feat: implement ECS-based user restriction for security and coverage#380
Merged
greatest0fallt1me merged 2 commits intoPredictify-org:masterfrom Feb 26, 2026
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Pull Request Description
📋 Basic Information
Implements a user restriction system (Whitelist/Blacklist) using the Entity Component System (ECS) pattern for PredictifyHybrid. It adds administrative controls to restrict specific addresses from interacting with core functions like deposit and create_event.
Type of Change
Please select the type of change this PR introduces:
Related Issues
Closes #262
Fixes #(issue number)
Related to #(issue number)
Priority Level
📝 Detailed Description
What does this PR do?
Implements a user restriction system (Whitelist/Blacklist) using the Entity Component System (ECS) pattern for PredictifyHybrid. It adds administrative controls to restrict specific addresses from interacting with core functions like deposit and create_event.
Why is this change needed?
This change is critical for two reasons:
Security: Provides a necessary administrative layer to block malicious actors or unauthorized users.
Code Coverage: The conditional logic introduced by the restriction checks allows for comprehensive branch testing, targeting the project's goal of 95% test coverage.
How was this tested?
Due to local environment linker issues (link.exe not found), local testing was bypassed. Validation relies on GitHub Actions CI. Tests were added to cover:
Successful deposits by unrestricted users.
Unauthorized access errors when a restricted user attempts a deposit.
Administrative authority verification for setting restrictions.
Alternative Solutions Considered
🏗️ Smart Contract Specific
Contract Changes
Please check all that apply:
Oracle Integration
Market Resolution Logic
Security Considerations
🧪 Testing
Test Coverage
Test Results
Manual Testing Steps
📚 Documentation
Documentation Updates
Breaking Changes
Breaking Changes:
Migration Guide:
🔍 Code Quality
Code Review Checklist
Performance Impact
Security Review
🚀 Deployment & Integration
Deployment Notes
Integration Points
📊 Impact Assessment
User Impact
Business Impact
✅ Final Checklist
Pre-Submission
Review Readiness
📸 Screenshots (if applicable)
🔗 Additional Resources
💬 Notes for Reviewers
Please pay special attention to:
The implementation of check_restriction inside the deposit function.
The use of BLACKLIST_PREFIX for persistent storage to ensure it follows the ECS pattern.
Questions for reviewers:
Thank you for your contribution to Predictify! 🚀