Skip to content

feat(anvil): bypass authorization signatures for testing #11178

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

shiyasmohd
Copy link
Contributor

@shiyasmohd shiyasmohd commented Aug 1, 2025

Motivation

As mentioned in #11170, We could also provide a way to bypass signature verification for authorization list checks in transactions, enabling simulation without requiring actual signatures.

Solution

  • This PR adds a new RPC method anvil_setBypassAuthorizationChecks(bool) that allows developers to bypass authorization signature.
  • When enabled, the bypass logic sets an empty authorization list, causing the to skip signature validation.
  • When disabled (default), normal signature validation occurs

Closes #11170

@shiyasmohd shiyasmohd changed the title feat(anvil): bypass EIP-7702 authorization signatures for testing feat(anvil): bypass authorization signatures for testing Aug 1, 2025
@shiyasmohd shiyasmohd force-pushed the shiyasmohd/bypass-authorization-list branch from db6c7d5 to a5930b4 Compare August 1, 2025 10:19
@shiyasmohd shiyasmohd force-pushed the shiyasmohd/bypass-authorization-list branch from a5930b4 to 158fb0d Compare August 1, 2025 11:04
Copy link
Collaborator

@grandizzy grandizzy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thank you! I am not sure we want to add a new endpoint to handle that but rather validate or do not panic when is empty? @zerosnacks @mattsse pls chime in

@zerosnacks zerosnacks mentioned this pull request Aug 1, 2025
2 tasks
@zerosnacks

This comment has been minimized.

Copy link
Member

@mattsse mattsse left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hmm, this doesnt make too much sense just yet because this doesnt really allow bypassing the 7702 auths yet

how this should behave is, this should take a signature and a corresponding address that we use as the recovered address of the auth

this is quite similar to

#5381

but we need a way to match the signature to an address
@Soubhik-10 is currently working on #5381 which has a lot of synergies with this task here, so my recommendation is we wait for this task first

but for this pr, we'd then need to "recover" the auths when we're transacting the 7702 tx

@shiyasmohd
Copy link
Contributor Author

Got it. Thanks for the explanation. Will wait that issue to be solved.

@mattsse
Copy link
Member

mattsse commented Aug 1, 2025

will provide more pointers once we have #5381

should be straight forward then

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: No status
Development

Successfully merging this pull request may close these issues.

Allow passing signature check on authorization list
4 participants