Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[QA]Incorrect destination address in Wormholescan #1423

Closed
AigaD opened this issue Jan 5, 2024 · 25 comments
Closed

[QA]Incorrect destination address in Wormholescan #1423

AigaD opened this issue Jan 5, 2024 · 25 comments
Labels
connect v2 Tickets that relate to the full redesign+sdkv2 replacement explorer p2 Low priority issue

Comments

@AigaD
Copy link

AigaD commented Jan 5, 2024

Preconditions:
Transaction hash for transaction Avalanche to Solana ( 0x72d46b2381840d9b1f845f4d89f7d2a75f36475d75e55fa8167c946b9ad89dcb )

Environment: MacBook Pro, macOS Ventura 13.0.1, Chrome Version 120.0.6099.129

Tested from: https://deploy-preview-1401--wormhole-connect-mainnet.netlify.app/

Steps:

  1. Click on Menu - resume transaction
  2. Paste in the transaction hash ( 0x72d46b2381840d9b1f845f4d89f7d2a75f36475d75e55fa8167c946b9ad89dcb )
  3. Select Avalanche Network
  4. Click Search
  5. Observe address for Solana wallet
  6. Click on View on Wormhole scan
  7. Observe Target chain Destination address

Actual result: Destination address is not matching Solflare wallet address

Expected result: Source chain and Target chain addresses represent wallet address

Attachment:

Screen.Recording.2024-01-05.at.09.04.16.mov

Screenshot 2024-01-05 at 09 07 42

Screenshot 2024-01-05 at 09 07 22

Correct address example for transaction Moonbase to Solana, Wormholescan

Screenshot 2024-01-05 at 11 33 38
@AigaD AigaD added the p1 Important issue label Jan 5, 2024
@AigaD
Copy link
Author

AigaD commented Jan 9, 2024

Reproduced from: https://wormhole-connect-mainnet.netlify.app/#
Attachment:

Screenshot 2024-01-09 at 15 08 08

@tsadovska
Copy link
Collaborator

Issue is reproducible on https://wormhole-connect-mainnet.netlify.app/ [Mainnet]. Incorrect destination address on Wormholescan is shown for Injective target chain. Linked to #1763.

Screen.Recording.2024-03-12.at.15.48.51.mov

@AigaD
Copy link
Author

AigaD commented Mar 13, 2024

Tested from: https://preview.portalbridge.com/b1ba6e856a/
Incorrect Destination address shown in Wormholescan for transaction to Injective (Leap)

Attachment:
Screenshot 2024-03-13 at 11 10 24

@AigaD
Copy link
Author

AigaD commented Mar 19, 2024

Tested from: https://preview.portalbridge.com/b05f4e9322/
Incorrect destination address is shown in Wormholescan. Destination address should be the same as Source address ins this transaction.

Attachment:
Screenshot 2024-03-19 at 11 02 53

@AigaD
Copy link
Author

AigaD commented Mar 27, 2024

Tested from: https://portalbridge.com/
Incorrect destination address shown in Wormholescan
Phantom wallet address - A4xMgXFWpSAA4aG3Beo4Nxe9fvEvcs43i4czrMki79F3
Address shown in Wormholescan as Destination address - 7SwLuUrdtfjt97snb1NS6QimL5iPndgvmCoLDYS6CDq3

Attachment:
Screenshot 2024-03-27 at 10 42 21

@AigaD
Copy link
Author

AigaD commented Apr 3, 2024

Tested from: https://preview.portalbridge.com/8228d00809/#
Incorrect destination address shown in Wormholescan
Both Source address and Destination address should be the same in this test - 0xd493066498aCe409059fDA4c1bCD2E73D8cffE01
Attachment:

Screenshot 2024-04-03 at 09 44 22

@AigaD
Copy link
Author

AigaD commented Apr 8, 2024

Tested from: https://wormhole-connect-mainnet.netlify.app/#
Incorrect destination address shwon in Wormholescan for transaction SUI from Sui to Injective (Leap - inj19us9629lu3a684rp9tkd03fdyzs77ad7t9taxk )

Attachment:

Screen.Recording.2024-04-08.at.13.52.37.mov

@AigaD
Copy link
Author

AigaD commented Apr 11, 2024

Tested from: https://wormhole-connect.netlify.app/#
Transaction FTM from Fantom (Rabby) to Alfajores (Rabby) has incorrect destination address in Wormholescan destination address and source address should have matching wallet addresses.
Attachment:

Screen.Recording.2024-04-11.at.12.27.23.mov

@AigaD
Copy link
Author

AigaD commented Apr 19, 2024

Reproduced from: https://preview.portalbridge.com/ed4e22522f/
For transaction 0.001 W from Ethereum (Metamask) to Arbitrum (Metamask), destination address in Wormholescan is not matching, should be the same 0xd493066498aCe409059fDA4c1bCD2E73D8cffE01

Attachment:

Screenshot 2024-04-19 at 14 58 54

@tsadovska
Copy link
Collaborator

tsadovska commented Apr 26, 2024

Reproducible on wormhole-connect [Testnet] when sending 0.001 WFTM from Fantom (MetaMask) to Sei (Leap).

  • Send from tx: FTMScan
  • Leap account: sei1zusajl8703fxlztrpxyys43jgu06ep5wf9lffd
  • Destination address on Wormholescan sei1dkdwdvknx0qav5cp5kw68mkn3r99m3svkyjfvkztwh97dv2lm0ksj6xrak

@AigaD
Copy link
Author

AigaD commented Apr 30, 2024

Reproduced from: Mainnet
Incorrect destination address shown in Wormholescan, should match the Source address
Attachment:
Screenshot 2024-04-30 at 09 29 31

@tsadovska
Copy link
Collaborator

Issue is reproducible on https://wormhole-connect-mainnet.netlify.app/ when sending 0.00001 USDT from Celo (MetaMask) to Injective (Leap). Destination address on Wormholescan is aW5qMW1xcTB1NncweWV0eGdjdDRzazUzcG5jYXF6ejBlbWw4ajJhcDk3 instead of inj1mqq0u6w0yetxgct4sk53pncaqzz0eml8j2ap97.

@tsadovska
Copy link
Collaborator

Reproducible on https://preview.portalbridge.com/bceadc8c64/ when sending 0.000001 tBTC from Avalanche (MetaMask) to Polygon (MetaMask). Destination address on Wormholescan is 0x09959798b95d00a3183d20fac298e4594e599eab instead of 0x9631288F4050F7CFbf77B77f8540DeCF6cfC7012.

@AigaD
Copy link
Author

AigaD commented May 15, 2024

Reproduced from: Mainnet
Incorrect destination address shown in Wormholescan for transaction 1.3 USDC from Base to Arbitrum, automatic CCTP route
Attachment:

Screenshot 2024-05-15 at 13 18 38 Screenshot 2024-05-15 at 13 18 30

@tsadovska
Copy link
Collaborator

Reproducible on https://wormhole-connect-mainnet.netlify.app/ [Mainnet] when sending 0.0004 WETH (Avalanche) from Avalanche (MetaMask) to Polygon (MetaMask). Destination address on Wormholescan is 0x227babe533fa9a1085f5261210e0b7137e44437b instead of 0x9631288F4050F7CFbf77B77f8540DeCF6cfC7012.

@AigaD
Copy link
Author

AigaD commented May 17, 2024

Reproduced from: https://deploy-preview-2080--wormhole-connect-mainnet.netlify.app/
Incorrect Destination address for transaction 0.0004 ETH from Ethereum (Metamask) to Polygon (Metamask), Destination address for Metamask should be - 0xd493066498aCe409059fDA4c1bCD2E73D8cffE01
Attachment:
Wormholescan
Screenshot 2024-05-17 at 09 00 42

@AigaD AigaD added p2 Low priority issue and removed p1 Important issue labels May 17, 2024
@AigaD
Copy link
Author

AigaD commented May 23, 2024

Tested from: https://deploy-preview-2113--wormhole-connect-mainnet.netlify.app/#
Incorrect destination address shown in Wormholescan. Address shown should be zdv8TPs7wQR216Gghrk7GafmgM5oRnoNt66Zjo936tf

Attachment:
Screenshot 2024-05-23 at 08 43 38

@tsadovska
Copy link
Collaborator

Reproducible on https://preview.portalbridge.com/3064c36d95/ [Mainnet] when sending 0.00101 WMATIC from X Layer (MetaMask) to Injective (MetaMask). Destination address on Wormholescan is aW5qMW1xcTB1NncweWV0eGdjdDRzazUzcG5jYXF6ejBlbWw4ajJhcDk3 instead of inj1mqq0u6w0yetxgct4sk53pncaqzz0eml8j2ap97.

@tsadovska
Copy link
Collaborator

Reproducible on https://deploy-preview-2143--wormhole-connect-mainnet.netlify.app/ [Mainnet] when sending 0.0004 ETH from Ethereum (MetaMask) to Polygon (MetaMask) with ETH Bridge route. Destination address on Wormholescan is 0x227babe533fa9a1085f5261210e0b7137e44437b instead of 0x9631288F4050F7CFbf77B77f8540DeCF6cfC7012.

@agodlevska
Copy link
Collaborator

Reproducible on https://deploy-preview-2143--wormhole-connect-mainnet.netlify.app/# [Mainnet] when sending 0.0003 wstETH from Arbitrum (MetaMask) to Base (MetaMask) with wstETH bridge route. Destination address on Wormholescan is 0x610d4dfac3ec32e0be98d18ddb280dacd76a1889 instead of 0xd493066498ace409059fda4c1bcd2e73d8cffe01

Attachment:
Screenshot 2024-05-30 at 13 17 08

@tsadovska
Copy link
Collaborator

1. Injective is a target chain - Tested OK

Checked on https://wormhole-connect-mainnet.netlify.app/. Correct Leap wallet account is displayed on Wormholescan when sending 0.001 CELO from Fantom (MetaMask) to Injective (Leap).

Checked on https://portalbridge.com/. Correct Leap wallet account is displayed on Wormholescan when sending 0.1 WGLMR from Moonbeam to Injective (Leap).

2. Automatic and Manual Bridge routes - Tested OK

Checked on https://wormhole-connect-mainnet.netlify.app/.

Correct target address is displayed on Wormholescan when sending 0.04 WAVAX from Avalanche (MetaMask) to Fantom (MetaMask) with Automatic route.

Correct target address is displayed on Wormholescan when sending 2 FTM from Fantom (Rabby) to Celo (Rabby) with Automatic route.

3. CCTP routes - Tested OK

Checked on https://wormhole-connect-mainnet.netlify.app/.

Correct target address is displayed on Wormholescan when sending USDC from Polygon (MetaMask) to Optimism (MetaMask) with CCTP manual route.

Icon that explains that this is not the final address is shown on Wormholescan when sending 1.3 USDC from Base (MetaMask) to Arbitrum (MetaMask) with CCTP Automatic route.

@SamantaCasal
Copy link

Regarding Eth Bridge cases: we must make a fix and add a field to the endpoint to solve this issue. The task is tracked in the ticket https://github.com/wormhole-foundation/wormhole-explorer/issues/1484. It is planned for the next sprint with a final date of 02/07.

@tsadovska
Copy link
Collaborator

Incorrect target chain address is shown on Wormholescan when sending Yaku token from Avalanche (MetaMask) to Solana (Phantom) with Native Token Transfer Manual route. Address nTtPcmsVY4f86cSREmnio5tUyiK58HBqBeDwaUYQt6t is shown instead of 4bG8RegzdEW5EPoYUthdopyQdYeNerhiLUdbvx1HEGdU.

@tsadovska
Copy link
Collaborator

tsadovska commented Sep 13, 2024

Incorrect target chain address is shown on Wormholescan when sending WGLMR from Moonbeam (MetaMask) to Solana (Phantom) with Manual route. 4R6nLCZvUVvueDhXdKmYynvmoYwyCJ6HXavjXJXmDQGW address is shown instead of 4bG8RegzdEW5EPoYUthdopyQdYeNerhiLUdbvx1HEGdU.

Reproducible from:

Transaction details:

Screenshot 2024-09-13 at 10 54 28

Screenshot 2024-09-13 at 10 55 40

@tsadovska tsadovska added connect v2 Tickets that relate to the full redesign+sdkv2 replacement explorer labels Sep 13, 2024
@agodlevska
Copy link
Collaborator

Reposted to Wormholescan repo - XLabs/wormscan-ui#871

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
connect v2 Tickets that relate to the full redesign+sdkv2 replacement explorer p2 Low priority issue
Projects
None yet
Development

No branches or pull requests

4 participants