neoneo-go/pkg
Anna Shaleva e30e262e66 network: forbid Notary contract to be a sender of main transaction
This prevents the possible attack on notary request sender when
malicious partie is allowed to send notary request with main transaction
being someone else's fallback.

Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
2023-08-01 17:44:24 +03:00
..
compiler compiler: don't panic, return error for strange range loops 2023-01-11 16:21:40 +03:00
config config: do not allow negative validators count 2023-08-01 17:22:39 +03:00
consensus consensus: perform batched chain's block sync 2023-03-15 17:45:56 +03:00
core core: prevent direct access to Notary contract if not active 2023-08-01 17:30:11 +03:00
crypto *: fix Neo and NeoGo misuses 2022-12-07 17:29:09 +03:00
encoding bigint: don't reallocate big.Int in ToBytes(), fix #2864 2023-01-10 22:51:45 +03:00
interop interop: add getContractByID and getContractHashes to management 2022-12-02 10:54:45 +03:00
io *: fix Neo and NeoGo misuses 2022-12-07 17:29:09 +03:00
neorpc config: use uint32 for validators/committee members count 2023-08-01 17:22:28 +03:00
neotest config: replace VerifyBlocks with SkipBlockVerification 2022-12-07 17:35:56 +03:00
network network: forbid Notary contract to be a sender of main transaction 2023-08-01 17:44:24 +03:00
rpcclient rpcclient: close subscriber channels on wsReader exit 2023-08-01 17:29:14 +03:00
services services/rpcsrv: Wait for subscription process to complete when stopped 2023-08-01 17:27:21 +03:00
smartcontract rpcbinding: fix wrappers for Any type, fix #2898 2023-02-18 00:06:45 +03:00
util slice: add Clean microfunction 2022-09-02 14:44:32 +03:00
vm interop/contract: fix state rollbacks for nested contexts 2023-06-29 11:58:12 +03:00
wallet Merge pull request #2725 from nspcc-dev/move-cli-tests 2022-10-06 13:43:39 +07:00