Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»Message signatures in wake tests: EIP-712, EIP-191, and hashes
HACKING NEWS

Message signatures in wake tests: EIP-712, EIP-191, and hashes

By Crypto FlexsDecember 14, 20254 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Message signatures in wake tests: EIP-712, EIP-191, and hashes
Share
Facebook Twitter LinkedIn Pinterest Email

Why signatures are important in testing

The entered signatures drive permission flows, meta-transactions, and off-chain approvals. Being able to create this within your test allows you to verify your confirmation logic without having to connect an external wallet. Wake exposes APIs focused on: Account It covers three common cases: Raw message signature (sign), EIP-712 Structured Signature (sign_structured) and low-level hash signatures (sign_hash). This guide distills official account and address documentation into real-world examples that can be directly applied to testing.

Prepare your account using your private key

Wake is only signed if your account has a private key. You can import or create it in one line.


from wake.testing import Account

account = Account.from_mnemonic(" ".join(("test") * 11 + ("junk")))
# Other options:
# Account.from_key("0x" + "a" * 64)
# Account.from_alias("alice")  # uses the alias from config
# Account.new()                # fresh random key

Your account is now ready for transactions and all three signature modes.

Raw Message Signature (EIP-191)

use Account.sign For human-readable bytes, e.g. personal_sign The style flow of the test:

from wake.testing import Account

account = Account.from_mnemonic(" ".join(("test") * 11 + ("junk")))
signature = account.sign(b"Hello, world!")

Wake starts with the EIP-191 prefix (version 0x45) automatically ensures that signatures match standard wallet behavior. Use this mode for UX prompts or legacy flows that intentionally avoid entered data.

Structured Message Signature (EIP-712)

Data entered keeps approvals clear. Wake mirrors the EIP-712 pipeline using data classes and explicit domains.

from dataclasses import dataclass
from wake.testing import *


@dataclass
class Transfer:
    sender: Address
    recipient: Address
    amount: uint256


account = Account.from_mnemonic(" ".join(("test") * 11 + ("junk")))
signature = account.sign_structured(
    Transfer(
        sender=account.address,
        recipient=Address(1),
        amount=10,
    ),
    domain=Eip712Domain(
        name="Test",
        chainId=chain.chain_id,
        verifyingContract=Address(0),  # set to your contract if needed
    ),
)

Wake builds the type string, hashes each field, and signs the EIP-712 digest. Combine this with the following Solidity features in your protocol testing: hashTypedData Ensures that the contract computes the same digest before verifying the signature.

Precomputed hash signature

use Account.sign_hash This is only possible if the external API already provides a digest. This method skips the prefix and signs the bytes as is.

from wake.testing import *

account = Account.from_mnemonic(" ".join(("test") * 11 + ("junk")))
message_hash = keccak256(b"Hello, world!")
signature = account.sign_hash(message_hash)

Use this when you need to match a known hash, such as the hash of a contract. hashTypedData calculation. If you don’t control or understand the pre-image, don’t sign.

Hardening Tips for Signature Testing

  • Domain Alignment: Guaranteed name, version, chainIdand verifyingContract Wake and contract code match exactly.
  • Separate raw and input flows: Enabled sign For private messages prefixed with sign_structured For entered data sign_hash Intentional extreme case.
  • Label test actor: chain.accounts(i).label = "ALICE" Improves trace readability without affecting behavior.
  • Capturing traces on failure: Wrapping tests with @on_revert print and e.tx.call_trace When debugging signature-related reverts.
  • End-to-end assertion: Recalculate and verify digests inside Solidity. ecrecover report account.address Detect encoding errors early.

Simple Permission Test Recipe

  1. Define the Allow structure as a Wake data class that mirrors the Solidity structure.
  2. Build your domain using the contract’s real name, version, chain ID, and verification address.
  3. Create a signature using: sign_structured Call the grant or confirm function in your test.
  4. Solidity recalculates the digest and checks: ecrecover Calculates the signer.
  5. We add fuzzing to the amount and due date to ensure that the hashing remains stable across inputs.

conclusion

Wake’s Signature Assistant adds a wallet-like interface inside your tests, allowing you to run permission flows and entered approvals without having to connect external tools. use sign_structured Maintain for EIP-712 route sign Handling legacy prompts sign_hash Used as an intentional edge case hook. The API is kept in one line, so you can focus on asserting contract behavior rather than wrestling with the signature plumbing.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Ghouls can be guardians too

December 12, 2025

Silk Road cryptocurrency activity has resurfaced as dormant Bitcoin wallets become active again.

December 10, 2025

ONDO price soars after SEC concludes confidential investigation with no charges

December 8, 2025
Add A Comment

Comments are closed.

Recent Posts

What is stability? – Bitfinex Blog

December 14, 2025

Solana price is stuck in a narrow range awaiting a clear catalyst.

December 14, 2025

Message signatures in wake tests: EIP-712, EIP-191, and hashes

December 14, 2025

New Pre-Market Phase Ahead Of TGE

December 14, 2025

Phantom integrates the Kalshi prediction market as cryptocurrency wallets expand into event trading.

December 14, 2025

Juventus owner rejects Tether takeover bid

December 14, 2025

Bitcoin Weekly Price Prediction: Can BTC Reclaim $100,000?

December 13, 2025

Ethereum Leverage Reaches All-Time High – Market Enters Serious Risk Zone

December 13, 2025

Anonymous Crypto Casinos NZ 10 Best No-KYC Sites For Privacy-Focused Players

December 13, 2025

Improved GitHub Actions: Announcing performance and flexibility upgrades

December 13, 2025

Ghouls can be guardians too

December 12, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

What is stability? – Bitfinex Blog

December 14, 2025

Solana price is stuck in a narrow range awaiting a clear catalyst.

December 14, 2025

Message signatures in wake tests: EIP-712, EIP-191, and hashes

December 14, 2025
Most Popular

Solana mobile phone sold out in the US due to BONK demand

December 15, 2023

U.S. House passes bill to overturn controversial SEC accounting bulletin

May 8, 2024

Investor Chris Burniske Expands Bet on Huge Solana (SOL) Predictions – Here’s His Outlook

August 6, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.