Skip to content

Commit f1bbab0

Browse files
authored
Update client code for 631aba7c89e34f532a7bdee84df32be3c64da506 (#31)
1 parent 051e64f commit f1bbab0

File tree

1 file changed

+113
-1
lines changed

1 file changed

+113
-1
lines changed

swagger_client/models/response_wrapper_address_contract_result.py

+113-1
Original file line numberDiff line numberDiff line change
@@ -31,57 +31,69 @@ class ResponseWrapperAddressContractResult(object):
3131
'cybercrime': 'str',
3232
'money_laundering': 'str',
3333
'number_of_malicious_contracts_created': 'str',
34+
'gas_abuse': 'str',
3435
'financial_crime': 'str',
3536
'darkweb_transactions': 'str',
37+
'reinit': 'str',
3638
'phishing_activities': 'str',
3739
'contract_address': 'str',
3840
'fake_kyc': 'str',
3941
'blacklist_doubt': 'str',
4042
'data_source': 'str',
43+
'fake_standard_interface': 'str',
4144
'stealing_attack': 'str',
4245
'blackmail_activities': 'str',
4346
'sanctioned': 'str',
4447
'malicious_mining_activities': 'str',
4548
'mixer': 'str',
49+
'fake_token': 'str',
4650
'honeypot_related_address': 'str'
4751
}
4852

4953
attribute_map = {
5054
'cybercrime': 'cybercrime',
5155
'money_laundering': 'money_laundering',
5256
'number_of_malicious_contracts_created': 'number_of_malicious_contracts_created',
57+
'gas_abuse': 'gas_abuse',
5358
'financial_crime': 'financial_crime',
5459
'darkweb_transactions': 'darkweb_transactions',
60+
'reinit': 'reinit',
5561
'phishing_activities': 'phishing_activities',
5662
'contract_address': 'contract_address',
5763
'fake_kyc': 'fake_kyc',
5864
'blacklist_doubt': 'blacklist_doubt',
5965
'data_source': 'data_source',
66+
'fake_standard_interface': 'fake_standard_interface',
6067
'stealing_attack': 'stealing_attack',
6168
'blackmail_activities': 'blackmail_activities',
6269
'sanctioned': 'sanctioned',
6370
'malicious_mining_activities': 'malicious_mining_activities',
6471
'mixer': 'mixer',
72+
'fake_token': 'fake_token',
6573
'honeypot_related_address': 'honeypot_related_address'
6674
}
6775

68-
def __init__(self, cybercrime=None, money_laundering=None, number_of_malicious_contracts_created=None, financial_crime=None, darkweb_transactions=None, phishing_activities=None, contract_address=None, fake_kyc=None, blacklist_doubt=None, data_source=None, stealing_attack=None, blackmail_activities=None, sanctioned=None, malicious_mining_activities=None, mixer=None, honeypot_related_address=None): # noqa: E501
76+
def __init__(self, cybercrime=None, money_laundering=None, number_of_malicious_contracts_created=None, gas_abuse=None, financial_crime=None, darkweb_transactions=None, reinit=None, phishing_activities=None, contract_address=None, fake_kyc=None, blacklist_doubt=None, data_source=None, fake_standard_interface=None, stealing_attack=None, blackmail_activities=None, sanctioned=None, malicious_mining_activities=None, mixer=None, fake_token=None, honeypot_related_address=None): # noqa: E501
6977
"""ResponseWrapperAddressContractResult - a model defined in Swagger""" # noqa: E501
7078
self._cybercrime = None
7179
self._money_laundering = None
7280
self._number_of_malicious_contracts_created = None
81+
self._gas_abuse = None
7382
self._financial_crime = None
7483
self._darkweb_transactions = None
84+
self._reinit = None
7585
self._phishing_activities = None
7686
self._contract_address = None
7787
self._fake_kyc = None
7888
self._blacklist_doubt = None
7989
self._data_source = None
90+
self._fake_standard_interface = None
8091
self._stealing_attack = None
8192
self._blackmail_activities = None
8293
self._sanctioned = None
8394
self._malicious_mining_activities = None
8495
self._mixer = None
96+
self._fake_token = None
8597
self._honeypot_related_address = None
8698
self.discriminator = None
8799
if cybercrime is not None:
@@ -90,10 +102,14 @@ def __init__(self, cybercrime=None, money_laundering=None, number_of_malicious_c
90102
self.money_laundering = money_laundering
91103
if number_of_malicious_contracts_created is not None:
92104
self.number_of_malicious_contracts_created = number_of_malicious_contracts_created
105+
if gas_abuse is not None:
106+
self.gas_abuse = gas_abuse
93107
if financial_crime is not None:
94108
self.financial_crime = financial_crime
95109
if darkweb_transactions is not None:
96110
self.darkweb_transactions = darkweb_transactions
111+
if reinit is not None:
112+
self.reinit = reinit
97113
if phishing_activities is not None:
98114
self.phishing_activities = phishing_activities
99115
if contract_address is not None:
@@ -104,6 +120,8 @@ def __init__(self, cybercrime=None, money_laundering=None, number_of_malicious_c
104120
self.blacklist_doubt = blacklist_doubt
105121
if data_source is not None:
106122
self.data_source = data_source
123+
if fake_standard_interface is not None:
124+
self.fake_standard_interface = fake_standard_interface
107125
if stealing_attack is not None:
108126
self.stealing_attack = stealing_attack
109127
if blackmail_activities is not None:
@@ -114,6 +132,8 @@ def __init__(self, cybercrime=None, money_laundering=None, number_of_malicious_c
114132
self.malicious_mining_activities = malicious_mining_activities
115133
if mixer is not None:
116134
self.mixer = mixer
135+
if fake_token is not None:
136+
self.fake_token = fake_token
117137
if honeypot_related_address is not None:
118138
self.honeypot_related_address = honeypot_related_address
119139

@@ -186,6 +206,29 @@ def number_of_malicious_contracts_created(self, number_of_malicious_contracts_cr
186206

187207
self._number_of_malicious_contracts_created = number_of_malicious_contracts_created
188208

209+
@property
210+
def gas_abuse(self):
211+
"""Gets the gas_abuse of this ResponseWrapperAddressContractResult. # noqa: E501
212+
213+
It describes whether this address is cheating other user's gas fee to mint other assets.(Notice:Any interaction with such addresses may result in loss of property.) # noqa: E501
214+
215+
:return: The gas_abuse of this ResponseWrapperAddressContractResult. # noqa: E501
216+
:rtype: str
217+
"""
218+
return self._gas_abuse
219+
220+
@gas_abuse.setter
221+
def gas_abuse(self, gas_abuse):
222+
"""Sets the gas_abuse of this ResponseWrapperAddressContractResult.
223+
224+
It describes whether this address is cheating other user's gas fee to mint other assets.(Notice:Any interaction with such addresses may result in loss of property.) # noqa: E501
225+
226+
:param gas_abuse: The gas_abuse of this ResponseWrapperAddressContractResult. # noqa: E501
227+
:type: str
228+
"""
229+
230+
self._gas_abuse = gas_abuse
231+
189232
@property
190233
def financial_crime(self):
191234
"""Gets the financial_crime of this ResponseWrapperAddressContractResult. # noqa: E501
@@ -232,6 +275,29 @@ def darkweb_transactions(self, darkweb_transactions):
232275

233276
self._darkweb_transactions = darkweb_transactions
234277

278+
@property
279+
def reinit(self):
280+
"""Gets the reinit of this ResponseWrapperAddressContractResult. # noqa: E501
281+
282+
It describes whether this address/contract has been deployed more than onces, and can be deployed again.(Notice:If a contract can be reinited, the developer can change the contract code whenever he wants.) # noqa: E501
283+
284+
:return: The reinit of this ResponseWrapperAddressContractResult. # noqa: E501
285+
:rtype: str
286+
"""
287+
return self._reinit
288+
289+
@reinit.setter
290+
def reinit(self, reinit):
291+
"""Sets the reinit of this ResponseWrapperAddressContractResult.
292+
293+
It describes whether this address/contract has been deployed more than onces, and can be deployed again.(Notice:If a contract can be reinited, the developer can change the contract code whenever he wants.) # noqa: E501
294+
295+
:param reinit: The reinit of this ResponseWrapperAddressContractResult. # noqa: E501
296+
:type: str
297+
"""
298+
299+
self._reinit = reinit
300+
235301
@property
236302
def phishing_activities(self):
237303
"""Gets the phishing_activities of this ResponseWrapperAddressContractResult. # noqa: E501
@@ -347,6 +413,29 @@ def data_source(self, data_source):
347413

348414
self._data_source = data_source
349415

416+
@property
417+
def fake_standard_interface(self):
418+
"""Gets the fake_standard_interface of this ResponseWrapperAddressContractResult. # noqa: E501
419+
420+
It describes whether this contract contains standard interfaces that do not conform the requirements of the standard protocol.(Notice:Fake Standard Interface is mostly seen in scam assets.) # noqa: E501
421+
422+
:return: The fake_standard_interface of this ResponseWrapperAddressContractResult. # noqa: E501
423+
:rtype: str
424+
"""
425+
return self._fake_standard_interface
426+
427+
@fake_standard_interface.setter
428+
def fake_standard_interface(self, fake_standard_interface):
429+
"""Sets the fake_standard_interface of this ResponseWrapperAddressContractResult.
430+
431+
It describes whether this contract contains standard interfaces that do not conform the requirements of the standard protocol.(Notice:Fake Standard Interface is mostly seen in scam assets.) # noqa: E501
432+
433+
:param fake_standard_interface: The fake_standard_interface of this ResponseWrapperAddressContractResult. # noqa: E501
434+
:type: str
435+
"""
436+
437+
self._fake_standard_interface = fake_standard_interface
438+
350439
@property
351440
def stealing_attack(self):
352441
"""Gets the stealing_attack of this ResponseWrapperAddressContractResult. # noqa: E501
@@ -462,6 +551,29 @@ def mixer(self, mixer):
462551

463552
self._mixer = mixer
464553

554+
@property
555+
def fake_token(self):
556+
"""Gets the fake_token of this ResponseWrapperAddressContractResult. # noqa: E501
557+
558+
It indicates whether the token is a counterfeit of a mainstream asset. # noqa: E501
559+
560+
:return: The fake_token of this ResponseWrapperAddressContractResult. # noqa: E501
561+
:rtype: str
562+
"""
563+
return self._fake_token
564+
565+
@fake_token.setter
566+
def fake_token(self, fake_token):
567+
"""Sets the fake_token of this ResponseWrapperAddressContractResult.
568+
569+
It indicates whether the token is a counterfeit of a mainstream asset. # noqa: E501
570+
571+
:param fake_token: The fake_token of this ResponseWrapperAddressContractResult. # noqa: E501
572+
:type: str
573+
"""
574+
575+
self._fake_token = fake_token
576+
465577
@property
466578
def honeypot_related_address(self):
467579
"""Gets the honeypot_related_address of this ResponseWrapperAddressContractResult. # noqa: E501

0 commit comments

Comments
 (0)