Common Pitfalls
This page aggregates known pitfalls called out in the tests.
should still allow decrypting previously obtained ciphertext after revocation
should fail when reusing a handle without allowThis
fails to decrypt when FHE.allow(user) is missing
returns an encrypted handle even in a view call
should revert when granting access before computing a result
should not allow verifier to decrypt without explicit grant
should not allow public decrypt before publishing
should reject wrapping for non-KYC users
should not allow public decrypt of confidential balances
should reject minting to non-KYC accounts
should revert transfers to non-KYC recipients
should not grant future access after observer removal, but old ciphertext stays decryptable
rejects a proof bound to a different sender
rejects a proof bound to a different contract
should not allow public decrypt before publishing
should revert swap if operator approval is missing
should revert when omitting allowTransient for the token
should revert if operator approval is missing
should revert if omitting allowTransient for the toToken
should revert if omitting allowTransient for the fromToken
should revert when the registry does not grant transient permission
should show that cached handles outlive transient permissions
Last updated