Content pfp
Content
@
0 reply
1 recast
1 reaction

TMO ↑ πŸ„ ↑ pfp
TMO ↑ πŸ„ ↑
@tmo.eth
@privy wen 1271 /tokenbound @walletconnect support @zora ????
2 replies
0 recast
0 reaction

Max pfp
Max
@segall
(1/2) The issue here is the wallet not firing a chainChanged event with the chain ID of the wallet after it's been connected - WC needs this in order to update its internal chain ID state. With an incorrect chain ID from WC, Privy requests an EIP1271 signature on the wrong chain ID which will fail in this context.
1 reply
0 recast
1 reaction

Max pfp
Max
@segall
(2/2) The solution here is to ensure that the wallet fires a chainChanged event with its chain ID after the proposal to WC. This is the updated recommendation from the WC team and Safe is implementing the same change on their end: https://github.com/safe-global/safe-wallet-web/pull/3725
1 reply
0 recast
1 reaction

jw 🦺 ERC6551 pfp
jw 🦺 ERC6551
@0xjw.eth
Tried this (immediately firing a chainChanged event after approving the session), but Privy still requests a signature for the first chain in the optionalChains list (arbitrum). Is there a way to signal support for all optionalChains but have Privy choose the correct one for signing?
1 reply
0 recast
1 reaction