@volr/sdk-core 0.1.67 → 0.1.69

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.js CHANGED
@@ -1075,7 +1075,6 @@ function createPasskeyProvider(passkey, options) {
1075
1075
  }
1076
1076
  sessionExpiresAt = Date.now() + sessionTtlMs;
1077
1077
  lockTimer = setTimeout(async () => {
1078
- console.log("[PasskeyProvider] Session expired, auto-locking");
1079
1078
  await lock();
1080
1079
  }, sessionTtlMs);
1081
1080
  };
@@ -1086,7 +1085,6 @@ function createPasskeyProvider(passkey, options) {
1086
1085
  }
1087
1086
  sessionExpiresAt = null;
1088
1087
  if (unwrappedKeypair) {
1089
- console.log("[PasskeyProvider] lock(): zeroizing sensitive data from memory");
1090
1088
  zeroize(unwrappedKeypair.privateKey);
1091
1089
  zeroize(unwrappedKeypair.publicKey);
1092
1090
  unwrappedKeypair = null;
@@ -1094,7 +1092,6 @@ function createPasskeyProvider(passkey, options) {
1094
1092
  };
1095
1093
  const ensureSession = async (opts) => {
1096
1094
  if (opts?.force && unwrappedKeypair) {
1097
- console.log("[PasskeyProvider] force=true: zeroizing existing session");
1098
1095
  await lock();
1099
1096
  }
1100
1097
  if (unwrappedKeypair && !isSessionExpired()) {
@@ -1102,10 +1099,8 @@ function createPasskeyProvider(passkey, options) {
1102
1099
  return;
1103
1100
  }
1104
1101
  if (unwrappedKeypair && isSessionExpired()) {
1105
- console.log("[PasskeyProvider] Session expired, re-authenticating");
1106
1102
  await lock();
1107
1103
  }
1108
- console.log("[PasskeyProvider] Triggering WebAuthn prompt for hardware-backed authentication");
1109
1104
  const prfSalt = deriveWrapKey(options.prfInput);
1110
1105
  const { prfOutput } = await passkey.authenticate({
1111
1106
  salt: prfSalt,
@@ -1157,13 +1152,8 @@ function createPasskeyProvider(passkey, options) {
1157
1152
  if (!unwrappedKeypair) {
1158
1153
  throw new Error(`${ERR_INVALID_PARAM}: Session not established`);
1159
1154
  }
1160
- console.log("[PasskeyProvider] signTypedData input:", JSON.stringify(
1161
- input,
1162
- (_key, value) => typeof value === "bigint" ? value.toString() : value
1163
- ));
1164
1155
  const hash = TypedDataEncoder.hash(input.domain, input.types, input.message);
1165
1156
  const msgHash = hash;
1166
- console.log("[PasskeyProvider] msgHash:", msgHash);
1167
1157
  const msgHashBytes = new Uint8Array(32);
1168
1158
  const hex = msgHash.startsWith("0x") ? msgHash.slice(2) : msgHash;
1169
1159
  for (let i = 0; i < 32; i++) {