Components
Nada Testnet (Phase 1)
A private SVM chain enabling development of:
attestation verification primitives
agent-driven transaction flows
enclave-bound oracle design
private state transition logic
confidential execution registry
The chain mirrors Solana but adds:
an AttestationSysvar for storing vendor certificates
extended compute budget for attestation parsing
precompiles for hashing vendor certificates
Example: SVM program registry entry
pub struct MeasurementRegistry {
pub allowed: Vec<[u8; 32]>, // SHA-256 hashes of enclave binaries
}Nada TEEs SDK (Phase 2)
The SDK standardizes agent execution inside enclaves.
Responsibilities:
enclave-bound key generation
measurement calculation
deterministic runtime initialization
request handling: tools, RPCs, LLMs, internal state
generation of:
attestation report
measurement + signature
context provenance (Merkle proofs)
attention selection proofs (optional)
output receipts
Sample TEE-side pseudocode
On-chain Verification (Phase 3)
Nada introduces a Solana program that verifies TEE execution receipts.
Verification steps:
Validate TEE Vendor Signature
Verify Measurement
Verify Enclave-Bound Key
Verify Output Signature
Verify Context Merkle Proofs
Result:
The SVM program can trust the output’s authenticity, while the actual execution remains private.
Components
1. Nada Testnet (Phase 1)
A private SVM chain enabling development of:
attestation verification primitives
agent-driven transaction flows
enclave-bound oracle design
private state transition logic
confidential execution registry
The chain mirrors Solana but adds:
an AttestationSysvar for storing vendor certificates
extended compute budget for attestation parsing
precompiles for hashing vendor certificates
Example: SVM program registry entry
2. Nada TEEs SDK (Phase 2)
The SDK standardizes agent execution inside enclaves.
Responsibilities:
enclave-bound key generation
measurement calculation
deterministic runtime initialization
request handling: tools, RPCs, LLMs, internal state
generation of:
attestation report
measurement + signature
context provenance (Merkle proofs)
attention selection proofs (optional)
output receipts
Sample TEE-side pseudocode
3. On-chain Verification (Phase 3)
Nada introduces a Solana program that verifies TEE execution receipts.
Verification steps:
Validate TEE Vendor Signature
Verify Measurement
Verify Enclave-Bound Key
Verify Output Signature
Verify Context Merkle Proofs
Result:
The SVM program can trust the output’s authenticity, while the actual execution remains private.
4. Confidential Layer for Public SVM Chains (Phase 4)
In this phase, Nada becomes a module that any SVM chain can integrate, allowing:
private smart contracts
confidential intents
private order matching
TEE-backed oracles
verifiable AI agents on Solana
Nada functions as:
A sidechain-agnostic verification oracle for confidential execution.
Developers write:
standard Solana programs
plus optional callback hooks for confidential verification
Example on Solana:
Last updated