Skip to content

inspikalu/cipherkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CipherKit: The Foundry for Encrypted Solana

License: MIT Rust

CipherKit is a high-performance, developer-first CLI toolchain specifically designed to abstract away the massive complexity of building confidential, cross-chain applications on Solana using Encrypt (FHE) and Ika (2PC-MPC).

What used to take weeks of stitching together pre-alpha SDKs and mock environments now takes cipherkit init (30 seconds).


🚀 Features

1. Zero-Config Scaffolding (cipherkit init)

Instantly generate production-ready Anchor repositories. The interactive wizard lets you pick your protocol stack (Encrypt, Ika, or a combined Dark Pool) and generates a fully wired Rust program and React frontend.

2. Leak Analysis (cipherkit analyze)

Bridging on-chain transparency with off-chain cryptography is dangerous. analyze statically scans your smart contracts to detect logic flaws where encrypted data might accidentally be decrypted or leaked to the public Solana ledger (e.g., FHE msg! leaks, unsafe .unwrap(), TOCTOU on decryption).

3. Local Simulation & Fast Testing (cipherkit test)

Dual-mode testing built in:

  • Default: Runs against a Surfpool devnet fork for real protocol state.
  • --fast: Runs via LiteSVM for sub-second, in-process mock execution.

4. Seamless Devnet Deployment (cipherkit deploy)

A unified deployment pipeline that automatically targets the correct Encrypt/Ika Devnet RPCs based on your chosen protocol flags (--encrypt, --ika, --both).


📦 Installation

Ensure you have Rust and Cargo installed, then run:

# Clone the repository
git clone https://github.com/your-org/cipherkit.git
cd cipherkit

# Install the CLI locally
cargo install --path .

🛠️ Quickstart

1. Initialize a new project

$ cipherkit init my-dark-pool

  CipherKit — New Project Wizard
  ────────────────────────────────

  Which protocol stack?
  ❯ Encrypt + Ika   — Private dark pool (FHE orders + MPC settlement) ⭐

2. Run Tests

$ cd my-dark-pool
$ cipherkit test --fast

3. Analyze for FHE/MPC Security Leaks

$ cipherkit analyze --strict

(Exits code 1 if any critical/high FHE or Ika custody vulnerabilities are found).

4. Deploy to Pre-Alpha Devnets

$ cipherkit deploy --both

🛡️ Security

CipherKit was built from the ground up for the Adevar Labs Security Track. Read the full Threat Model & Security posture to see how the analyze engine prevents catastrophic FHE leaks and MPC custody flaws.


🧩 Architecture

User CLI (`cipherkit`)
 ├── init     → Scaffolds Templates (Encrypt / Ika / Both)
 ├── analyze  → AST Visitor Engine → Flags FHE/MPC Leaks
 ├── test     → Surfpool (Fork) OR LiteSVM (In-Process)
 └── deploy   → Anchor Build + Auto-patches Anchor.toml → RPC Endpoint

Built for the Superteam Earn Encrypt & Ika Frontier Hackathon.

About

No description, website, or topics provided.

Resources

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors