This PR fixes the issue that the runtime accepts transactions that consume bogus inputs.
While the transaction pool was able successfully filter those transactions, the tx pool cannot be relied on because it is offchain logic. An attacker could program their node to accept these transactions, and the runtime must still be able to defent itself in this case.
This PR fixes the issue that the runtime accepts transactions that consume bogus inputs.
While the transaction pool was able successfully filter those transactions, the tx pool cannot be relied on because it is offchain logic. An attacker could program their node to accept these transactions, and the runtime must still be able to defent itself in this case.