Skip to content

fix: disable scan for unsupported transactions#186

Draft
mikesposito wants to merge 5 commits intomainfrom
mikesposito/fix/disable-scan-for-unsupported-txs
Draft

fix: disable scan for unsupported transactions#186
mikesposito wants to merge 5 commits intomainfrom
mikesposito/fix/disable-scan-for-unsupported-txs

Conversation

@mikesposito
Copy link
Member

@mikesposito mikesposito commented Feb 3, 2026

The transaction simulation is being disabled for unsupported transactions to prevent unreliable estimates and potential errors during processing, that may confuse users.

Fixes https://consensyssoftware.atlassian.net/browse/NEB-386

@mikesposito mikesposito requested a review from a team as a code owner February 3, 2026 13:53
@mikesposito mikesposito marked this pull request as draft February 3, 2026 13:53
@mikesposito
Copy link
Member Author

@metamaskbot publish-preview

@github-actions
Copy link
Contributor

github-actions bot commented Feb 3, 2026

Preview builds have been published. See these instructions for more information about preview builds.

Expand for full list of packages and versions.
{
  "@metamask-previews/tron-wallet-snap": "1.20.0-preview-2895dbc"
}

Comment on lines 186 to 188
accountAddress: account.address,
parameters: {
from: context.scanParameters?.from ?? undefined,
to: context.scanParameters?.to ?? undefined,
data: context.scanParameters?.data ?? undefined,
value: context.scanParameters?.value ?? undefined,
},
transactionRawData: rawData,
origin,
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I felt like the expected shape of the scan parameters is a Blockaid detail, and should be handled internally by the SecurityAlertsApiClient, rather than api consumers around the snap codebase.

SecurityAlertsApiClient and TransactionScanService now accept a transactionRawData parameter instead of parameters for scan request.

@ulissesferreira
Copy link
Contributor

Note to continue: we just pass the data in, the client does what it needs to do regarding, checking if the simulation is supported, transforming the fields to correctly call it, throwing an error if unsupported

mikesposito and others added 4 commits February 20, 2026 15:05
Enhance security scan accuracy by limiting API calls to supported
contract types and adjusting confirmation button behavior based on
simulation accuracy.

The previous implementation attempted to scan all transaction types,
which could lead to misleading or irrelevant security alerts for
unsupported contracts. This PR introduces a `simulationAccurate` flag to
distinguish between reliable scans (for supported contracts) and
unreliable ones (for unsupported contracts or multiple contract calls).
For unreliable simulations, the "Estimated Changes" will be empty, and
the user will always be able to proceed, even if the scan itself returns
an error. For accurate simulations, the "Confirm" button will be blocked
if the scan encounters an error, ensuring users are only blocked when
the simulation is considered reliable.

---
<p><a
href="https://cursor.com/background-agent?bcId=bc-3af945ef-4817-4045-9ea9-6281fed76d50"><picture><source
media="(prefers-color-scheme: dark)"
srcset="https://cursor.com/assets/images/open-in-cursor-dark.png"><source
media="(prefers-color-scheme: light)"
srcset="https://cursor.com/assets/images/open-in-cursor-light.png"><img
alt="Open in Cursor" width="131" height="28"
src="https://cursor.com/assets/images/open-in-cursor-dark.png"></picture></a>&nbsp;<a
href="https://cursor.com/agents?id=bc-3af945ef-4817-4045-9ea9-6281fed76d50"><picture><source
media="(prefers-color-scheme: dark)"
srcset="https://cursor.com/assets/images/open-in-web-dark.png"><source
media="(prefers-color-scheme: light)"
srcset="https://cursor.com/assets/images/open-in-web-light.png"><img
alt="Open in Web" width="114" height="28"
src="https://cursor.com/assets/images/open-in-web-dark.png"></picture></a></p>

Co-authored-by: Cursor Agent <[email protected]>
@ulissesferreira ulissesferreira force-pushed the mikesposito/fix/disable-scan-for-unsupported-txs branch from 6f768c3 to e759dc0 Compare February 20, 2026 16:22
@ulissesferreira ulissesferreira force-pushed the mikesposito/fix/disable-scan-for-unsupported-txs branch from c8f46c4 to 785b3bb Compare March 2, 2026 14:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants