Preventing malicious or accidental corrupted address strings from being accepted is critical for security and fault tolerance.
Implementation Guidelines
Key Files: crates/core/src/types/ (in the test module).
- Provide dummy valid strkeys, mutate the last few validation characters, and assert that
Address::from_string correctly yields an error.
Expectations
What done looks like: Tests explicitly pass only when invalid strkeys are correctly rejected.
For any question, reach me on Discord: emry_ss
Preventing malicious or accidental corrupted address strings from being accepted is critical for security and fault tolerance.
Implementation Guidelines
Key Files:
crates/core/src/types/(in the test module).Address::from_stringcorrectly yields an error.Expectations
What done looks like: Tests explicitly pass only when invalid strkeys are correctly rejected.
For any question, reach me on Discord: emry_ss