Technical Details
Architecture Diagram
+-------------------------------+
| User / dApp |
+-------------------------------+
|
| (1) Input Task
v
+----------------------------------------------+
| TEE-Backed Nada Agent |
|----------------------------------------------|
| Confidential Runtime: |
| - Agent logic |
| - Private models (LLMs, ML, rules) |
| - Secure key-store |
| - Context tracing + attention proofs |
| - Attestation API |
+----------------------------------------------+
|
| (2) Execution Receipt
v
+----------------------------------------------+
| Nada Verifier (SVM Program) |
| - Vendor signature checks |
| - Measurement validation |
| - Output signature validation |
| - Context proof verification |
| - Replay protection |
+----------------------------------------------+
|
| (3) Verified State Transition
v
+------------------------------+
| SVM Blockchain |
+------------------------------+Execution Flow
Step 1 – User Submits a Task
A user or smart contract provides a structured request:
The request is sent directly to the TEE agent—never on-chain.
Step 2 – The Agent Executes in the TEE
Inside the TEE:
The agent loads its verified binary.
The enclave measures itself (computes SHA-256 hash of binary).
The enclave loads private weights, tools, state.
The input is processed with full confidentiality.
The agent generates:
output
output hash
context provenance proofs
optional attention-check proofs
signature by enclave-bound key
Enclave-Bound Keys
Inside each agent enclave:
A private key is generated:
It never leaves the enclave.
The corresponding public key is included in the attestation.
This binds:
the agent identity
the execution environment
the measurement
together cryptographically.
Context Provenance & Merkleization
To prove what context/model inputs the agent used, the agent SDK:
Hashes each context chunk.
Constructs a Merkle tree.
Uses Merkle proofs to show which items were used during inference.
This prevents:
hallucinations
unauthorized context injection
tampering or replacement
Example:
Execution Receipt Format
The TEE returns a self-contained, verifiable proof called the Execution Receipt:
Example: Agent Execution Pseudocode
Step 3 – On-Chain Verification
The SVM program calls the Nada verification library:
This runs:
Vendor signature validation
Measurement (binary hash) validation
Output signature verification
Context-proof validation
Replay prevention
If and only if all checks succeed:
The result is accepted as authenticated and originating from a genuine TEE running trusted code.
Security Guarantees
Confidentiality
Only the enclave sees the input, code, intermediate state.
Integrity
The result is authenticated by enclave-bound keys.
Execution Authenticity
Measurement + attestation prove exactly what code ran.
Verifiability
SVM programs can trust results without seeing raw data.
Last updated