Skip to content

Conversation

@sirasistant
Copy link
Contributor

@sirasistant sirasistant changed the title fix: Enforce recipients of l2l1msgs having 20 bytes at most fix: Enforce recipients of l2l1msgs having 20 bytes at most (WIP) Jan 23, 2026

namespace {

EthAddress ff_to_eth_address(FF ff)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

const&FF

Copy link
Contributor

@LeilaWang LeilaWang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Only a small nit. Circuit side LGTM 😄

@AztecBot
Copy link
Collaborator

Flakey Tests

🤖 says: This CI run detected 2 tests that failed, but were tolerated due to a .test_patterns.yml entry.

\033FLAKED\033 (8;;http://ci.aztec-labs.com/8515994ca0ef6226�8515994ca0ef62268;;�):  yarn-project/end-to-end/scripts/run_test.sh simple src/e2e_epochs/epochs_l1_reorgs.test.ts (378s) (code: 1) group:e2e-p2p-epoch-flakes (\033sirasistant\033: update fuzzer)
\033FLAKED\033 (8;;http://ci.aztec-labs.com/6c7792156bfbb334�6c7792156bfbb3348;;�):  yarn-project/end-to-end/scripts/run_test.sh simple src/e2e_p2p/valid_epoch_pruned_slash.test.ts (393s) (code: 1) group:e2e-p2p-epoch-flakes (\033sirasistant\033: update fuzzer)

@sirasistant sirasistant changed the title fix: Enforce recipients of l2l1msgs having 20 bytes at most (WIP) fix: Enforce recipients of l2l1msgs having 20 bytes at most Jan 26, 2026
Copy link
Contributor

@IlyasRidhuan IlyasRidhuan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PIL LGTM!

Copy link
Contributor

@jeanmon jeanmon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Please consider my comments.

sel_execute_send_l2_to_l1_msg * (REMAINING_L2_TO_L1_MSG_WRITES * (sel_l2_to_l1_msg_limit_error * (1 - remaining_l2_to_l1_msgs_inv) + remaining_l2_to_l1_msgs_inv) - 1 + sel_l2_to_l1_msg_limit_error) = 0;

// The opcode errors if we have reached the limit or if we are in a static context
// TODO: We need this temporarily while we do not allow for aliases in the lookup tuple
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

During pre-audit, I am trying to remove any TODO. Can you please replace the TODO, by "Lookup constant support: " or something similar?


get_gas_tracker().consume_gas();

if (greater_than.gt(recipient, MemoryValue::from(FF(MAX_ETH_ADDRESS_VALUE)))) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you write a comment that it is crucial to have this check before the 2 other error checks (static and MAX number of messages), because in circuit, we always (in opcode logic) check this and needs the gt event to always be emitted.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants