS } = require("../../shared/tokenList");
|
||||||
const txStatus = require("./txStatus");
|
const txStatus = require("./txStatus");
|
||||||
const uniswap = require("../../shared/uniswap");
|
const uniswap = require("../../shared/uniswap");
|
||||||
|
const { isPhishingDomain } = require("../../shared/phishingDomains");
|
||||||
|
|
||||||
const runtime =
|
const runtime =
|
||||||
typeof browser !== "undefined" ? browser.runtime : chrome.runtime;
|
typeof browser !== "undefined" ? browser.runtime : chrome.runtime;
|
||||||
@@ -155,7 +156,24 @@ function decodeCalldata(data, toAddress) {
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function showPhishingWarning(elementId, hostname, isPhishing) {
|
||||||
|
const el = $(elementId);
|
||||||
|
if (!el) return;
|
||||||
|
// Check both the flag from background and a local re-check
|
||||||
|
if (isPhishing || isPhishingDomain(hostname)) {
|
||||||
|
el.classList.remove("hidden");
|
||||||
|
} else {
|
||||||
|
el.classList.add("hidden");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
function showTxApproval(details) {
|
function showTxApproval(details) {
|
||||||
|
showPhishingWarning(
|
||||||
|
"approve-tx-phishing-warning",
|
||||||
|
details.hostname,
|
||||||
|
details.isPhishingDomain,
|
||||||
|
);
|
||||||
|
|
||||||
const toAddr = details.txParams.to;
|
const toAddr = details.txParams.to;
|
||||||
const token = toAddr ? TOKEN_BY_ADDRESS.get(toAddr.toLowerCase()) : null;
|
const token = toAddr ? TOKEN_BY_ADDRESS.get(toAddr.toLowerCase()) : null;
|
||||||
const ethValue = formatEther(details.txParams.value || "0");
|
const ethValue = formatEther(details.txParams.value || "0");
|
||||||
@@ -323,6 +341,12 @@ function formatTypedDataHtml(jsonStr) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function showSignApproval(details) {
|
function showSignApproval(details) {
|
||||||
|
showPhishingWarning(
|
||||||
|
"approve-sign-phishing-warning",
|
||||||
|
details.hostname,
|
||||||
|
details.isPhishingDomain,
|
||||||
|
);
|
||||||
|
|
||||||
const sp = details.signParams;
|
const sp = details.signParams;
|
||||||
|
|
||||||
$("approve-sign-hostname").textContent = details.hostname;
|
$("approve-sign-hostname").textContent = details.hostname;
|
||||||
@@ -382,6 +406,12 @@ function show(id) {
|
|||||||
showSignApproval(details);
|
showSignApproval(details);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
// Site connection approval
|
||||||
|
showPhishingWarning(
|
||||||
|
"approve-site-phishing-warning",
|
||||||
|
details.hostname,
|
||||||
|
details.isPhishingDomain,
|
||||||
|
);
|
||||||
$("approve-hostname").textContent = details.hostname;
|
$("approve-hostname").textContent = details.hostname;
|
||||||
$("approve-address").innerHTML = approvalAddressHtml(
|
$("approve-address").innerHTML = approvalAddressHtml(
|
||||||
state.activeAddress,
|
state.activeAddress,
|
||||||
|
|||||||
@@ -25,8 +25,11 @@ const { getSignerForAddress } = require("../../shared/wallet");
|
|||||||
const { decryptWithPassword } = require("../../shared/vault");
|
const { decryptWithPassword } = require("../../shared/vault");
|
||||||
const { formatUsd, getPrice } = require("../../shared/prices");
|
const { formatUsd, getPrice } = require("../../shared/prices");
|
||||||
const { getProvider } = require("../../shared/balances");
|
const { getProvider } = require("../../shared/balances");
|
||||||
const { isScamAddress } = require("../../shared/scamlist");
|
const {
|
||||||
const { ERC20_ABI } = require("../../shared/constants");
|
getLocalWarnings,
|
||||||
|
getFullWarnings,
|
||||||
|
} = require("../../shared/addressWarnings");
|
||||||
|
const { ERC20_ABI, isBurnAddress } = require("../../shared/constants");
|
||||||
const { log } = require("../../shared/log");
|
const { log } = require("../../shared/log");
|
||||||
const makeBlockie = require("ethereum-blockies-base64");
|
const makeBlockie = require("ethereum-blockies-base64");
|
||||||
const txStatus = require("./txStatus");
|
const txStatus = require("./txStatus");
|
||||||
@@ -167,23 +170,17 @@ function show(txInfo) {
|
|||||||
$("confirm-balance").textContent = valueWithUsd(bal + " ETH", balUsd);
|
$("confirm-balance").textContent = valueWithUsd(bal + " ETH", balUsd);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for warnings
|
// Check for warnings (synchronous local checks)
|
||||||
const warnings = [];
|
const localWarnings = getLocalWarnings(txInfo.to, {
|
||||||
if (isScamAddress(txInfo.to)) {
|
fromAddress: txInfo.from,
|
||||||
warnings.push(
|
});
|
||||||
"This address is on a known scam/fraud list. Do not send funds to this address.",
|
|
||||||
);
|
|
||||||
}
|
|
||||||
if (txInfo.to.toLowerCase() === txInfo.from.toLowerCase()) {
|
|
||||||
warnings.push("You are sending to your own address.");
|
|
||||||
}
|
|
||||||
|
|
||||||
const warningsEl = $("confirm-warnings");
|
const warningsEl = $("confirm-warnings");
|
||||||
if (warnings.length > 0) {
|
if (localWarnings.length > 0) {
|
||||||
warningsEl.innerHTML = warnings
|
warningsEl.innerHTML = localWarnings
|
||||||
.map(
|
.map(
|
||||||
(w) =>
|
(w) =>
|
||||||
`<div class="border border-border border-dashed p-2 mb-1 text-xs font-bold">WARNING: ${w}</div>`,
|
`<div class="border border-border border-dashed p-2 mb-1 text-xs font-bold">WARNING: ${w.message}</div>`,
|
||||||
)
|
)
|
||||||
.join("");
|
.join("");
|
||||||
warningsEl.style.visibility = "visible";
|
warningsEl.style.visibility = "visible";
|
||||||
@@ -247,8 +244,16 @@ function show(txInfo) {
|
|||||||
state.viewData = { pendingTx: txInfo };
|
state.viewData = { pendingTx: txInfo };
|
||||||
showView("confirm-tx");
|
showView("confirm-tx");
|
||||||
|
|
||||||
// Reset recipient warning to hidden (space always reserved, no layout shift)
|
// Reset async warnings to hidden (space always reserved, no layout shift)
|
||||||
$("confirm-recipient-warning").style.visibility = "hidden";
|
$("confirm-recipient-warning").style.visibility = "hidden";
|
||||||
|
$("confirm-contract-warning").style.visibility = "hidden";
|
||||||
|
$("confirm-burn-warning").style.visibility = "hidden";
|
||||||
|
$("confirm-etherscan-warning").style.visibility = "hidden";
|
||||||
|
|
||||||
|
// Show burn warning via reserved element (in addition to inline warning)
|
||||||
|
if (isBurnAddress(txInfo.to)) {
|
||||||
|
$("confirm-burn-warning").style.visibility = "visible";
|
||||||
|
}
|
||||||
|
|
||||||
estimateGas(txInfo);
|
estimateGas(txInfo);
|
||||||
checkRecipientHistory(txInfo);
|
checkRecipientHistory(txInfo);
|
||||||
@@ -295,19 +300,21 @@ async function estimateGas(txInfo) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
async function checkRecipientHistory(txInfo) {
|
async function checkRecipientHistory(txInfo) {
|
||||||
const el = $("confirm-recipient-warning");
|
|
||||||
try {
|
try {
|
||||||
const provider = getProvider(state.rpcUrl);
|
const provider = getProvider(state.rpcUrl);
|
||||||
// Skip warning for contract addresses — they may legitimately
|
const asyncWarnings = await getFullWarnings(txInfo.to, provider, {
|
||||||
// have zero outgoing transactions (getTransactionCount returns
|
fromAddress: txInfo.from,
|
||||||
// the nonce, i.e. sent-tx count only).
|
});
|
||||||
const code = await provider.getCode(txInfo.to);
|
for (const w of asyncWarnings) {
|
||||||
if (code && code !== "0x") {
|
if (w.type === "contract") {
|
||||||
return;
|
$("confirm-contract-warning").style.visibility = "visible";
|
||||||
}
|
}
|
||||||
const txCount = await provider.getTransactionCount(txInfo.to);
|
if (w.type === "new-address") {
|
||||||
if (txCount === 0) {
|
$("confirm-recipient-warning").style.visibility = "visible";
|
||||||
el.style.visibility = "visible";
|
}
|
||||||
|
if (w.type === "etherscan-phishing") {
|
||||||
|
$("confirm-etherscan-warning").style.visibility = "visible";
|
||||||
|
}
|
||||||
}
|
}
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
log.errorf("recipient history check failed:", e.message);
|
log.errorf("recipient history check failed:", e.message);
|
||||||
|
|||||||
@@ -13,7 +13,6 @@ const {
|
|||||||
timeAgo,
|
timeAgo,
|
||||||
} = require("./helpers");
|
} = require("./helpers");
|
||||||
const { state } = require("../../shared/state");
|
const { state } = require("../../shared/state");
|
||||||
const { formatEther, formatUnits } = require("ethers");
|
|
||||||
const makeBlockie = require("ethereum-blockies-base64");
|
const makeBlockie = require("ethereum-blockies-base64");
|
||||||
const { log, debugFetch } = require("../../shared/log");
|
const { log, debugFetch } = require("../../shared/log");
|
||||||
const { decodeCalldata } = require("./approval");
|
const { decodeCalldata } = require("./approval");
|
||||||
@@ -27,25 +26,6 @@ const EXT_ICON =
|
|||||||
|
|
||||||
let ctx;
|
let ctx;
|
||||||
|
|
||||||
/**
|
|
||||||
* Determine a human-readable transaction type string from tx fields.
|
|
||||||
*/
|
|
||||||
function getTransactionType(tx) {
|
|
||||||
if (!tx.to) return "Contract Creation";
|
|
||||||
if (tx.direction === "contract") {
|
|
||||||
if (tx.directionLabel === "Swap") return "Swap";
|
|
||||||
if (
|
|
||||||
tx.method === "approve" ||
|
|
||||||
tx.directionLabel === "Approve" ||
|
|
||||||
tx.method === "setApprovalForAll"
|
|
||||||
)
|
|
||||||
return "Token Approval";
|
|
||||||
return "Contract Call";
|
|
||||||
}
|
|
||||||
if (tx.symbol && tx.symbol !== "ETH") return "ERC-20 Token Transfer";
|
|
||||||
return "Native ETH Transfer";
|
|
||||||
}
|
|
||||||
|
|
||||||
function copyableHtml(text, extraClass) {
|
function copyableHtml(text, extraClass) {
|
||||||
const cls =
|
const cls =
|
||||||
"underline decoration-dashed cursor-pointer" +
|
"underline decoration-dashed cursor-pointer" +
|
||||||
@@ -119,7 +99,6 @@ function show(tx) {
|
|||||||
direction: tx.direction || null,
|
direction: tx.direction || null,
|
||||||
isContractCall: tx.isContractCall || false,
|
isContractCall: tx.isContractCall || false,
|
||||||
method: tx.method || null,
|
method: tx.method || null,
|
||||||
contractAddress: tx.contractAddress || null,
|
|
||||||
},
|
},
|
||||||
};
|
};
|
||||||
render();
|
render();
|
||||||
@@ -156,56 +135,30 @@ function render() {
|
|||||||
nativeEl.parentElement.classList.add("hidden");
|
nativeEl.parentElement.classList.add("hidden");
|
||||||
}
|
}
|
||||||
|
|
||||||
// Always show transaction type as the first field
|
// Show type label for contract interactions (Swap, Execute, etc.)
|
||||||
const typeSection = $("tx-detail-type-section");
|
const typeSection = $("tx-detail-type-section");
|
||||||
const typeEl = $("tx-detail-type");
|
const typeEl = $("tx-detail-type");
|
||||||
const headingEl = $("tx-detail-heading");
|
const headingEl = $("tx-detail-heading");
|
||||||
if (typeSection && typeEl) {
|
if (tx.direction === "contract" && tx.directionLabel) {
|
||||||
typeEl.textContent = getTransactionType(tx);
|
if (typeSection) {
|
||||||
typeSection.classList.remove("hidden");
|
typeEl.textContent = tx.directionLabel;
|
||||||
|
typeSection.classList.remove("hidden");
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (typeSection) typeSection.classList.add("hidden");
|
||||||
}
|
}
|
||||||
if (headingEl) headingEl.textContent = "Transaction";
|
if (headingEl) headingEl.textContent = "Transaction";
|
||||||
|
|
||||||
// Token contract address (for ERC-20 transfers)
|
// Hide calldata and raw data sections; re-fetch if this is a contract call
|
||||||
const tokenContractSection = $("tx-detail-token-contract-section");
|
|
||||||
const tokenContractEl = $("tx-detail-token-contract");
|
|
||||||
if (tokenContractSection && tokenContractEl) {
|
|
||||||
if (tx.contractAddress) {
|
|
||||||
const dot = addressDotHtml(tx.contractAddress);
|
|
||||||
const link = `https://etherscan.io/token/${tx.contractAddress}`;
|
|
||||||
tokenContractEl.innerHTML =
|
|
||||||
`<div class="flex items-center">${dot}` +
|
|
||||||
copyableHtml(tx.contractAddress, "break-all") +
|
|
||||||
etherscanLinkHtml(link) +
|
|
||||||
`</div>`;
|
|
||||||
tokenContractSection.classList.remove("hidden");
|
|
||||||
} else {
|
|
||||||
tokenContractSection.classList.add("hidden");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Hide calldata and raw data sections; always fetch full tx details
|
|
||||||
const calldataSection = $("tx-detail-calldata-section");
|
const calldataSection = $("tx-detail-calldata-section");
|
||||||
if (calldataSection) calldataSection.classList.add("hidden");
|
if (calldataSection) calldataSection.classList.add("hidden");
|
||||||
const rawDataSection = $("tx-detail-rawdata-section");
|
const rawDataSection = $("tx-detail-rawdata-section");
|
||||||
if (rawDataSection) rawDataSection.classList.add("hidden");
|
if (rawDataSection) rawDataSection.classList.add("hidden");
|
||||||
|
|
||||||
// Hide on-chain detail sections (and their group wrapper) until populated
|
if (tx.isContractCall || tx.direction === "contract") {
|
||||||
const onchainGroup = $("tx-detail-onchain-group");
|
loadCalldata(tx.hash, tx.to);
|
||||||
if (onchainGroup) onchainGroup.classList.add("hidden");
|
|
||||||
for (const id of [
|
|
||||||
"tx-detail-block-section",
|
|
||||||
"tx-detail-nonce-section",
|
|
||||||
"tx-detail-fee-section",
|
|
||||||
"tx-detail-gasprice-section",
|
|
||||||
"tx-detail-gasused-section",
|
|
||||||
]) {
|
|
||||||
const el = $(id);
|
|
||||||
if (el) el.classList.add("hidden");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
loadFullTxDetails(tx.hash, tx.to, tx.isContractCall);
|
|
||||||
|
|
||||||
const isoStr = isoDate(tx.timestamp);
|
const isoStr = isoDate(tx.timestamp);
|
||||||
$("tx-detail-time").innerHTML =
|
$("tx-detail-time").innerHTML =
|
||||||
copyableHtml(isoStr) + " (" + escapeHtml(timeAgo(tx.timestamp)) + ")";
|
copyableHtml(isoStr) + " (" + escapeHtml(timeAgo(tx.timestamp)) + ")";
|
||||||
@@ -224,108 +177,7 @@ function render() {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
function showDetailField(sectionId, contentId, value) {
|
async function loadCalldata(txHash, toAddress) {
|
||||||
const section = $(sectionId);
|
|
||||||
const el = $(contentId);
|
|
||||||
if (!section || !el) return;
|
|
||||||
el.innerHTML = copyableHtml(value, "");
|
|
||||||
section.classList.remove("hidden");
|
|
||||||
}
|
|
||||||
|
|
||||||
function populateOnChainDetails(txData) {
|
|
||||||
// Block number
|
|
||||||
if (txData.block_number != null) {
|
|
||||||
const blockLink = `https://etherscan.io/block/${txData.block_number}`;
|
|
||||||
const blockSection = $("tx-detail-block-section");
|
|
||||||
const blockEl = $("tx-detail-block");
|
|
||||||
if (blockSection && blockEl) {
|
|
||||||
blockEl.innerHTML =
|
|
||||||
copyableHtml(String(txData.block_number), "") +
|
|
||||||
etherscanLinkHtml(blockLink);
|
|
||||||
blockSection.classList.remove("hidden");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Nonce
|
|
||||||
if (txData.nonce != null) {
|
|
||||||
showDetailField(
|
|
||||||
"tx-detail-nonce-section",
|
|
||||||
"tx-detail-nonce",
|
|
||||||
String(txData.nonce),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Transaction fee
|
|
||||||
const feeWei = txData.fee?.value || txData.tx_fee;
|
|
||||||
if (feeWei) {
|
|
||||||
const feeEth = formatEther(String(feeWei));
|
|
||||||
showDetailField(
|
|
||||||
"tx-detail-fee-section",
|
|
||||||
"tx-detail-fee",
|
|
||||||
feeEth + " ETH",
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Gas price
|
|
||||||
const gasPrice = txData.gas_price;
|
|
||||||
if (gasPrice) {
|
|
||||||
const gwei = formatUnits(String(gasPrice), "gwei");
|
|
||||||
showDetailField(
|
|
||||||
"tx-detail-gasprice-section",
|
|
||||||
"tx-detail-gasprice",
|
|
||||||
gwei + " Gwei",
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Gas used
|
|
||||||
const gasUsed = txData.gas_used;
|
|
||||||
if (gasUsed) {
|
|
||||||
showDetailField(
|
|
||||||
"tx-detail-gasused-section",
|
|
||||||
"tx-detail-gasused",
|
|
||||||
String(gasUsed),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Show the on-chain details group if any child section is visible
|
|
||||||
const onchainGroup = $("tx-detail-onchain-group");
|
|
||||||
if (onchainGroup) {
|
|
||||||
const hasVisible = [
|
|
||||||
"tx-detail-block-section",
|
|
||||||
"tx-detail-nonce-section",
|
|
||||||
"tx-detail-fee-section",
|
|
||||||
"tx-detail-gasprice-section",
|
|
||||||
"tx-detail-gasused-section",
|
|
||||||
].some((id) => {
|
|
||||||
const el = $(id);
|
|
||||||
return el && !el.classList.contains("hidden");
|
|
||||||
});
|
|
||||||
if (hasVisible) {
|
|
||||||
onchainGroup.classList.remove("hidden");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Bind copy handlers for newly added elements
|
|
||||||
for (const id of [
|
|
||||||
"tx-detail-block-section",
|
|
||||||
"tx-detail-nonce-section",
|
|
||||||
"tx-detail-fee-section",
|
|
||||||
"tx-detail-gasprice-section",
|
|
||||||
"tx-detail-gasused-section",
|
|
||||||
]) {
|
|
||||||
const section = $(id);
|
|
||||||
if (!section) continue;
|
|
||||||
section.querySelectorAll("[data-copy]").forEach((el) => {
|
|
||||||
el.onclick = () => {
|
|
||||||
navigator.clipboard.writeText(el.dataset.copy);
|
|
||||||
showFlash("Copied!");
|
|
||||||
flashCopyFeedback(el);
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async function loadFullTxDetails(txHash, toAddress, isContractCall) {
|
|
||||||
const section = $("tx-detail-calldata-section");
|
const section = $("tx-detail-calldata-section");
|
||||||
const actionEl = $("tx-detail-calldata-action");
|
const actionEl = $("tx-detail-calldata-action");
|
||||||
const detailsEl = $("tx-detail-calldata-details");
|
const detailsEl = $("tx-detail-calldata-details");
|
||||||
@@ -340,10 +192,6 @@ async function loadFullTxDetails(txHash, toAddress, isContractCall) {
|
|||||||
);
|
);
|
||||||
if (!resp.ok) return;
|
if (!resp.ok) return;
|
||||||
const txData = await resp.json();
|
const txData = await resp.json();
|
||||||
|
|
||||||
// Populate on-chain detail fields (block, nonce, gas, fee)
|
|
||||||
populateOnChainDetails(txData);
|
|
||||||
|
|
||||||
const inputData = txData.raw_input || txData.input || null;
|
const inputData = txData.raw_input || txData.input || null;
|
||||||
if (!inputData || inputData === "0x") return;
|
if (!inputData || inputData === "0x") return;
|
||||||
|
|
||||||
|
|||||||
114
src/shared/addressWarnings.js
Normal file
114
src/shared/addressWarnings.js
Normal file
@@ -0,0 +1,114 @@
|
|||||||
|
// Address warning module.
|
||||||
|
// Provides local and async (RPC-based) warning checks for Ethereum addresses.
|
||||||
|
// Returns arrays of {type, message, severity} objects.
|
||||||
|
|
||||||
|
const { isScamAddress } = require("./scamlist");
|
||||||
|
const { isBurnAddress } = require("./constants");
|
||||||
|
const { checkEtherscanLabel } = require("./etherscanLabels");
|
||||||
|
const { log } = require("./log");
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check an address against local-only lists (scam, burn, self-send).
|
||||||
|
* Synchronous — no network calls.
|
||||||
|
*
|
||||||
|
* @param {string} address - The target address to check.
|
||||||
|
* @param {object} [options] - Optional context.
|
||||||
|
* @param {string} [options.fromAddress] - Sender address (for self-send check).
|
||||||
|
* @returns {Array<{type: string, message: string, severity: string}>}
|
||||||
|
*/
|
||||||
|
function getLocalWarnings(address, options = {}) {
|
||||||
|
const warnings = [];
|
||||||
|
const addr = address.toLowerCase();
|
||||||
|
|
||||||
|
if (isScamAddress(addr)) {
|
||||||
|
warnings.push({
|
||||||
|
type: "scam",
|
||||||
|
message:
|
||||||
|
"This address is on a known scam/fraud list. Do not send funds to this address.",
|
||||||
|
severity: "critical",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isBurnAddress(addr)) {
|
||||||
|
warnings.push({
|
||||||
|
type: "burn",
|
||||||
|
message:
|
||||||
|
"This is a known null/burn address. Funds sent here are permanently destroyed and cannot be recovered.",
|
||||||
|
severity: "critical",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
if (options.fromAddress && addr === options.fromAddress.toLowerCase()) {
|
||||||
|
warnings.push({
|
||||||
|
type: "self-send",
|
||||||
|
message: "You are sending to your own address.",
|
||||||
|
severity: "warning",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
return warnings;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check an address against local lists AND via RPC queries.
|
||||||
|
* Async — performs network calls to check contract status and tx history.
|
||||||
|
*
|
||||||
|
* @param {string} address - The target address to check.
|
||||||
|
* @param {object} provider - An ethers.js provider instance.
|
||||||
|
* @param {object} [options] - Optional context.
|
||||||
|
* @param {string} [options.fromAddress] - Sender address (for self-send check).
|
||||||
|
* @returns {Promise<Array<{type: string, message: string, severity: string}>>}
|
||||||
|
*/
|
||||||
|
async function getFullWarnings(address, provider, options = {}) {
|
||||||
|
const warnings = getLocalWarnings(address, options);
|
||||||
|
|
||||||
|
let isContract = false;
|
||||||
|
try {
|
||||||
|
const code = await provider.getCode(address);
|
||||||
|
if (code && code !== "0x") {
|
||||||
|
isContract = true;
|
||||||
|
warnings.push({
|
||||||
|
type: "contract",
|
||||||
|
message:
|
||||||
|
"This address is a smart contract, not a regular wallet.",
|
||||||
|
severity: "warning",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
} catch (e) {
|
||||||
|
log.errorf("contract check failed:", e.message);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Skip tx count check for contracts — they may legitimately have
|
||||||
|
// zero inbound EOA transactions.
|
||||||
|
if (!isContract) {
|
||||||
|
try {
|
||||||
|
const txCount = await provider.getTransactionCount(address);
|
||||||
|
if (txCount === 0) {
|
||||||
|
warnings.push({
|
||||||
|
type: "new-address",
|
||||||
|
message:
|
||||||
|
"This address has never sent a transaction. Double-check it is correct.",
|
||||||
|
severity: "info",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
} catch (e) {
|
||||||
|
log.errorf("tx count check failed:", e.message);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Etherscan label check (best-effort async — network failures are silent).
|
||||||
|
// Runs for ALL addresses including contracts, since many dangerous
|
||||||
|
// flagged addresses on Etherscan (drainers, phishing contracts) are contracts.
|
||||||
|
try {
|
||||||
|
const etherscanWarning = await checkEtherscanLabel(address);
|
||||||
|
if (etherscanWarning) {
|
||||||
|
warnings.push(etherscanWarning);
|
||||||
|
}
|
||||||
|
} catch (e) {
|
||||||
|
log.errorf("etherscan label check failed:", e.message);
|
||||||
|
}
|
||||||
|
|
||||||
|
return warnings;
|
||||||
|
}
|
||||||
|
|
||||||
|
module.exports = { getLocalWarnings, getFullWarnings };
|
||||||
@@ -20,6 +20,19 @@ const ERC20_ABI = [
|
|||||||
"function approve(address spender, uint256 amount) returns (bool)",
|
"function approve(address spender, uint256 amount) returns (bool)",
|
||||||
];
|
];
|
||||||
|
|
||||||
|
// Known null/burn addresses that permanently destroy funds.
|
||||||
|
const BURN_ADDRESSES = new Set([
|
||||||
|
"0x0000000000000000000000000000000000000000",
|
||||||
|
"0x0000000000000000000000000000000000000001",
|
||||||
|
"0x000000000000000000000000000000000000dead",
|
||||||
|
"0xdead000000000000000000000000000000000000",
|
||||||
|
"0x00000000000000000000000000000000deadbeef",
|
||||||
|
]);
|
||||||
|
|
||||||
|
function isBurnAddress(address) {
|
||||||
|
return BURN_ADDRESSES.has(address.toLowerCase());
|
||||||
|
}
|
||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
DEBUG,
|
DEBUG,
|
||||||
DEBUG_MNEMONIC,
|
DEBUG_MNEMONIC,
|
||||||
@@ -28,4 +41,6 @@ module.exports = {
|
|||||||
DEFAULT_BLOCKSCOUT_URL,
|
DEFAULT_BLOCKSCOUT_URL,
|
||||||
BIP44_ETH_PATH,
|
BIP44_ETH_PATH,
|
||||||
ERC20_ABI,
|
ERC20_ABI,
|
||||||
|
BURN_ADDRESSES,
|
||||||
|
isBurnAddress,
|
||||||
};
|
};
|
||||||
|
|||||||
102
src/shared/etherscanLabels.js
Normal file
102
src/shared/etherscanLabels.js
Normal file
@@ -0,0 +1,102 @@
|
|||||||
|
// Etherscan address label lookup via page scraping.
|
||||||
|
// Extension users make the requests directly to Etherscan — no proxy needed.
|
||||||
|
// This is a best-effort enrichment: network failures return null silently.
|
||||||
|
|
||||||
|
const ETHERSCAN_BASE = "https://etherscan.io/address/";
|
||||||
|
|
||||||
|
// Patterns in the page title that indicate a flagged address.
|
||||||
|
// Title format: "Fake_Phishing184810 | Address: 0x... | Etherscan"
|
||||||
|
const PHISHING_LABEL_PATTERNS = [/^Fake_Phishing/i, /^Phish:/i, /^Exploiter/i];
|
||||||
|
|
||||||
|
// Patterns in the page body that indicate a scam/phishing warning.
|
||||||
|
const SCAM_BODY_PATTERNS = [
|
||||||
|
/used in a\s+(?:\w+\s+)?phishing scam/i,
|
||||||
|
/used in a\s+(?:\w+\s+)?scam/i,
|
||||||
|
/wallet\s+drainer/i,
|
||||||
|
];
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Parse the Etherscan address page HTML to extract label info.
|
||||||
|
* Exported for unit testing (no fetch needed).
|
||||||
|
*
|
||||||
|
* @param {string} html - Raw HTML of the Etherscan address page.
|
||||||
|
* @returns {{ label: string|null, isPhishing: boolean, warning: string|null }}
|
||||||
|
*/
|
||||||
|
function parseEtherscanPage(html) {
|
||||||
|
// Extract <title> content
|
||||||
|
const titleMatch = html.match(/<title[^>]*>([^<]+)<\/title>/i);
|
||||||
|
let label = null;
|
||||||
|
let isPhishing = false;
|
||||||
|
let warning = null;
|
||||||
|
|
||||||
|
if (titleMatch) {
|
||||||
|
const title = titleMatch[1].trim();
|
||||||
|
// Title: "LABEL | Address: 0x... | Etherscan" or "Address: 0x... | Etherscan"
|
||||||
|
const labelMatch = title.match(/^(.+?)\s*\|\s*Address:/);
|
||||||
|
if (labelMatch) {
|
||||||
|
const candidate = labelMatch[1].trim();
|
||||||
|
// Only treat as a label if it's not just "Address" (unlabeled addresses)
|
||||||
|
if (candidate.toLowerCase() !== "address") {
|
||||||
|
label = candidate;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check label against phishing patterns
|
||||||
|
if (label) {
|
||||||
|
for (const pat of PHISHING_LABEL_PATTERNS) {
|
||||||
|
if (pat.test(label)) {
|
||||||
|
isPhishing = true;
|
||||||
|
warning = `Etherscan labels this address as "${label}" (Phish/Hack).`;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check page body for scam warning banners
|
||||||
|
if (!isPhishing) {
|
||||||
|
for (const pat of SCAM_BODY_PATTERNS) {
|
||||||
|
if (pat.test(html)) {
|
||||||
|
isPhishing = true;
|
||||||
|
warning = label
|
||||||
|
? `Etherscan labels this address as "${label}" and reports it was used in a scam.`
|
||||||
|
: "Etherscan reports this address was flagged for phishing/scam activity.";
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return { label, isPhishing, warning };
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Fetch an address page from Etherscan and check for scam/phishing labels.
|
||||||
|
* Returns a warning object if the address is flagged, or null.
|
||||||
|
* Network failures return null silently (best-effort check).
|
||||||
|
*
|
||||||
|
* @param {string} address - Ethereum address to check.
|
||||||
|
* @returns {Promise<{type: string, message: string, severity: string}|null>}
|
||||||
|
*/
|
||||||
|
async function checkEtherscanLabel(address) {
|
||||||
|
try {
|
||||||
|
const resp = await fetch(ETHERSCAN_BASE + address, {
|
||||||
|
headers: { Accept: "text/html" },
|
||||||
|
});
|
||||||
|
if (!resp.ok) return null;
|
||||||
|
const html = await resp.text();
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
if (result.isPhishing) {
|
||||||
|
return {
|
||||||
|
type: "etherscan-phishing",
|
||||||
|
message: result.warning,
|
||||||
|
severity: "critical",
|
||||||
|
};
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
} catch {
|
||||||
|
// Network errors are expected — Etherscan may rate-limit or block.
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module.exports = { parseEtherscanPage, checkEtherscanLabel };
|
||||||
297
src/shared/phishingDomains.js
Normal file
297
src/shared/phishingDomains.js
Normal file
@@ -0,0 +1,297 @@
|
|||||||
|
// Domain-based phishing detection using MetaMask's eth-phishing-detect blocklist.
|
||||||
|
//
|
||||||
|
// Architecture:
|
||||||
|
// 1. A vendored copy of the blocklist ships with the extension
|
||||||
|
// (src/data/phishing-domains.json — sorted blacklist for binary search).
|
||||||
|
// 2. Every 24h we fetch the latest list from MetaMask's repo and compute
|
||||||
|
// the delta (new domains not in the vendored snapshot).
|
||||||
|
// 3. Only the delta is kept in memory / persisted to chrome.storage.local.
|
||||||
|
// 4. Domain checks hit the delta first (fresh scam sites), then the
|
||||||
|
// vendored baseline via binary search.
|
||||||
|
//
|
||||||
|
// Source: https://github.com/MetaMask/eth-phishing-detect (src/config.json)
|
||||||
|
|
||||||
|
const vendoredConfig = require("../data/phishing-domains.json");
|
||||||
|
|
||||||
|
const BLOCKLIST_URL =
|
||||||
|
"https://raw.githubusercontent.com/MetaMask/eth-phishing-detect/main/src/config.json";
|
||||||
|
|
||||||
|
const CACHE_TTL_MS = 24 * 60 * 60 * 1000; // 24 hours
|
||||||
|
const DELTA_STORAGE_KEY = "phishing_domain_delta";
|
||||||
|
const DELTA_MAX_BYTES = 256 * 1024; // 256 KiB
|
||||||
|
|
||||||
|
// Vendored baseline — sorted arrays for binary search (no extra Set needed).
|
||||||
|
const vendoredBlacklist = vendoredConfig.blacklist; // pre-sorted lowercase
|
||||||
|
const vendoredWhitelist = new Set(
|
||||||
|
(vendoredConfig.whitelist || []).map((d) => d.toLowerCase()),
|
||||||
|
);
|
||||||
|
|
||||||
|
// Delta state — only domains added upstream since the vendored snapshot.
|
||||||
|
let deltaBlacklistSet = new Set();
|
||||||
|
let deltaWhitelistSet = new Set();
|
||||||
|
let lastFetchTime = 0;
|
||||||
|
let fetchPromise = null;
|
||||||
|
let persistedDeltaLoaded = false;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Normalize a domain entry: lowercase and strip wildcard prefix ("*.").
|
||||||
|
* Wildcard domains like "*.evil.com" become "evil.com" — our subdomain
|
||||||
|
* matching in hostnameVariants() already covers child domains.
|
||||||
|
*
|
||||||
|
* @param {string} domain
|
||||||
|
* @returns {string}
|
||||||
|
*/
|
||||||
|
function normalizeDomain(domain) {
|
||||||
|
const d = domain.toLowerCase();
|
||||||
|
return d.startsWith("*.") ? d.slice(2) : d;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Binary search on a sorted string array.
|
||||||
|
*
|
||||||
|
* @param {string[]} sorted - Sorted array of lowercase strings.
|
||||||
|
* @param {string} target - Lowercase string to find.
|
||||||
|
* @returns {boolean}
|
||||||
|
*/
|
||||||
|
function binarySearch(sorted, target) {
|
||||||
|
let lo = 0;
|
||||||
|
let hi = sorted.length - 1;
|
||||||
|
while (lo <= hi) {
|
||||||
|
const mid = (lo + hi) >>> 1;
|
||||||
|
if (sorted[mid] === target) return true;
|
||||||
|
if (sorted[mid] < target) lo = mid + 1;
|
||||||
|
else hi = mid - 1;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Generate hostname variants for subdomain matching.
|
||||||
|
* "sub.evil.com" yields ["sub.evil.com", "evil.com"].
|
||||||
|
*
|
||||||
|
* @param {string} hostname
|
||||||
|
* @returns {string[]}
|
||||||
|
*/
|
||||||
|
function hostnameVariants(hostname) {
|
||||||
|
const h = hostname.toLowerCase();
|
||||||
|
const variants = [h];
|
||||||
|
const parts = h.split(".");
|
||||||
|
for (let i = 1; i < parts.length - 1; i++) {
|
||||||
|
variants.push(parts.slice(i).join("."));
|
||||||
|
}
|
||||||
|
return variants;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if a hostname is on the phishing blocklist.
|
||||||
|
* Checks delta (fresh additions) first, then vendored baseline.
|
||||||
|
* Whitelisted domains (vendored + delta) are never flagged.
|
||||||
|
*
|
||||||
|
* @param {string} hostname - The hostname to check.
|
||||||
|
* @returns {boolean}
|
||||||
|
*/
|
||||||
|
function isPhishingDomain(hostname) {
|
||||||
|
if (!hostname) return false;
|
||||||
|
const variants = hostnameVariants(hostname);
|
||||||
|
|
||||||
|
// Whitelist takes priority (both vendored and delta)
|
||||||
|
for (const v of variants) {
|
||||||
|
if (vendoredWhitelist.has(v) || deltaWhitelistSet.has(v)) return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check delta first — fresh scam sites hit here
|
||||||
|
for (const v of variants) {
|
||||||
|
if (deltaBlacklistSet.has(v)) return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check vendored baseline via binary search
|
||||||
|
for (const v of variants) {
|
||||||
|
if (binarySearch(vendoredBlacklist, v)) return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the storage API if available (chrome.storage.local / browser.storage.local).
|
||||||
|
*
|
||||||
|
* @returns {object|null}
|
||||||
|
*/
|
||||||
|
function getStorageApi() {
|
||||||
|
if (typeof browser !== "undefined" && browser.storage) {
|
||||||
|
return browser.storage.local;
|
||||||
|
}
|
||||||
|
if (typeof chrome !== "undefined" && chrome.storage) {
|
||||||
|
return chrome.storage.local;
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Load persisted delta from chrome.storage.local.
|
||||||
|
* Called once on first update to restore delta across restarts.
|
||||||
|
*
|
||||||
|
* @returns {Promise<void>}
|
||||||
|
*/
|
||||||
|
async function loadPersistedDelta() {
|
||||||
|
const storage = getStorageApi();
|
||||||
|
if (!storage) return;
|
||||||
|
|
||||||
|
try {
|
||||||
|
const result = await storage.get(DELTA_STORAGE_KEY);
|
||||||
|
const data = result[DELTA_STORAGE_KEY];
|
||||||
|
if (data && data.blacklist && data.whitelist) {
|
||||||
|
deltaBlacklistSet = new Set(data.blacklist);
|
||||||
|
deltaWhitelistSet = new Set(data.whitelist);
|
||||||
|
if (data.fetchTime) {
|
||||||
|
lastFetchTime = data.fetchTime;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch {
|
||||||
|
// Storage unavailable or corrupted — start fresh.
|
||||||
|
}
|
||||||
|
persistedDeltaLoaded = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Persist the current delta to chrome.storage.local if it fits in 256 KiB.
|
||||||
|
*
|
||||||
|
* @returns {Promise<void>}
|
||||||
|
*/
|
||||||
|
async function persistDelta() {
|
||||||
|
const storage = getStorageApi();
|
||||||
|
if (!storage) return;
|
||||||
|
|
||||||
|
const data = {
|
||||||
|
blacklist: Array.from(deltaBlacklistSet),
|
||||||
|
whitelist: Array.from(deltaWhitelistSet),
|
||||||
|
fetchTime: lastFetchTime,
|
||||||
|
};
|
||||||
|
|
||||||
|
const serialized = JSON.stringify(data);
|
||||||
|
if (serialized.length > DELTA_MAX_BYTES) {
|
||||||
|
// Delta too large to persist — keep in memory only.
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
await storage.set({ [DELTA_STORAGE_KEY]: data });
|
||||||
|
} catch {
|
||||||
|
// Storage write failed — non-fatal.
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Fetch the latest blocklist, compute delta against vendored baseline,
|
||||||
|
* and update in-memory state. De-duplicates concurrent fetches.
|
||||||
|
*
|
||||||
|
* @returns {Promise<void>}
|
||||||
|
*/
|
||||||
|
async function updatePhishingList() {
|
||||||
|
// Load persisted delta on first call
|
||||||
|
if (!persistedDeltaLoaded) {
|
||||||
|
await loadPersistedDelta();
|
||||||
|
}
|
||||||
|
|
||||||
|
// Skip if recently fetched
|
||||||
|
if (Date.now() - lastFetchTime < CACHE_TTL_MS) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// De-duplicate concurrent calls
|
||||||
|
if (fetchPromise) return fetchPromise;
|
||||||
|
|
||||||
|
fetchPromise = (async () => {
|
||||||
|
try {
|
||||||
|
const resp = await fetch(BLOCKLIST_URL);
|
||||||
|
if (!resp.ok) throw new Error("HTTP " + resp.status);
|
||||||
|
const config = await resp.json();
|
||||||
|
|
||||||
|
// Compute blacklist delta: remote items not in vendored baseline
|
||||||
|
const newDeltaBl = new Set();
|
||||||
|
for (const domain of config.blacklist || []) {
|
||||||
|
const d = normalizeDomain(domain);
|
||||||
|
if (!binarySearch(vendoredBlacklist, d)) {
|
||||||
|
newDeltaBl.add(d);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Compute whitelist delta: remote items not in vendored whitelist
|
||||||
|
const newDeltaWl = new Set();
|
||||||
|
for (const domain of config.whitelist || []) {
|
||||||
|
const d = normalizeDomain(domain);
|
||||||
|
if (!vendoredWhitelist.has(d)) {
|
||||||
|
newDeltaWl.add(d);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
deltaBlacklistSet = newDeltaBl;
|
||||||
|
deltaWhitelistSet = newDeltaWl;
|
||||||
|
lastFetchTime = Date.now();
|
||||||
|
|
||||||
|
await persistDelta();
|
||||||
|
} catch {
|
||||||
|
// Fetch failed — keep existing delta, retry next time.
|
||||||
|
} finally {
|
||||||
|
fetchPromise = null;
|
||||||
|
}
|
||||||
|
})();
|
||||||
|
|
||||||
|
return fetchPromise;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Load a pre-parsed config directly into state (vendored + delta combined).
|
||||||
|
* Used for testing.
|
||||||
|
*
|
||||||
|
* @param {{ blacklist?: string[], whitelist?: string[] }} config
|
||||||
|
*/
|
||||||
|
function loadConfig(config) {
|
||||||
|
// For tests: treat the entire config as delta (overlaid on vendored).
|
||||||
|
// Clear existing delta first.
|
||||||
|
deltaBlacklistSet = new Set((config.blacklist || []).map(normalizeDomain));
|
||||||
|
deltaWhitelistSet = new Set((config.whitelist || []).map(normalizeDomain));
|
||||||
|
lastFetchTime = Date.now();
|
||||||
|
persistedDeltaLoaded = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return total blocklist size (vendored + delta, for diagnostics).
|
||||||
|
*
|
||||||
|
* @returns {number}
|
||||||
|
*/
|
||||||
|
function getBlocklistSize() {
|
||||||
|
return vendoredBlacklist.length + deltaBlacklistSet.size;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return delta size (for diagnostics).
|
||||||
|
*
|
||||||
|
* @returns {number}
|
||||||
|
*/
|
||||||
|
function getDeltaSize() {
|
||||||
|
return deltaBlacklistSet.size;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Reset internal state (for testing).
|
||||||
|
*/
|
||||||
|
function _reset() {
|
||||||
|
deltaBlacklistSet = new Set();
|
||||||
|
deltaWhitelistSet = new Set();
|
||||||
|
lastFetchTime = 0;
|
||||||
|
fetchPromise = null;
|
||||||
|
persistedDeltaLoaded = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
module.exports = {
|
||||||
|
isPhishingDomain,
|
||||||
|
updatePhishingList,
|
||||||
|
loadConfig,
|
||||||
|
getBlocklistSize,
|
||||||
|
getDeltaSize,
|
||||||
|
hostnameVariants,
|
||||||
|
binarySearch,
|
||||||
|
normalizeDomain,
|
||||||
|
_reset,
|
||||||
|
};
|
||||||
File diff suppressed because it is too large
Load Diff
@@ -153,38 +153,24 @@ async function fetchRecentTransactions(address, blockscoutUrl, count = 25) {
|
|||||||
|
|
||||||
// When a token transfer shares a hash with a normal tx, the normal tx
|
// When a token transfer shares a hash with a normal tx, the normal tx
|
||||||
// is the contract call (0 ETH) and the token transfer has the real
|
// is the contract call (0 ETH) and the token transfer has the real
|
||||||
// amount and symbol. For contract calls (swaps), a single transaction
|
// amount and symbol. A single transaction (e.g. a swap) can produce
|
||||||
// can produce multiple token transfers (input, intermediates, output).
|
// multiple token transfers (one per token involved), so we key token
|
||||||
// We consolidate these into the original tx entry using the token
|
// transfers by hash + contract address to keep all of them. We also
|
||||||
// transfer where the user *receives* tokens (the swap output), so
|
// preserve contract-call metadata (direction, label, method) from the
|
||||||
// the transaction list shows the final result rather than confusing
|
// matching normal tx so swaps display correctly.
|
||||||
// intermediate hops. We preserve the original tx's from/to so the
|
|
||||||
// user sees their own address, not a router or Permit2 contract.
|
|
||||||
for (const tt of ttJson.items || []) {
|
for (const tt of ttJson.items || []) {
|
||||||
const parsed = parseTokenTransfer(tt, addrLower);
|
const parsed = parseTokenTransfer(tt, addrLower);
|
||||||
const existing = txsByHash.get(parsed.hash);
|
const existing = txsByHash.get(parsed.hash);
|
||||||
if (existing && existing.direction === "contract") {
|
if (existing && existing.direction === "contract") {
|
||||||
// For contract calls (swaps), consolidate into the original
|
parsed.direction = "contract";
|
||||||
// tx entry. Prefer the "received" transfer (swap output)
|
parsed.directionLabel = existing.directionLabel;
|
||||||
// for the display amount. If no received transfer exists,
|
parsed.isContractCall = true;
|
||||||
// fall back to the first "sent" transfer (swap input).
|
parsed.method = existing.method;
|
||||||
const isReceived = parsed.direction === "received";
|
// Remove the bare-hash normal tx so it doesn't appear as a
|
||||||
const needsAmount = !existing.exactValue;
|
// duplicate with empty value; token transfers replace it.
|
||||||
if (isReceived || needsAmount) {
|
txsByHash.delete(parsed.hash);
|
||||||
existing.value = parsed.value;
|
|
||||||
existing.exactValue = parsed.exactValue;
|
|
||||||
existing.rawAmount = parsed.rawAmount;
|
|
||||||
existing.rawUnit = parsed.rawUnit;
|
|
||||||
existing.symbol = parsed.symbol;
|
|
||||||
existing.contractAddress = parsed.contractAddress;
|
|
||||||
existing.holders = parsed.holders;
|
|
||||||
}
|
|
||||||
// Keep the original tx's from/to (the user's address and the
|
|
||||||
// contract they called), not the token transfer's from/to
|
|
||||||
// which may be a router or Permit2 contract.
|
|
||||||
continue;
|
|
||||||
}
|
}
|
||||||
// Non-contract token transfers get their own entries.
|
// Use composite key so multiple token transfers per tx are kept.
|
||||||
const ttKey = parsed.hash + ":" + (parsed.contractAddress || "");
|
const ttKey = parsed.hash + ":" + (parsed.contractAddress || "");
|
||||||
txsByHash.set(ttKey, parsed);
|
txsByHash.set(ttKey, parsed);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -359,12 +359,9 @@ function decode(data, toAddress) {
|
|||||||
const s = decodeV3SwapExactIn(inputs[i]);
|
const s = decodeV3SwapExactIn(inputs[i]);
|
||||||
if (s) {
|
if (s) {
|
||||||
if (!inputToken) inputToken = s.tokenIn;
|
if (!inputToken) inputToken = s.tokenIn;
|
||||||
|
if (!outputToken) outputToken = s.tokenOut;
|
||||||
if (!inputAmount) inputAmount = s.amountIn;
|
if (!inputAmount) inputAmount = s.amountIn;
|
||||||
// Always update output: in multi-step swaps (V3 → V4),
|
if (!minOutput) minOutput = s.amountOutMin;
|
||||||
// the last swap step determines the final output token
|
|
||||||
// and minimum received amount.
|
|
||||||
outputToken = s.tokenOut;
|
|
||||||
minOutput = s.amountOutMin;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -372,9 +369,9 @@ function decode(data, toAddress) {
|
|||||||
const s = decodeV2SwapExactIn(inputs[i]);
|
const s = decodeV2SwapExactIn(inputs[i]);
|
||||||
if (s) {
|
if (s) {
|
||||||
if (!inputToken) inputToken = s.tokenIn;
|
if (!inputToken) inputToken = s.tokenIn;
|
||||||
|
if (!outputToken) outputToken = s.tokenOut;
|
||||||
if (!inputAmount) inputAmount = s.amountIn;
|
if (!inputAmount) inputAmount = s.amountIn;
|
||||||
outputToken = s.tokenOut;
|
if (!minOutput) minOutput = s.amountOutMin;
|
||||||
minOutput = s.amountOutMin;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -391,11 +388,12 @@ function decode(data, toAddress) {
|
|||||||
const v4 = decodeV4Swap(inputs[i]);
|
const v4 = decodeV4Swap(inputs[i]);
|
||||||
if (v4) {
|
if (v4) {
|
||||||
if (!inputToken && v4.tokenIn) inputToken = v4.tokenIn;
|
if (!inputToken && v4.tokenIn) inputToken = v4.tokenIn;
|
||||||
|
if (!outputToken && v4.tokenOut)
|
||||||
|
outputToken = v4.tokenOut;
|
||||||
if (!inputAmount && v4.amountIn)
|
if (!inputAmount && v4.amountIn)
|
||||||
inputAmount = v4.amountIn;
|
inputAmount = v4.amountIn;
|
||||||
// Always update output: last swap step wins
|
if (!minOutput && v4.amountOutMin)
|
||||||
if (v4.tokenOut) outputToken = v4.tokenOut;
|
minOutput = v4.amountOutMin;
|
||||||
if (v4.amountOutMin) minOutput = v4.amountOutMin;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
100
tests/etherscanLabels.test.js
Normal file
100
tests/etherscanLabels.test.js
Normal file
@@ -0,0 +1,100 @@
|
|||||||
|
const { parseEtherscanPage } = require("../src/shared/etherscanLabels");
|
||||||
|
|
||||||
|
describe("etherscanLabels", () => {
|
||||||
|
describe("parseEtherscanPage", () => {
|
||||||
|
test("detects Fake_Phishing label in title", () => {
|
||||||
|
const html = `<html><head><title>Fake_Phishing184810 | Address: 0x00000c07...3ea470000 | Etherscan</title></head><body></body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBe("Fake_Phishing184810");
|
||||||
|
expect(result.isPhishing).toBe(true);
|
||||||
|
expect(result.warning).toContain("Fake_Phishing184810");
|
||||||
|
expect(result.warning).toContain("Phish/Hack");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("detects Fake_Phishing with different number", () => {
|
||||||
|
const html = `<html><head><title>Fake_Phishing5169 | Address: 0x3e0defb8...99a7a8a74 | Etherscan</title></head><body></body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBe("Fake_Phishing5169");
|
||||||
|
expect(result.isPhishing).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("detects Exploiter label", () => {
|
||||||
|
const html = `<html><head><title>Exploiter 42 | Address: 0xabcdef...1234 | Etherscan</title></head><body></body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBe("Exploiter 42");
|
||||||
|
expect(result.isPhishing).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("detects scam warning in body text", () => {
|
||||||
|
const html =
|
||||||
|
`<html><head><title>Address: 0xabcdef...1234 | Etherscan</title></head>` +
|
||||||
|
`<body>There are reports that this address was used in a Phishing scam.</body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBeNull();
|
||||||
|
expect(result.isPhishing).toBe(true);
|
||||||
|
expect(result.warning).toContain("phishing/scam");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("detects scam warning with label in body", () => {
|
||||||
|
const html =
|
||||||
|
`<html><head><title>SomeScammer | Address: 0xabcdef...1234 | Etherscan</title></head>` +
|
||||||
|
`<body>There are reports that this address was used in a scam.</body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBe("SomeScammer");
|
||||||
|
expect(result.isPhishing).toBe(true);
|
||||||
|
expect(result.warning).toContain("SomeScammer");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("returns clean result for legitimate address", () => {
|
||||||
|
const html = `<html><head><title>vitalik.eth | Address: 0xd8dA6BF2...37aA96045 | Etherscan</title></head><body>Overview</body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBe("vitalik.eth");
|
||||||
|
expect(result.isPhishing).toBe(false);
|
||||||
|
expect(result.warning).toBeNull();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("returns clean result for unlabeled address", () => {
|
||||||
|
const html = `<html><head><title>Address: 0x1234567890...abcdef | Etherscan</title></head><body>Overview</body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBeNull();
|
||||||
|
expect(result.isPhishing).toBe(false);
|
||||||
|
expect(result.warning).toBeNull();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles exchange labels correctly (not phishing)", () => {
|
||||||
|
const html = `<html><head><title>Coinbase 10 | Address: 0xa9d1e08c...b81d3e43 | Etherscan</title></head><body>Overview</body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBe("Coinbase 10");
|
||||||
|
expect(result.isPhishing).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles contract names correctly (not phishing)", () => {
|
||||||
|
const html = `<html><head><title>Beacon Deposit Contract | Address: 0x00000000...03d7705Fa | Etherscan</title></head><body>Overview</body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBe("Beacon Deposit Contract");
|
||||||
|
expect(result.isPhishing).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles empty HTML gracefully", () => {
|
||||||
|
const result = parseEtherscanPage("");
|
||||||
|
expect(result.label).toBeNull();
|
||||||
|
expect(result.isPhishing).toBe(false);
|
||||||
|
expect(result.warning).toBeNull();
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles malformed title tag", () => {
|
||||||
|
const html = `<html><head><title></title></head><body></body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.label).toBeNull();
|
||||||
|
expect(result.isPhishing).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("detects wallet drainer warning", () => {
|
||||||
|
const html =
|
||||||
|
`<html><head><title>Address: 0xabc...def | Etherscan</title></head>` +
|
||||||
|
`<body>This is a known wallet drainer contract.</body></html>`;
|
||||||
|
const result = parseEtherscanPage(html);
|
||||||
|
expect(result.isPhishing).toBe(true);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
247
tests/phishingDomains.test.js
Normal file
247
tests/phishingDomains.test.js
Normal file
@@ -0,0 +1,247 @@
|
|||||||
|
const {
|
||||||
|
isPhishingDomain,
|
||||||
|
loadConfig,
|
||||||
|
getBlocklistSize,
|
||||||
|
getDeltaSize,
|
||||||
|
hostnameVariants,
|
||||||
|
binarySearch,
|
||||||
|
normalizeDomain,
|
||||||
|
_reset,
|
||||||
|
} = require("../src/shared/phishingDomains");
|
||||||
|
|
||||||
|
// The vendored baseline is loaded automatically via require().
|
||||||
|
// _reset() clears only the delta state, not the vendored baseline.
|
||||||
|
beforeEach(() => {
|
||||||
|
_reset();
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("phishingDomains", () => {
|
||||||
|
describe("hostnameVariants", () => {
|
||||||
|
test("returns exact hostname plus parent domains", () => {
|
||||||
|
const variants = hostnameVariants("sub.evil.com");
|
||||||
|
expect(variants).toEqual(["sub.evil.com", "evil.com"]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("returns just the hostname for a bare domain", () => {
|
||||||
|
const variants = hostnameVariants("example.com");
|
||||||
|
expect(variants).toEqual(["example.com"]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles deep subdomain chains", () => {
|
||||||
|
const variants = hostnameVariants("a.b.c.d.com");
|
||||||
|
expect(variants).toEqual([
|
||||||
|
"a.b.c.d.com",
|
||||||
|
"b.c.d.com",
|
||||||
|
"c.d.com",
|
||||||
|
"d.com",
|
||||||
|
]);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("lowercases hostnames", () => {
|
||||||
|
const variants = hostnameVariants("Evil.COM");
|
||||||
|
expect(variants).toEqual(["evil.com"]);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("binarySearch", () => {
|
||||||
|
const sorted = ["alpha.com", "beta.com", "gamma.com", "zeta.com"];
|
||||||
|
|
||||||
|
test("finds existing elements", () => {
|
||||||
|
expect(binarySearch(sorted, "alpha.com")).toBe(true);
|
||||||
|
expect(binarySearch(sorted, "gamma.com")).toBe(true);
|
||||||
|
expect(binarySearch(sorted, "zeta.com")).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("returns false for missing elements", () => {
|
||||||
|
expect(binarySearch(sorted, "aaa.com")).toBe(false);
|
||||||
|
expect(binarySearch(sorted, "delta.com")).toBe(false);
|
||||||
|
expect(binarySearch(sorted, "zzz.com")).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles empty array", () => {
|
||||||
|
expect(binarySearch([], "anything")).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles single-element array", () => {
|
||||||
|
expect(binarySearch(["only.com"], "only.com")).toBe(true);
|
||||||
|
expect(binarySearch(["only.com"], "other.com")).toBe(false);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("normalizeDomain", () => {
|
||||||
|
test("strips *. wildcard prefix", () => {
|
||||||
|
expect(normalizeDomain("*.evil.com")).toBe("evil.com");
|
||||||
|
expect(normalizeDomain("*.sub.evil.com")).toBe("sub.evil.com");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("lowercases domains", () => {
|
||||||
|
expect(normalizeDomain("Evil.COM")).toBe("evil.com");
|
||||||
|
expect(normalizeDomain("*.Evil.COM")).toBe("evil.com");
|
||||||
|
});
|
||||||
|
|
||||||
|
test("passes through normal domains unchanged", () => {
|
||||||
|
expect(normalizeDomain("example.com")).toBe("example.com");
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("wildcard domain handling", () => {
|
||||||
|
test("wildcard blacklist entries match via loadConfig", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["*.scam-site.com", "normal-scam.com"],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
// *.scam-site.com is normalized to scam-site.com
|
||||||
|
expect(isPhishingDomain("scam-site.com")).toBe(true);
|
||||||
|
expect(isPhishingDomain("sub.scam-site.com")).toBe(true);
|
||||||
|
expect(isPhishingDomain("normal-scam.com")).toBe(true);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("vendored baseline detection", () => {
|
||||||
|
// These tests verify that the vendored phishing-domains.json
|
||||||
|
// is loaded and searchable without any delta loaded.
|
||||||
|
|
||||||
|
test("getBlocklistSize reflects vendored list (no delta)", () => {
|
||||||
|
// The vendored list has 231k+ domains; delta is empty after reset.
|
||||||
|
expect(getBlocklistSize()).toBeGreaterThan(200000);
|
||||||
|
expect(getDeltaSize()).toBe(0);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("returns false for clean domains against vendored list", () => {
|
||||||
|
expect(isPhishingDomain("google.com")).toBe(false);
|
||||||
|
expect(isPhishingDomain("github.com")).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("returns false for empty/null hostname", () => {
|
||||||
|
expect(isPhishingDomain("")).toBe(false);
|
||||||
|
expect(isPhishingDomain(null)).toBe(false);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("delta (loadConfig) + isPhishingDomain", () => {
|
||||||
|
test("detects domains loaded into delta via loadConfig", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["evil-phishing.com", "scam-swap.xyz"],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("evil-phishing.com")).toBe(true);
|
||||||
|
expect(isPhishingDomain("scam-swap.xyz")).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("detects subdomain of delta-blacklisted domain", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["evil-phishing.com"],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("app.evil-phishing.com")).toBe(true);
|
||||||
|
expect(isPhishingDomain("sub.app.evil-phishing.com")).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("delta whitelist overrides delta blacklist", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["metamask.io"],
|
||||||
|
whitelist: ["metamask.io"],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("metamask.io")).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("delta whitelist on parent domain overrides blacklist", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["sub.legit.com"],
|
||||||
|
whitelist: ["legit.com"],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("sub.legit.com")).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("case-insensitive matching in delta", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["Evil-Phishing.COM"],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("evil-phishing.com")).toBe(true);
|
||||||
|
expect(isPhishingDomain("EVIL-PHISHING.COM")).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("getDeltaSize reflects loaded delta", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["a.com", "b.com", "c.com"],
|
||||||
|
whitelist: ["d.com"],
|
||||||
|
});
|
||||||
|
expect(getDeltaSize()).toBe(3);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("re-loading config replaces previous delta", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["old-scam.com"],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("old-scam.com")).toBe(true);
|
||||||
|
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["new-scam.com"],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("old-scam.com")).toBe(false);
|
||||||
|
expect(isPhishingDomain("new-scam.com")).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("handles config with no blacklist/whitelist keys", () => {
|
||||||
|
loadConfig({});
|
||||||
|
expect(getDeltaSize()).toBe(0);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("real-world MetaMask blocklist patterns (via delta)", () => {
|
||||||
|
test("detects known phishing domains loaded as delta", () => {
|
||||||
|
loadConfig({
|
||||||
|
blacklist: [
|
||||||
|
"uniswap-trade.web.app",
|
||||||
|
"hopprotocol.pro",
|
||||||
|
"blast-pools.pages.dev",
|
||||||
|
],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("uniswap-trade.web.app")).toBe(true);
|
||||||
|
expect(isPhishingDomain("hopprotocol.pro")).toBe(true);
|
||||||
|
expect(isPhishingDomain("blast-pools.pages.dev")).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("delta whitelist overrides vendored blacklist entries", () => {
|
||||||
|
// If a domain is in the vendored blacklist but a fresh whitelist
|
||||||
|
// update adds it, the whitelist should win.
|
||||||
|
loadConfig({
|
||||||
|
blacklist: [],
|
||||||
|
whitelist: ["opensea.io", "metamask.io", "etherscan.io"],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain("opensea.io")).toBe(false);
|
||||||
|
expect(isPhishingDomain("metamask.io")).toBe(false);
|
||||||
|
expect(isPhishingDomain("etherscan.io")).toBe(false);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe("delta + vendored interaction", () => {
|
||||||
|
test("delta blacklist entries are found even with empty vendored match", () => {
|
||||||
|
// This domain is (almost certainly) not in the vendored list
|
||||||
|
const uniqueDomain =
|
||||||
|
"test-unique-domain-not-in-vendored-" +
|
||||||
|
Date.now() +
|
||||||
|
".example.com";
|
||||||
|
expect(isPhishingDomain(uniqueDomain)).toBe(false);
|
||||||
|
|
||||||
|
loadConfig({
|
||||||
|
blacklist: [uniqueDomain],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
expect(isPhishingDomain(uniqueDomain)).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
test("getBlocklistSize includes both vendored and delta", () => {
|
||||||
|
const baseSize = getBlocklistSize();
|
||||||
|
loadConfig({
|
||||||
|
blacklist: ["new-a.com", "new-b.com"],
|
||||||
|
whitelist: [],
|
||||||
|
});
|
||||||
|
expect(getBlocklistSize()).toBe(baseSize + 2);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
Reference in New Issue
Block a user