Type
TRANSFER
Validation date
2024-11-12 22:10:04 UTC
Fee
0 UCO

Code (4.19 KB)

@version 1

####################################
# EVM => Archethic : Request funds #
####################################

condition triggered_by: transaction, on: request_funds(end_time, amount, user_address, secret_hash, evm_tx_address, evm_contract, chain_id), as: [
  type: "contract",
  code: valid_chargeable_code?(end_time, amount, user_address, secret_hash),
  timestamp: (
    # End time cannot be less than now or more than 1 day
    now = Time.now()
    end_time > now && end_time <= now + 86400
  ),
  uco_transfers: (
    # Ensure the pool has enough UCO to send the requested fund
    contract.balance.uco >= amount
  ),
  content: List.in?([56,137,1], chain_id),
  token_transfers: (
    charged_contracts = State.get("charged_contracts", Map.new())
    !contract_already_charged?(charged_contracts, chain_id, evm_contract)
  ),
  address: (
    valid? = false

    tx_receipt_request = get_tx_receipt_request(evm_tx_address)
    call_status_request = get_call_request(evm_contract, "status()", 2)
    call_enough_funds_request = get_call_request(evm_contract, "enoughFunds()", 3)
    call_hash_request = get_call_request(evm_contract, "hash()", 4)
    call_end_time_request = get_call_request(evm_contract, "lockTime()", 5)
    call_amount_request = get_call_request(evm_contract, "amount()", 6)

    body = Json.to_string([
      tx_receipt_request,
      call_status_request,
      call_enough_funds_request,
      call_hash_request,
      call_end_time_request,
      call_amount_request
    ])

    chain_data = get_chain_data(chain_id)
    headers = ["Content-Type": "application/json"]

    evm_responses = query_evm_apis(chain_data.endpoints, "POST", headers, body)
    for res in evm_responses do
      if !valid? && res.status == 200 && Json.is_valid?(res.body) do
        responses = Json.parse(res.body)

        tx_receipt = get_response(responses, 1)
        call_status = get_response(responses, 2)
        call_enough_funds = get_response(responses, 3)
        call_hash = get_response(responses, 4)
        call_end_time = get_response(responses, 5)
        call_amount = get_response(responses, 6)

        if !any_nil?([tx_receipt, call_status, call_enough_funds, call_hash, call_end_time, call_amount]) do
          # event = Crypto.hash("ContractMinted(address,uint256)", "keccak256")
          event = "0x8640c3cb3cba5653efe5a3766dc7a9fb9b02102a9f97fbe9ea39f0082c3bf497"
          valid_tx_receipt? = valid_tx_receipt?(tx_receipt, chain_data.proxy_address, evm_contract, event)
          # Pending is status 0
          valid_status? = valid_status?(call_status, 0)
          enough_funds? = enough_funds?(call_enough_funds)
          valid_hash? = valid_hash?(call_hash, secret_hash)
          valid_end_time? = valid_end_time?(call_end_time, end_time)
          valid_amount? = valid_amount?(call_amount, amount, chain_data.decimals)

          valid? = valid_tx_receipt? && valid_status? && enough_funds? && valid_hash? && valid_end_time? && valid_amount?
        end
      end
    end

    valid?
  )
]

actions triggered_by: transaction, on: request_funds(end_time, amount, _, secret_hash, _, evm_contract, chain_id) do
  chain_data = get_chain_data(chain_id)

  # Delete old contract where end_time is over
  charged_contracts = State.get("charged_contracts", Map.new())
  charged_contracts = delete_old_charged_contracts(charged_contracts)
  charged_contracts = add_charged_contracts(charged_contracts, chain_id, evm_contract, end_time)
  State.set("charged_contracts", charged_contracts)

  signature = sign_for_evm(secret_hash)

  proxy_address = Map.get(chain_data, "proxy_address")

  Contract.set_type("transfer")
  Contract.add_recipient(
    address: transaction.address,
    action: "provision",
    args: [evm_contract, chain_data.endpoints, signature, proxy_address]
  )
  Contract.add_uco_transfer(to: transaction.address, amount: amount)
end

##########################################
# Archethic => EVM : Request secret hash #
##########################################

condition triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, user_address, chain_id, evm_user_address), as: [
  type: "transfer",
  code: valid_signed_code?(htlc_genesis_address, amount, user_address),
  content: List.in?([56,137,1], chain_id),
  uco_transfers:
    (
      htlc_genesis_address = String.to_hex(htlc_genesis_address)
      Map.get(htlc_genesis_address) == amount
    )
]

actions triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, _user_address, chain_id, evm_user_address) do
  # Here delete old secret that hasn't been used before endTime
  requested_secrets = State.get("requested_secrets", Map.new())

  secret = Crypto.hmac(transaction.address)
  secret_hash = Crypto.hash(secret, "sha256")

  protocol_fee = Contract.call_function(0x0000eeb877e7a3ffd7e81f9a1c4d5eedde7f881866c3154b99b78a9a54e3dfbdccd9, "get_protocol_fee", [])
  chain_data = get_chain_data(chain_id)
  decimals = Map.get(chain_data, "decimals")

  fee_amount = amount * protocol_fee / 100
  evm_amount = amount - fee_amount
  evm_big_amount = Math.bigint(evm_amount, decimals)

  abi_data =
    Evm.abi_encode("(bytes32, bytes32, uint, address, uint)", [
      Crypto.hash(htlc_genesis_address),
      secret_hash,
      chain_id,
      evm_user_address,
      evm_big_amount
    ])

  signature_data = Crypto.hash(abi_data, "keccak256")

  # Build signature for EVM verification
  signature = sign_for_evm(signature_data)

  # Calculate endtime now + 2 hours
  now = Time.now()
  end_time = now - Math.rem(now, 60) + 7200

  # Add secret and signature in content
  htlc_map = [
    hmac_address: transaction.address,
    end_time: end_time,
    chain_id: chain_id,
    evm_user_address: evm_user_address
  ]

  htlc_genesis_address = String.to_hex(htlc_genesis_address)
  requested_secrets = Map.set(requested_secrets, htlc_genesis_address, htlc_map)
  State.set("requested_secrets", requested_secrets)

  proxy_address = Map.get(chain_data, "proxy_address")

  Contract.add_recipient(
    address: htlc_genesis_address,
    action: "set_secret_hash",
    args: [secret_hash, signature, end_time, proxy_address]
  )
end

####################################
# Archethic => EVM : Reveal secret #
####################################

condition triggered_by: transaction, on: reveal_secret(htlc_genesis_address, evm_tx_address, evm_contract), as: [
  type: "transfer",
  content: (
    # Ensure htlc_genesis_address exists in pool state
    # and end_time has not been reached
    valid? = false

    htlc_genesis_address = String.to_hex(htlc_genesis_address)
    requested_secrets = State.get("requested_secrets", Map.new())
    htlc_map = Map.get(requested_secrets, htlc_genesis_address)

    if htlc_map != nil do
      valid? = htlc_map.end_time > Time.now()
    end

    valid?
  ),
  address: (
    valid? = false
    htlc_map = nil

    htlc_genesis_address = String.to_hex(htlc_genesis_address)
    requested_secrets = State.get("requested_secrets", Map.new())
    htlc_map = Map.get(requested_secrets, htlc_genesis_address)

    if htlc_map != nil do
      tx_receipt_request = get_tx_receipt_request(evm_tx_address)
      call_status_request = get_call_request(evm_contract, "status()", 2)
      call_enough_funds_request = get_call_request(evm_contract, "enoughFunds()", 3)
      call_hash_request = get_call_request(evm_contract, "hash()", 4)
      call_end_time_request = get_call_request(evm_contract, "lockTime()", 5)
      call_amount_request = get_call_request(evm_contract, "amount()", 6)
      call_recipient_request = get_call_request(evm_contract, "recipient()", 7)

      body = Json.to_string([
        tx_receipt_request,
        call_status_request,
        call_enough_funds_request,
        call_hash_request,
        call_end_time_request,
        call_amount_request,
        call_recipient_request
      ])

      chain_data = get_chain_data(htlc_map.chain_id)
      headers = ["Content-Type": "application/json"]

      evm_responses = query_evm_apis(chain_data.endpoints, "POST", headers, body)
      for res in evm_responses do
        if !valid? && res.status == 200 && Json.is_valid?(res.body) do
          responses = Json.parse(res.body)

          tx_receipt = get_response(responses, 1)
          call_status = get_response(responses, 2)
          call_enough_funds = get_response(responses, 3)
          call_hash = get_response(responses, 4)
          call_end_time = get_response(responses, 5)
          call_amount = get_response(responses, 6)
          call_recipient = get_response(responses, 7)

          if !any_nil?([tx_receipt, call_status, call_enough_funds, call_hash, call_end_time, call_amount, call_recipient]) do
            # event = Crypto.hash("ContractProvisioned(address,uint256)", "keccak256")
            event = "0x0c5d1829e93110ff9c24aa8ac41893b65509108384b3036d4f73ffccb235e9ec"

            secret = Crypto.hmac(htlc_map.hmac_address)
            secret_hash = Crypto.hash(secret, "sha256")

            htlc_data = Contract.call_function(htlc_genesis_address, "get_htlc_data", [])

            valid_tx_receipt? = valid_tx_receipt?(tx_receipt, chain_data.proxy_address, evm_contract, event)
            # Pending is status 0
            valid_status? = valid_status?(call_status, 0)
            enough_funds? = enough_funds?(call_enough_funds)
            valid_hash? = valid_hash?(call_hash, secret_hash)
            valid_end_time? = valid_end_time?(call_end_time, htlc_map.end_time)
            valid_amount? = valid_amount?(call_amount, htlc_data.amount, chain_data.decimals)
            valid_recipient? = valid_recipient?(call_recipient, Map.get(htlc_map, "evm_user_address"))

            valid? = valid_tx_receipt? && valid_status? && enough_funds? && valid_hash? && valid_end_time? && valid_amount? && valid_recipient?
          end
        end
      end
    end

    valid?
  )
]

actions triggered_by: transaction, on: reveal_secret(htlc_genesis_address, _evm_tx_address, evm_contract_address) do
  requested_secrets = State.get("requested_secrets", Map.new())

  htlc_genesis_address = String.to_hex(htlc_genesis_address)
  htlc_map = Map.get(requested_secrets, htlc_genesis_address)

  requested_secrets = Map.delete(requested_secrets, htlc_genesis_address)
  State.set("requested_secrets", requested_secrets)

  secret = Crypto.hmac(htlc_map.hmac_address)
  signature = sign_for_evm(secret)

  Contract.add_recipient(
    address: htlc_genesis_address,
    action: "reveal_secret",
    args: [secret, signature, evm_contract_address]
  )
end

condition triggered_by: transaction, on: refund(htlc_genesis_address), as: [
  content: (
    # Ensure htlc_genesis_address exists in pool state
    # and end_time has not been reached
    valid? = false

    htlc_genesis_address = String.to_hex(htlc_genesis_address)
    requested_secrets = State.get("requested_secrets", Map.new())
    htlc_map = Map.get(requested_secrets, htlc_genesis_address)

    if htlc_map != nil do
      valid? = htlc_map.end_time <= Time.now()
    end

    valid?
  )
]

actions triggered_by: transaction, on: refund(htlc_genesis_address) do
  requested_secrets = State.get("requested_secrets", Map.new())
  htlc_genesis_address = String.to_hex(htlc_genesis_address)
  htlc_map = Map.get(requested_secrets, htlc_genesis_address)

  secret = Crypto.hmac(htlc_map.hmac_address)
  # Perform a first hash to combine data and "refund"
  sig_payload = "#{secret}#{String.to_hex("refund")}"
  signature_data = Crypto.hash(sig_payload, "keccak256")

  signature = sign_for_evm(signature_data)

  requested_secrets = Map.delete(requested_secrets, htlc_genesis_address)
  State.set("requested_secrets", requested_secrets)

  Contract.add_recipient(
    address: htlc_genesis_address,
    action: "refund",
    args: [secret, signature]
  )
end

condition triggered_by: transaction, on: update_code(new_code), as: [
  previous_public_key:
    (
      # Pool code can only be updated from the master chain if the bridge

      # Transaction is not yet validated so we need to use previous address
      # to get the genesis address
      previous_address = Chain.get_previous_address()
      Chain.get_genesis_address(previous_address) == 0x000070babcda15ea1e5d3e3fd5b3a4b92fcd48f1be3c533e4454ed77be76dbc5c68b
    ),
  code: Code.is_valid?(new_code)
]

actions triggered_by: transaction, on: update_code(new_code) do
  Contract.set_type("contract")
  Contract.set_code(new_code)
end

####################
# Public functions #
####################

export fun get_token_address() do
  "UCO"
end

#####################
# Private functions #
#####################

fun contract_already_charged?(charged_contracts, chain_id, evm_contract) do
  chain_id = String.from_number(chain_id)
  evm_contract = String.to_lowercase(evm_contract)

  contracts = Map.get(charged_contracts, chain_id, Map.new())

  Map.get(contracts, evm_contract, nil) != nil
end

fun add_charged_contracts(charged_contracts, chain_id, evm_contract, end_time) do
  chain_id = String.from_number(chain_id)
  evm_contract = String.to_lowercase(evm_contract)

  contracts = Map.get(charged_contracts, chain_id, Map.new())
  updated_contracts = Map.set(contracts, evm_contract, end_time)

  Map.set(charged_contracts, chain_id, updated_contracts)
end

fun delete_old_charged_contracts(charged_contracts) do
  now = Time.now()
  for chain_id in Map.keys(charged_contracts) do
    contracts = Map.get(charged_contracts, chain_id)

    for address in Map.keys(contracts) do
      contract_end_time = Map.get(contracts, address)
      if contract_end_time <= now do
        contracts = Map.delete(contracts, address)
      end
    end

    charged_contracts = Map.set(charged_contracts, chain_id, contracts)
  end

  charged_contracts
end

fun valid_chargeable_code?(end_time, amount, user_address, secret_hash) do
  args = [
    end_time,
    user_address,
    0x00002075e9fb5329c7f5149802eb75f925d79b5fec5bfcf09dc81993cb9c39feaf5d,
    secret_hash,
    "UCO",
    amount
  ]

  expected_code = Contract.call_function(0x0000eeb877e7a3ffd7e81f9a1c4d5eedde7f881866c3154b99b78a9a54e3dfbdccd9, "get_chargeable_htlc", args)

  Code.is_same?(expected_code, transaction.code)
end

fun valid_signed_code?(htlc_address, amount, user_address) do
  valid? = false

  htlc_address = String.to_hex(htlc_address)
  last_htlc_transaction = Chain.get_last_transaction(htlc_address)

  if last_htlc_transaction != nil do
    args = [
      user_address,
      0x00002075e9fb5329c7f5149802eb75f925d79b5fec5bfcf09dc81993cb9c39feaf5d,
      "UCO",
      amount
    ]

    expected_code = Contract.call_function(0x0000eeb877e7a3ffd7e81f9a1c4d5eedde7f881866c3154b99b78a9a54e3dfbdccd9, "get_signed_htlc", args)

    valid? = Code.is_same?(expected_code, last_htlc_transaction.code)
  end

  valid?
end

fun get_chain_data(chain_id) do
  data = Map.new()
  
  if chain_id == 56 do
    data = Map.set(data, "endpoints", ["https://bsc-dataseed.binance.org","https://bsc-mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a"])
    data = Map.set(data, "proxy_address", "0xe01f0ee653648192812b2d23cbfe7e147727b672")
    data = Map.set(data, "decimals", 8)
  end

  if chain_id == 137 do
    data = Map.set(data, "endpoints", ["https://polygon-mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a","https://polygon-mainnet.g.alchemy.com/v2/0aM2uAp3J-LsOlijDBZ3aZiCUvZdjiHb"])
    data = Map.set(data, "proxy_address", "0xd5ca9f76495b853a5054814a10b6365ee8ed745b")
    data = Map.set(data, "decimals", 8)
  end

  if chain_id == 1 do
    data = Map.set(data, "endpoints", ["https://mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a","https://eth-mainnet.g.alchemy.com/v2/tgCq5a1zrmYn4ZjEn74UAW9gUXlDPzQi"])
    data = Map.set(data, "proxy_address", "0x346dba8b51485ffbd4b07b0bcb84f48117751ad9")
    data = Map.set(data, "decimals", 8)
  end

  data
end

fun get_call_request(evm_contract, call, id) do
  abi_data = Evm.abi_encode(call)
  tx = [to: evm_contract, data: "0x#{abi_data}"]
  [jsonrpc: "2.0", id: id, method: "eth_call", params: [tx, "latest"]]
end

fun get_response(responses, id) do
  response = nil
  for res in responses do
    if res.id == id do
      response = Map.get(res, "result")
    end
  end
  response
end

fun any_nil?(list) do
  nil? = false
  for i in list do
    if i == nil do
      nil? = true
    end
  end
  nil?
end

fun get_tx_receipt_request(evm_tx_address) do
  [
    jsonrpc: "2.0",
    id: 1,
    method: "eth_getTransactionReceipt",
    params: [evm_tx_address]
  ]
end

fun valid_tx_receipt?(tx_receipt, proxy_address, evm_contract, expected_event) do
  logs = nil
  for log in tx_receipt.logs do
    if String.to_lowercase(log.address) == proxy_address do
      logs = log
    end
  end

  if logs != nil do
    # Transaction is valid
    valid_status? = tx_receipt.status == "0x1"
    # Transaction interacted with proxy address
    valid_proxy_address? = String.to_lowercase(tx_receipt.to) == proxy_address
    # Logs are comming from proxy address
    valid_logs_address? = String.to_lowercase(logs.address) == proxy_address
    # Pool contract emmited expected event
    event = List.at(logs.topics, 0)
    valid_event? = String.to_lowercase(event) == expected_event
    # Contract minted match evm_contract in parameters
    decoded_data = Evm.abi_decode("(address)", List.at(logs.topics, 1))
    topic_address = List.at(decoded_data, 0)
    valid_contract_address? = topic_address == String.to_lowercase(evm_contract)

    valid_status? && valid_proxy_address? && valid_logs_address? && valid_event? && valid_contract_address?
  else
    false
  end
end

fun valid_status?(call_status, expected_status) do
  decoded_data = Evm.abi_decode("(uint)", call_status)
  List.at(decoded_data, 0) == expected_status
end

fun enough_funds?(call_enough_funds) do
  decoded_data = Evm.abi_decode("(bool)", call_enough_funds)
  List.at(decoded_data, 0) == true
end

fun valid_hash?(call_hash, secret_hash) do
  secret_hash = "0x#{String.to_lowercase(secret_hash)}"
  decoded_data = Evm.abi_decode("(bytes32)", call_hash)
  List.at(decoded_data, 0) == secret_hash
end

fun valid_end_time?(call_end_time, end_time) do
  decoded_data = Evm.abi_decode("(uint256)", call_end_time)
  List.at(decoded_data, 0) == end_time
end

fun valid_amount?(call_amount, amount, decimals) do
  decoded_data = Evm.abi_decode("(uint256)", call_amount)
  big_int_amount = List.at(decoded_data, 0)
  decimal_amount = big_int_amount / Math.pow(10, decimals)
  decimal_amount == amount
end

fun valid_recipient?(call_recipient, evm_user_address) do
  decoded_data = Evm.abi_decode("(address)", call_recipient)
   String.to_uppercase(List.at(decoded_data, 0)) == String.to_uppercase(evm_user_address)
end

fun sign_for_evm(data) do
  prefix = String.to_hex("\x19Ethereum Signed Message:\n32")
  signature_payload = Crypto.hash("#{prefix}#{data}", "keccak256")

  sig = Crypto.sign_with_recovery(signature_payload)

  if sig.v == 0 do
    sig = Map.set(sig, "v", 27)
  else
    sig = Map.set(sig, "v", 28)
  end

  sig
end

fun query_evm_apis(endpoints, method, headers, body) do
  requests = []

  for endpoint in endpoints do
    requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body)
  end

  Http.request_many(requests, false)
end

Content (0 B)

State (4.66 KB)

 
{
  "charged_contracts": {
    "1": {},
    "137": {
      "0xfa99aa4b020d481191b48e4cf12d33c5fab00375": 1731454800
    },
    "56": {
      "0x161fa121fe850723d9943277b638ca8f9bbd576b": 1731456540
    }
  },
  "requested_secrets": {
    "0000026260CA735F1E385FE025414808141D4E3C6746AEBCAE1F0E7A061CA3E71569": {
      "chain_id": 137,
      "end_time": 1716208740,
      "hmac_address": "00004FFE8645115E4810819ED47BF3D54AF99412D0F6B3B312DB780DDD8B6ED67A4A"
    },
    "000002FE741A451E1C9318D354949D72F1128DC0CE4A3C646A5B8E8E4A14DAFFB11C": {
      "chain_id": 137,
      "end_time": 1724942820,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "0000F73CE4E8A2335697BBD89B436258C41CB1252CD7D90542AA85006BC3001E7AE9"
    },
    "00003279512D3C51E490F2C9D2A0126A06DB1A7F96A22A17DEA6533B32664F034A45": {
      "chain_id": 137,
      "end_time": 1723633440,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "00006DD3DA0C9FE060FE171E3D16352F3399642848BAD48F7BCD44717C2F6B9C9FCF"
    },
    "00004389428BA3B99980159E92D50B913F07D78AD663DD46C25D97B8943AFE856D57": {
      "chain_id": 137,
      "end_time": 1715903880,
      "hmac_address": "0000D2C44EAB5CCD42137156A400056D63FA01C2F5BC23C7FACA7816C4E38FC9D1AD"
    },
    "0000520E00218EE38F45382BFFA5DAE16622F406519E2E100F017C718606A26DB6CF": {
      "chain_id": 137,
      "end_time": 1718427840,
      "hmac_address": "00000195A74CB6882D2E88DEBF57E4DFCCB0D29AF13B4B394E3626311CBFE273EC9F"
    },
    "000055476851FAB79FCBB99BD85CD218AA29A5403572BB4AF9195BE48F5E7919B633": {
      "chain_id": 1,
      "end_time": 1721645340,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "0000FC51FB47AA137D26D5BC5A4A6833175024296F15293ADC043F09EC2CED3F6C07"
    },
    "0000584603D899254376E496A9396A370A0E465364E9731991E36167686BBBFAF711": {
      "chain_id": 137,
      "end_time": 1724940540,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "0000404DC70BAADBA9810194A9EF59B657B350DF5D132A1F3A5697F7B2880B13549B"
    },
    "00005E16EFA3687B7839A7F596F573404A3CAE624ED0127D3FFA7FB3EDB4A878924F": {
      "chain_id": 137,
      "end_time": 1724942700,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "000004AB3757DEF30803E135C281FEBC7154B6F8117C3F3041CC350A415D2F539083"
    },
    "00009545F6D85F62110B690C78810181AC98853C9539D2E15CBAB8A8791C6767F5C6": {
      "chain_id": 137,
      "end_time": 1725282840,
      "evm_user_address": "0x7f0f44c4edfbb7c54501547009d32a2bc788be79",
      "hmac_address": "0000E7A2022A912024510B1FC281966E1A8CF5A0E2B888BFA7591ABEDE95649FB7CB"
    },
    "0000A4F2F00F18C38BBB65C84093DA265A477D555BE95BD10D72C79FB25C5C78089F": {
      "chain_id": 137,
      "end_time": 1714258020,
      "hmac_address": "000087849B359682CC19FDC0D51E2159EAFBDC81D5BBA078898ECE8F4E6D91A9ECAA"
    },
    "0000A556D989B411A3500074A2262700941CA3908788BAB50A476F563ADE6AB67CCD": {
      "chain_id": 137,
      "end_time": 1715693880,
      "hmac_address": "000083359120E10BDF9EC0BD8C0D4A9726B62548DECAE74A710DFB23650BE9B3EB10"
    },
    "0000AC66DC77CE296F59A43EC81193271798C808C77AA4D5ECECE714DE1D4C103888": {
      "chain_id": 137,
      "end_time": 1715874600,
      "hmac_address": "000051373B18A3488DAB9C6348D6662CA765576AAF9ADB41311D55153459A49FB447"
    },
    "0000C1D7A78C8623DF76D6C0F828B1B3005BFD1EF9CC4F01E9085515141121E707FB": {
      "chain_id": 137,
      "end_time": 1718656080,
      "hmac_address": "000016CA89A584BD453D88E391CB2E2467DD8CD9F27F27C5DF3640F64F501692DEAB"
    },
    "0000C6DA4EC5A8DF238C59582F1E1C073490303E88DD39AFF1BD9A079B389862EB48": {
      "chain_id": 137,
      "end_time": 1715870160,
      "hmac_address": "000058ED3FE7F85CE5912204F6DCE8A11A28FCCAE685940CD4EE93978BD4AC718707"
    },
    "0000D60B0638875B0DF73DBAEE5B298286A5E82F11E56A34F95B9A7FDD3EE36F1266": {
      "chain_id": 56,
      "end_time": 1727264160,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "0000BE7E21240303519DF3D056B9CBBD5B4755B63BA6C55587879B71B50AB5425D6B"
    },
    "0000ED0D323C89AA21A34D54AF709B3C2B7B13E98913D3A9B693D14F784E578C729C": {
      "chain_id": 1,
      "end_time": 1722511800,
      "evm_user_address": "0xad1f4df14dc3eb4094092cf44b713067431813b8",
      "hmac_address": "0000DE60DB4C9A2038BFD68972A10054FD98DE3FB7E68203086A9C27E68604E6343E"
    },
    "0000EF49932B7A87BE788002A9D1727098639E0186AD2E66692FFC6B07221BDE8ED0": {
      "chain_id": 1,
      "end_time": 1721647980,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "0000DCE7482904BC0D781AB612696D3CEA6562363F1B5E11C54C7ACFB2DAC06DF51D"
    },
    "0000F12AC0846D1D547EE50694E9D6AB40B81928D85193246510A4E427C903E83856": {
      "chain_id": 137,
      "end_time": 1724941440,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "00005B1DC8F3F75CF9D9C61A475EFD7A2BB19E3F778CEC8A901CF0AC97EA36370EA5"
    },
    "0000FC611D060ED4A0B49EB161E06136EAB61FE490F1C5343D4A7241C2794EF75801": {
      "chain_id": 137,
      "end_time": 1724941800,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "0000E1608FBE4C2F047361B8111CB0C96094A778A0CF4F8390C909F168FDD3345763"
    },
    "0000FD9B62664DDD571DC2CF7270A844C9716259328EF58CFEE75B5BA71204650502": {
      "chain_id": 137,
      "end_time": 1724941920,
      "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692",
      "hmac_address": "0000DA7378D581605C44D70E553F2196AE21833FA792E84C6BB4CAE5FE3134ADB793"
    }
  }
}
                  
Movements (0)

Ownerships (1)

  • Secret shared with 1 key

    Encoded secret

    0B3342D081AED6DD8B74A7C6BB3E6F20C94E3FC209F203791EC60879F5B3AB65D52CB12C01BA575CD110B1A243A3A65524ADDCBF18A500ABD91F1BB1

    Authorized keys

    • 000122A6CD9ED07E46835D6E88E5BD0BEE84C3F5E5DBF8E916AD9B2EC912C44AFEC2

Contract recipients (1)

Inputs (0)

Contract inputs (0)

Unspent outputs (1)

Proofs and signatures

Previous public key

0001CD89165D9A50CADB4D33649FBCF804EF8FF1C4095CB03DB352C8E337CDDE11BE

Previous signature

BE7E2B1A5BBA9A0D275250FB0BF8682453D8DE25C21A1A55B2461CE583B1D1F39C0E64B21A4B3350828FD5F40619CA92D8F051959E2B7B3213E18AC84D6D5E0E

Origin signature

3045022100E24A94724072E5BF69FEC381CEDA876014A19B2280BDB9244E216D40B7DA3D9D022057DA1ECFACEDF4172B23962FDC513753D0AF34527A9EF8DA08C01D5387761446

Proof of work

010204AA023E1E039788AD4B8F713C8871CA39A177414A99A0788993AD725B1FBB7AD5E4CAC86151A9E03451DCACB1EFC100B1E450FCEDAF5E5005F3A4C503D1D29712

Proof of integrity

00BFED4540EF7092EF9E129A9C9E0393D51817418E4EC00B0AD6BD728E492512D0

Coordinator signature

7F4FA44CBDC31B8C55F276DB6A06EC45AD3305EF8E6909AB2804ECE69C666A7CA8FE05036F3F2BDEC5C664368A79FA9BF0E34FBF3CDA9A9B8780DAF272D9ED0A

Validator #1 public key

0001DB2931DD86F1A21911FCCC695D31C6881B186EFA391295F3604318D8B72CE28D

Validator #1 signature

113569CF57B030D178C91608A5020010B882DFE342F88E4D7EBB858AFA0FA272B1E7FBB45CC853D1122825B74AAC97A601D353274B3A9A51D4717C67123F4D0F

Validator #2 public key

0001AC6CA4DFE26954F8C8FB58EAED07DEDA6D0A6DAA84085CEA5607892BE39F541F

Validator #2 signature

979CC562563C300BB99211CCF4ED4CE731028DE801830B24FEB658BE6649512CD0D65B9FBB5DF9AD431C76208D47C943BD732DC39BB0834D2A26D4FEE0D67607

Validator #3 public key

0001A5F6705AFE5C9103B4BE3307F94B3EC386283B77ABAA1D39C423EA4D6597F989

Validator #3 signature

A987859236DCA384EB871E360D4AC478EFAEEC61A84AC06E0BB2E22CA58F665527992FD540F914BBC0C613A79E1F5F7068EFD1CD3F305A93D58518961984060A

Validator #4 public key

00018A13A9C85FE66CE097EE273C6F1E612289BFB0B630C34AF60957E8DE880633E2

Validator #4 signature

132C1804B180AD780F977C815D062B283539B3AA9F27D4946089BC7898DF4AE74C5866FA2B9A1FB8F31B46C2DAAA693A8C1AD0155CFED140492F6EF0951AF80E

Validator #5 public key

00010F74B5FEB03F130C26B66BB24AA5066168510220DC9D6C2590294863AC9C8DEE

Validator #5 signature

756F0947853DDD958597B89526C75F483C4FEA4A107FFADFB21D63601ADC3482C162D2870990D5321AEA63CA9F7A355135E94D0E6ADC955F6F8DE945F5E97105