On Fri, May 19, 2017 at 09:07:41AM +0300, Mark Boldyrev via bitcoin-dev wrote: > Back in 2010, there was a bug found in Core which allowed denial-of-service > attacks due to the software crashing on some machines while executing a > script - see CVE-2010-537. > I believe the removed ("disabled") opcodes should be re-introduced along > with a standardized behavior definition. > For example, when execution of an opcode results in an arithmetic error, > such as OP_DIV with a zero divisor, the script should exit and fail. > The string splice opcodes should also check their arguments for > correctness, etc. > > These opcodes would enhance the flexibility of scripts and allow > sophisticated native smart contracts to be created. It'd help your case if you gave us some examples of such scripts being used. See the CHECKSEQUENCEVERIFY and my own CHECKLOCKTIMEVERIFY bips for examples of how to write up such use-cases. -- https://petertodd.org 'peter'[:-1]@petertodd.org