Ricardo Guilherme Schmidt e41d847667
Add malicious ATA methods and corresponding integration tests
- Introduced a new Cargo.toml for the malicious ATA guest program.
- Implemented malicious ATA methods in `malicious_ata.rs`, including create, transfer, and burn functions that simulate malicious behavior.
- Updated the integration test suite to include tests for the malicious ATA program, ensuring it is rejected in various value paths.
- Enhanced existing tests to accommodate the new malicious ATA program and verify that it does not affect the expected state of the AMM.
2026-04-23 11:28:10 -03:00

16 lines
457 B
TOML

[package]
name = "integration_tests"
version = "0.1.0"
edition = "2021"
[dependencies]
nssa = { workspace = true }
nssa_core = { workspace = true, features = ["host"] }
amm_core = { workspace = true }
token_core = { workspace = true }
ata_core = { workspace = true }
token-methods = { path = "../token/methods" }
amm-methods = { path = "../amm/methods" }
ata-methods = { path = "../ata/methods" }
malicious-ata-methods = { path = "malicious_ata_methods" }