Spectre Layer provides a simple privacy stack for Solana focused on sending money anonymously and reducing on-chain and RPC metadata.
Key capabilities include:
- Anonymous SOL and SPL transfers
- Shadow accounts with routing metadata
- Metadata-clean RPC relaying
- Simple SDKs for wallets, agents, and apps
Spectre is designed to be easy to integrate into existing Solana workflows without changing how users interact with the network.
Spectre Core (On-chain)
- Anchor-based Solana program
- Shadow accounts
- Routing tags and basic privacy primitives
Spectre Relayer (Off-chain)
- TypeScript service that forwards Solana JSON-RPC
- Strips unnecessary headers and normalizes requests
Spectre SDK (TypeScript)
- Client library for wallets, bots, and apps
- Helpers for anonymous sends and shadow accounts
Spectre App (Frontend)
- Reference UI for testing Spectre flows
- Example of private sends and relayer usage
-
User Action
- A user, wallet, or agent requests a private transfer or operation.
-
Shadow + Routing
- Spectre Core prepares shadow accounts and routing metadata on-chain.
-
Relayer Hop
- The request is sent through Spectre Relayer to clean RPC-level metadata.
-
Execution
- The transaction is submitted to Solana and confirmed.
-
Response
- The client receives a standard transaction signature and result.
-
Install prerequisites:
- Solana Verify CLI (
cargo install solana-verify) - Rust & Cargo
- Anchor CLI
- Solana Verify CLI (
-
Build the program:
solana-verify build- Deploy and verify:
# Deploy
solana program deploy -u $NETWORK_URL target/deploy/spectre_core.so --program-id $PROGRAM_ID# Verify against repository -> upload your build data on chain
solana program show $PROGRAM_ID -u $NETWORK_URL# Trigger a remote job
solana-verify remote submit-job --program-id $PROGRAM_ID --uploader $THE_PUBKEY_THAT_UPLOADED_YOUR_BUILD_DATAFor detailed instructions, please refer to:
Spectre improves privacy by reducing metadata exposure and minimizing linkability across transactions. However, privacy features alone do not guarantee complete security. Always:
- Review program changes and on-chain interactions
- Use trusted keypairs and secure signing environments
- Verify deployments before interacting with Spectre programs