-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: allow approval based paymasters #251
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The tests make this digestible!
@@ -93,7 +93,6 @@ contract SessionKeyValidator is IModuleValidator { | |||
interfaceId == type(IModule).interfaceId; | |||
} | |||
|
|||
// TODO: make the session owner able revoke its own key, in case it was leaked, to prevent further misuse? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are we not implementing this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you think we should? I think it's a feature that is very unlikely to be used, but adds complexity
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is a nice to have. However, it is true that a key compromise will already have a much larger impact than the session itself.
Description
Allow approval-based paymaster, while performing the necessary check that the used token is allowed in the session spec.