Ricardo Guilherme Schmidt e41d847667
Add malicious ATA methods and corresponding integration tests
- Introduced a new Cargo.toml for the malicious ATA guest program.
- Implemented malicious ATA methods in `malicious_ata.rs`, including create, transfer, and burn functions that simulate malicious behavior.
- Updated the integration test suite to include tests for the malicious ATA program, ensuring it is rejected in various value paths.
- Enhanced existing tests to accommodate the new malicious ATA program and verify that it does not affect the expected state of the AMM.
2026-04-23 11:28:10 -03:00

19 lines
558 B
TOML

[package]
name = "malicious-ata-guest"
version = "0.1.0"
edition = "2021"
[workspace]
[[bin]]
name = "malicious_ata"
path = "src/bin/malicious_ata.rs"
[dependencies]
spel-framework = { git = "https://github.com/logos-co/spel.git", tag = "v0.2.0-rc.2", package = "spel-framework" }
nssa_core = { git = "https://github.com/logos-blockchain/logos-execution-zone.git", tag = "v0.2.0-rc1" }
risc0-zkvm = { version = "=3.0.5", default-features = false }
ata_core = { path = "../../../ata/core" }
serde = { version = "1.0", features = ["derive"] }
borsh = "1.5"