@ckb-firewall/cli
v0.2.3
Published
CLI for managing the CKB Transaction Firewall blacklist registry
Maintainers
Readme
@ckb-firewall/cli
CLI for inspecting and governing the CKB Transaction Firewall blacklist registry.
Node 20+. ESM only.
Install
npm install -g @ckb-firewall/cliOr use the one-line installer (handles Node version checks and PATH setup):
curl -fsSL https://raw.githubusercontent.com/digitaldrreamer/ckb-transaction-firewall/main/scripts/install-cli.sh | bashCommands
Inspect and check
# Show all current entries with status
ckb-firewall inspect
# Check whether a specific address is blacklisted
ckb-firewall check --lock-args 0xabc123...Governance flow
The auditable path — cryptographically signed votes, 72-hour review window, and on-chain multisig execution.
# 1. Create a proposal
ckb-firewall propose
# 2. Export and share with other participants
ckb-firewall export --proposal <id> --out proposal.json
# 3. Each participant imports
ckb-firewall import proposal.json
# 4. Each validator votes with their private key
ckb-firewall vote --proposal <id> --vote yes
# (prompts for 32-byte private key)
# 5. Track status
ckb-firewall proposals
# 6. Sign after 72h review window and vote threshold
ckb-firewall sign --proposal <id> --signer-index 0
# (prompts for 32-byte private key)
# 7. Execute on-chain
ckb-firewall execute --proposal <id> --tx-out gov_tx.jsonProposal state lives in ~/.ckb-firewall/proposals/. Use export/import to share between participants — import merges rather than overwrites.
