Currently, we first call paths.validate_path and prompt the user in case it is a non-standard path. If so and the user agrees it may happen that the Keychain throws failure: Forbidden key path if it is outside the app's namespace, which is quite unfriendly.
Do we want to deal with this? Maybe just swap those two operations?
You can reproduce this using trezorctl lisk_get_address -n "43". GIF
Currently, we first call
paths.validate_path
and prompt the user in case it is a non-standard path. If so and the user agrees it may happen that the Keychain throwsfailure: Forbidden key path
if it is outside the app's namespace, which is quite unfriendly.Do we want to deal with this? Maybe just swap those two operations?
You can reproduce this using
trezorctl lisk_get_address -n "43"
. GIF