mirror of
https://github.com/logos-blockchain/lez-programs.git
synced 2026-05-19 07:29:32 +00:00
- Introduced a new Cargo.toml for the malicious ATA guest program. - Implemented malicious ATA methods in `malicious_ata.rs`, including create, transfer, and burn functions that simulate malicious behavior. - Updated the integration test suite to include tests for the malicious ATA program, ensuring it is rejected in various value paths. - Enhanced existing tests to accommodate the new malicious ATA program and verify that it does not affect the expected state of the AMM.
19 lines
558 B
TOML
19 lines
558 B
TOML
[package]
|
|
name = "malicious-ata-guest"
|
|
version = "0.1.0"
|
|
edition = "2021"
|
|
|
|
[workspace]
|
|
|
|
[[bin]]
|
|
name = "malicious_ata"
|
|
path = "src/bin/malicious_ata.rs"
|
|
|
|
[dependencies]
|
|
spel-framework = { git = "https://github.com/logos-co/spel.git", tag = "v0.2.0-rc.2", package = "spel-framework" }
|
|
nssa_core = { git = "https://github.com/logos-blockchain/logos-execution-zone.git", tag = "v0.2.0-rc1" }
|
|
risc0-zkvm = { version = "=3.0.5", default-features = false }
|
|
ata_core = { path = "../../../ata/core" }
|
|
serde = { version = "1.0", features = ["derive"] }
|
|
borsh = "1.5"
|