@big-whale-labs/seal-hub-ecdsa-verifier-contract
v0.0.7
Published
SealHub ECDSA verifier contract
Downloads
8
Keywords
Readme
SealHub ECDSA verifier contract
Verifies that a signature is a valid ECDSA signature and outputs the hash of that signature.
Usage
- Clone the repository with
git clone [email protected]:BigWhaleLabs/seal-hub-ecdsa-verifier-contract.git
- Install the dependencies with
yarn
- Download the ptau file with
yarn download-ptau
- Add environment variables to your
.env
file - Run
yarn generate-inputs
to generate random circuit inputs - Run
yarn compile
to compile the circom circuit, create proof, verify proof, export verifiers as a solidity files - Run
yarn test
to run the test suits - Use the artifacts from the
public
folder in snarkjs - Run
yarn deploy
to deploy the verifier smart contract to blockchain - Run
yarn release
to publish an NPM package with typings that can later be used in any of your JS/TS projects
Environment variables
| Name | Description |
| ---------------------------- | --------------------------------- |
| ETHERSCAN_API_KEY
| Etherscan API key |
| ETH_RPC
| Ethereum RPC URL |
| CONTRACT_OWNER_PRIVATE_KEY
| Private key of the contract owner |
Also check out the .env.example
file for more information.
Available scripts
yarn build
— compiles the contracts' ts interfaces to thetypechain
directoryyarn compile
- compiles the circom circuit, creates proof, verifies proof, exports verifier as a solidity file, exports artifacts to thepublic
directoryyarn test
— runs the test suiteyarn deploy
— deploys the contract to the networkyarn eth-lint
— runs the linter for the solidity contractsyarn lint
— runs all the lintersyarn prettify
— prettifies the code in th projectyarn release
— relases thetypechain
directory to NPMyarn download-ptau-{n}
— downloads the relevant ptau fileyarn download-public
— downloads the relevant public binary files
Historical events
- 2023-03-04: @bankisan reported the exploit allowing to bypass the signature verification by setting both
r
ands
to1
. Hence thetest/ecdsaExploit.ts
file and theexploit-proofs
folder. The exploit was fixed on 2023-03-06 before the code was deployed to mainnet.