-
Notifications
You must be signed in to change notification settings - Fork 203
whitelist: add getbags.app + *.getbags.app (BAGS — Solana Merchant of Record) #1817
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
@@ -30,4 +30,6 @@ | |||||||||||||
| - url: "*.tistory.com" | ||||||||||||||
| - url: "*.surge.sh" | ||||||||||||||
| - url: revoke.cash | ||||||||||||||
| - url: nftplus.io | ||||||||||||||
| - url: nftplus.io | ||||||||||||||
| - url: getbags.app | ||||||||||||||
| - url: "*.getbags.app" | ||||||||||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Wildcard subdomain pattern significantly amplifies security risk. The
Comparison with existing wildcards: Other wildcards in this file (e.g., Recommendation:
🔒 Suggested change to use specific subdomain(s)Based on PR objectives mentioning "production checkout dApp at https://www.getbags.app/pay/*", consider: - url: nftplus.io
- url: getbags.app
- - url: "*.getbags.app"Or if subdomains are required, specify them explicitly: - url: nftplus.io
- url: getbags.app
- - url: "*.getbags.app"
+ - url: pay.getbags.app
+ - url: checkout.getbags.app📝 Committable suggestion
Suggested change
Suggested change
🤖 Prompt for AI Agents |
||||||||||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
🏁 Script executed:
Repository: phantom/blocklist
Length of output: 530
🌐 Web query:
What are the current best practices for domain age requirements in crypto wallet whitelists?💡 Result:
In the context of crypto wallet whitelisting, domain age is not considered a primary or standalone security control [1][2]. While it can serve as a supplemental signal for risk assessment, relying on it as a foundation for security is discouraged due to its limitations in modern threat landscapes [1][2]. Current best practices for securing crypto wallet whitelists focus on robust identity verification, multi-party governance, and behavioral analysis rather than domain age [3][4][5]. Key Security Practices for Wallet Whitelists: 1. Identity and Control Verification: Before an address is added to a whitelist, the owner should complete Know Your Customer (KYC) checks [3][5]. Additionally, the user should prove control over the wallet, typically by signing a cryptographic message [3][4][5]. 2. Multi-Approver Governance: To prevent unauthorized changes, whitelist modifications should require approval from multiple authorized individuals [3][4]. This mitigates the risk of a single compromised account or malicious insider modifying destination addresses [3][4]. 3. Activation Delays: Implementing a mandatory waiting period (e.g., 24 hours) after a new address is added to a whitelist provides a critical window to detect and reverse unauthorized additions [5]. 4. Comprehensive Risk Screening: Addresses should be screened against sanctions lists and monitored for links to known fraudulent activity or high-risk entities [3][4][5]. 5. Limitations of Domain Age: While some automated tools use domain age to flag potentially suspicious sites or services, it is an imperfect metric [1][2]. Attackers frequently bypass age-based filters by using aged domains purchased on secondary markets, compromising legitimate sites, or aging domains before launching campaigns [2]. Consequently, security strategies should prioritize comprehensive threat intelligence, behavioral analysis, and strict access controls over domain age thresholds [1][2]. In summary, while domain age may provide limited supplemental value in automated filtering, it should not be relied upon as a primary security mechanism for crypto wallet whitelisting [1][2]. Instead, organizations should implement layered defenses centered on identity verification, multi-party approval, and continuous monitoring [3][4][5].
Citations:
Document verification process and security approval before merging.
Adding domains to this whitelist bypasses security checks in Phantom wallet. While the commit references "BAGS — Solana Merchant of Record," the following documentation gaps must be resolved:
No verification documentation: Neither ownership verification (DNS TXT, /.well-known, wallet signatures) nor any approval evidence exists in the repository or PR.
Missing approval from security team: No documented approval from security reviewers is included.
Unverifiable security claims: Claims about bounded on-chain behavior cannot be verified from configuration changes and require audit documentation.
Wildcard scope: The pattern
*.getbags.appwhitelists all subdomains, which should be justified or narrowed if possible.Required before merge: Document completed ownership verification, explicit security team approval, and security audit results validating the dApp's on-chain behavior.
🤖 Prompt for AI Agents