Components

Nada Testnet (Phase 1)

A private SVM chain enabling development of:

  • attestation verification primitives

  • agent-driven transaction flows

  • enclave-bound oracle design

  • private state transition logic

  • confidential execution registry

The chain mirrors Solana but adds:

  • an AttestationSysvar for storing vendor certificates

  • extended compute budget for attestation parsing

  • precompiles for hashing vendor certificates

Example: SVM program registry entry

pub struct MeasurementRegistry {
    pub allowed: Vec<[u8; 32]>, // SHA-256 hashes of enclave binaries
}

Nada TEEs SDK (Phase 2)

The SDK standardizes agent execution inside enclaves.

Responsibilities:

  • enclave-bound key generation

  • measurement calculation

  • deterministic runtime initialization

  • request handling: tools, RPCs, LLMs, internal state

  • generation of:

    • attestation report

    • measurement + signature

    • context provenance (Merkle proofs)

    • attention selection proofs (optional)

    • output receipts

Sample TEE-side pseudocode

On-chain Verification (Phase 3)

Nada introduces a Solana program that verifies TEE execution receipts.

Verification steps:

  1. Validate TEE Vendor Signature

  1. Verify Measurement

  1. Verify Enclave-Bound Key

  1. Verify Output Signature

  1. Verify Context Merkle Proofs

Result:

The SVM program can trust the output’s authenticity, while the actual execution remains private.

Components

1. Nada Testnet (Phase 1)

A private SVM chain enabling development of:

  • attestation verification primitives

  • agent-driven transaction flows

  • enclave-bound oracle design

  • private state transition logic

  • confidential execution registry

The chain mirrors Solana but adds:

  • an AttestationSysvar for storing vendor certificates

  • extended compute budget for attestation parsing

  • precompiles for hashing vendor certificates

Example: SVM program registry entry


2. Nada TEEs SDK (Phase 2)

The SDK standardizes agent execution inside enclaves.

Responsibilities:

  • enclave-bound key generation

  • measurement calculation

  • deterministic runtime initialization

  • request handling: tools, RPCs, LLMs, internal state

  • generation of:

    • attestation report

    • measurement + signature

    • context provenance (Merkle proofs)

    • attention selection proofs (optional)

    • output receipts

Sample TEE-side pseudocode


3. On-chain Verification (Phase 3)

Nada introduces a Solana program that verifies TEE execution receipts.

Verification steps:

  1. Validate TEE Vendor Signature

  1. Verify Measurement

  1. Verify Enclave-Bound Key

  1. Verify Output Signature

  1. Verify Context Merkle Proofs

Result:

The SVM program can trust the output’s authenticity, while the actual execution remains private.


4. Confidential Layer for Public SVM Chains (Phase 4)

In this phase, Nada becomes a module that any SVM chain can integrate, allowing:

  • private smart contracts

  • confidential intents

  • private order matching

  • TEE-backed oracles

  • verifiable AI agents on Solana

Nada functions as:

A sidechain-agnostic verification oracle for confidential execution.

Developers write:

  • standard Solana programs

  • plus optional callback hooks for confidential verification

Example on Solana:

Last updated