All checks were successful
check / check (push) Successful in 14s
Major changes: - Fetch token balances and tx history from Blockscout API (configurable) - Remove manual token discovery (discoverTokens) in favor of Blockscout - HD address gap scanning on mnemonic import - Duplicate mnemonic detection on wallet add - EIP-6963 multi-wallet discovery + selectedAddress updates in inpage - Two-tier balance refresh: 10s while popup open, 60s background - Fix $0.00 flash before prices load (return null when no prices) - No-layout-shift: min-height on total value element - Aligned balance columns (42ch address width, consistent USD column) - All errors use flash messages instead of off-screen error divs - Settings gear in global title bar, add-wallet moved to settings pane - Settings wells with light grey background, configurable Blockscout URL - Consistent "< Back" buttons top-left on all views - Address titles (Address 1.1, 1.2, etc.) on main and detail views - Send view shows current balance of selected asset - Clickable affordance policy added to README - Shortened mnemonic backup warning - Fix broken background script constant imports
35 lines
1.4 KiB
JavaScript
35 lines
1.4 KiB
JavaScript
// Known scam/fraud addresses. Checked locally before sending.
|
|
// This is a best-effort blocklist — it does not replace due diligence.
|
|
//
|
|
// Policy: This list contains ONLY addresses involved in fraud — phishing,
|
|
// wallet drainers, address poisoning, and similar scams. It does NOT include
|
|
// addresses that are merely sanctioned or regulated in specific jurisdictions
|
|
// (e.g. Tornado Cash, OFAC SDN entries). AutistMask is used internationally
|
|
// and does not enforce jurisdiction-specific sanctions.
|
|
//
|
|
// Sources:
|
|
// - Known wallet-drainer contracts identified via Etherscan labels,
|
|
// MistTrack alerts, and community incident reports (e.g. address-
|
|
// poisoning campaigns, phishing kit deployments).
|
|
//
|
|
// All addresses lowercased for comparison.
|
|
|
|
const SCAM_ADDRESSES = new Set([
|
|
// Fake Uniswap phishing
|
|
"0x0000000000000000000000000000000000000001",
|
|
// Common address poisoning targets
|
|
"0x0000000000000000000000000000000000000000",
|
|
// Known drainer contracts (examples — expand as needed)
|
|
"0x00000000a991c429ee2ec6df19d40fe0c80088b8",
|
|
"0xae0ee0a63a2ce6baeeffe56e7714fb4efe48d419",
|
|
"0x3ee18b2214aff97000d974cf647e7c347e8fa585",
|
|
"0x55fe002aeff02f77364de339a1292923a15844b8",
|
|
"0x7f268357a8c2552623316e2562d90e642bb538e5",
|
|
]);
|
|
|
|
function isScamAddress(address) {
|
|
return SCAM_ADDRESSES.has(address.toLowerCase());
|
|
}
|
|
|
|
module.exports = { isScamAddress, SCAM_ADDRESSES };
|