@version 1 #################################### # EVM => Archethic : Request funds # #################################### condition triggered_by: transaction, on: request_funds(end_time, amount, user_address, secret_hash, evm_tx_address, evm_contract, chain_id), as: [ type: "contract", code: valid_chargeable_code?(end_time, amount, user_address, secret_hash), timestamp: ( # End time cannot be less than now or more than 1 day now = Time.now() end_time > now && end_time <= now + 86400 ), uco_transfers: ( # Ensure the pool has enough UCO to send the requested fund contract.balance.uco >= amount ), content: List.in?([56,137,1], chain_id), token_transfers: ( charged_contracts = State.get("charged_contracts", Map.new()) !contract_already_charged?(charged_contracts, chain_id, evm_contract) ), address: ( valid? = false tx_receipt_request = get_tx_receipt_request(evm_tx_address) call_status_request = get_call_request(evm_contract, "status()", 2) call_enough_funds_request = get_call_request(evm_contract, "enoughFunds()", 3) call_hash_request = get_call_request(evm_contract, "hash()", 4) call_end_time_request = get_call_request(evm_contract, "lockTime()", 5) call_amount_request = get_call_request(evm_contract, "amount()", 6) body = Json.to_string([ tx_receipt_request, call_status_request, call_enough_funds_request, call_hash_request, call_end_time_request, call_amount_request ]) chain_data = get_chain_data(chain_id) headers = ["Content-Type": "application/json"] evm_responses = query_evm_apis(chain_data.endpoints, "POST", headers, body) for res in evm_responses do if !valid? && res.status == 200 && Json.is_valid?(res.body) do responses = Json.parse(res.body) tx_receipt = get_response(responses, 1) call_status = get_response(responses, 2) call_enough_funds = get_response(responses, 3) call_hash = get_response(responses, 4) call_end_time = get_response(responses, 5) call_amount = get_response(responses, 6) if !any_nil?([tx_receipt, call_status, call_enough_funds, call_hash, call_end_time, call_amount]) do # event = Crypto.hash("ContractMinted(address,uint256)", "keccak256") event = "0x8640c3cb3cba5653efe5a3766dc7a9fb9b02102a9f97fbe9ea39f0082c3bf497" valid_tx_receipt? = valid_tx_receipt?(tx_receipt, chain_data.proxy_address, evm_contract, event) # Pending is status 0 valid_status? = valid_status?(call_status, 0) enough_funds? = enough_funds?(call_enough_funds) valid_hash? = valid_hash?(call_hash, secret_hash) valid_end_time? = valid_end_time?(call_end_time, end_time) valid_amount? = valid_amount?(call_amount, amount, chain_data.decimals) valid? = valid_tx_receipt? && valid_status? && enough_funds? && valid_hash? && valid_end_time? && valid_amount? end end end valid? ) ] actions triggered_by: transaction, on: request_funds(end_time, amount, _, secret_hash, _, evm_contract, chain_id) do chain_data = get_chain_data(chain_id) # Delete old contract where end_time is over charged_contracts = State.get("charged_contracts", Map.new()) charged_contracts = delete_old_charged_contracts(charged_contracts) charged_contracts = add_charged_contracts(charged_contracts, chain_id, evm_contract, end_time) State.set("charged_contracts", charged_contracts) signature = sign_for_evm(secret_hash) proxy_address = Map.get(chain_data, "proxy_address") Contract.set_type("transfer") Contract.add_recipient( address: transaction.address, action: "provision", args: [evm_contract, chain_data.endpoints, signature, proxy_address] ) Contract.add_uco_transfer(to: transaction.address, amount: amount) end ########################################## # Archethic => EVM : Request secret hash # ########################################## condition triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, user_address, chain_id, evm_user_address), as: [ type: "transfer", code: valid_signed_code?(htlc_genesis_address, amount, user_address), content: List.in?([56,137,1], chain_id), uco_transfers: ( htlc_genesis_address = String.to_hex(htlc_genesis_address) Map.get(htlc_genesis_address) == amount ) ] actions triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, _user_address, chain_id, evm_user_address) do # Here delete old secret that hasn't been used before endTime requested_secrets = State.get("requested_secrets", Map.new()) secret = Crypto.hmac(transaction.address) secret_hash = Crypto.hash(secret, "sha256") protocol_fee = Contract.call_function(0x0000eeb877e7a3ffd7e81f9a1c4d5eedde7f881866c3154b99b78a9a54e3dfbdccd9, "get_protocol_fee", []) chain_data = get_chain_data(chain_id) decimals = Map.get(chain_data, "decimals") fee_amount = amount * protocol_fee / 100 evm_amount = amount - fee_amount evm_big_amount = Math.bigint(evm_amount, decimals) abi_data = Evm.abi_encode("(bytes32, bytes32, uint, address, uint)", [ Crypto.hash(htlc_genesis_address), secret_hash, chain_id, evm_user_address, evm_big_amount ]) signature_data = Crypto.hash(abi_data, "keccak256") # Build signature for EVM verification signature = sign_for_evm(signature_data) # Calculate endtime now + 2 hours now = Time.now() end_time = now - Math.rem(now, 60) + 7200 # Add secret and signature in content htlc_map = [ hmac_address: transaction.address, end_time: end_time, chain_id: chain_id, evm_user_address: evm_user_address ] htlc_genesis_address = String.to_hex(htlc_genesis_address) requested_secrets = Map.set(requested_secrets, htlc_genesis_address, htlc_map) State.set("requested_secrets", requested_secrets) proxy_address = Map.get(chain_data, "proxy_address") Contract.add_recipient( address: htlc_genesis_address, action: "set_secret_hash", args: [secret_hash, signature, end_time, proxy_address] ) end #################################### # Archethic => EVM : Reveal secret # #################################### condition triggered_by: transaction, on: reveal_secret(htlc_genesis_address, evm_tx_address, evm_contract), as: [ type: "transfer", content: ( # Ensure htlc_genesis_address exists in pool state # and end_time has not been reached valid? = false htlc_genesis_address = String.to_hex(htlc_genesis_address) requested_secrets = State.get("requested_secrets", Map.new()) htlc_map = Map.get(requested_secrets, htlc_genesis_address) if htlc_map != nil do valid? = htlc_map.end_time > Time.now() end valid? ), address: ( valid? = false htlc_map = nil htlc_genesis_address = String.to_hex(htlc_genesis_address) requested_secrets = State.get("requested_secrets", Map.new()) htlc_map = Map.get(requested_secrets, htlc_genesis_address) if htlc_map != nil do tx_receipt_request = get_tx_receipt_request(evm_tx_address) call_status_request = get_call_request(evm_contract, "status()", 2) call_enough_funds_request = get_call_request(evm_contract, "enoughFunds()", 3) call_hash_request = get_call_request(evm_contract, "hash()", 4) call_end_time_request = get_call_request(evm_contract, "lockTime()", 5) call_amount_request = get_call_request(evm_contract, "amount()", 6) call_recipient_request = get_call_request(evm_contract, "recipient()", 7) body = Json.to_string([ tx_receipt_request, call_status_request, call_enough_funds_request, call_hash_request, call_end_time_request, call_amount_request, call_recipient_request ]) chain_data = get_chain_data(htlc_map.chain_id) headers = ["Content-Type": "application/json"] evm_responses = query_evm_apis(chain_data.endpoints, "POST", headers, body) for res in evm_responses do if !valid? && res.status == 200 && Json.is_valid?(res.body) do responses = Json.parse(res.body) tx_receipt = get_response(responses, 1) call_status = get_response(responses, 2) call_enough_funds = get_response(responses, 3) call_hash = get_response(responses, 4) call_end_time = get_response(responses, 5) call_amount = get_response(responses, 6) call_recipient = get_response(responses, 7) if !any_nil?([tx_receipt, call_status, call_enough_funds, call_hash, call_end_time, call_amount, call_recipient]) do # event = Crypto.hash("ContractProvisioned(address,uint256)", "keccak256") event = "0x0c5d1829e93110ff9c24aa8ac41893b65509108384b3036d4f73ffccb235e9ec" secret = Crypto.hmac(htlc_map.hmac_address) secret_hash = Crypto.hash(secret, "sha256") htlc_data = Contract.call_function(htlc_genesis_address, "get_htlc_data", []) valid_tx_receipt? = valid_tx_receipt?(tx_receipt, chain_data.proxy_address, evm_contract, event) # Pending is status 0 valid_status? = valid_status?(call_status, 0) enough_funds? = enough_funds?(call_enough_funds) valid_hash? = valid_hash?(call_hash, secret_hash) valid_end_time? = valid_end_time?(call_end_time, htlc_map.end_time) valid_amount? = valid_amount?(call_amount, htlc_data.amount, chain_data.decimals) valid_recipient? = valid_recipient?(call_recipient, Map.get(htlc_map, "evm_user_address")) valid? = valid_tx_receipt? && valid_status? && enough_funds? && valid_hash? && valid_end_time? && valid_amount? && valid_recipient? end end end end valid? ) ] actions triggered_by: transaction, on: reveal_secret(htlc_genesis_address, _evm_tx_address, evm_contract_address) do requested_secrets = State.get("requested_secrets", Map.new()) htlc_genesis_address = String.to_hex(htlc_genesis_address) htlc_map = Map.get(requested_secrets, htlc_genesis_address) requested_secrets = Map.delete(requested_secrets, htlc_genesis_address) State.set("requested_secrets", requested_secrets) secret = Crypto.hmac(htlc_map.hmac_address) signature = sign_for_evm(secret) Contract.add_recipient( address: htlc_genesis_address, action: "reveal_secret", args: [secret, signature, evm_contract_address] ) end condition triggered_by: transaction, on: refund(htlc_genesis_address), as: [ content: ( # Ensure htlc_genesis_address exists in pool state # and end_time has not been reached valid? = false htlc_genesis_address = String.to_hex(htlc_genesis_address) requested_secrets = State.get("requested_secrets", Map.new()) htlc_map = Map.get(requested_secrets, htlc_genesis_address) if htlc_map != nil do valid? = htlc_map.end_time <= Time.now() end valid? ) ] actions triggered_by: transaction, on: refund(htlc_genesis_address) do requested_secrets = State.get("requested_secrets", Map.new()) htlc_genesis_address = String.to_hex(htlc_genesis_address) htlc_map = Map.get(requested_secrets, htlc_genesis_address) secret = Crypto.hmac(htlc_map.hmac_address) # Perform a first hash to combine data and "refund" sig_payload = "#{secret}#{String.to_hex("refund")}" signature_data = Crypto.hash(sig_payload, "keccak256") signature = sign_for_evm(signature_data) requested_secrets = Map.delete(requested_secrets, htlc_genesis_address) State.set("requested_secrets", requested_secrets) Contract.add_recipient( address: htlc_genesis_address, action: "refund", args: [secret, signature] ) end condition triggered_by: transaction, on: update_code(new_code), as: [ previous_public_key: ( # Pool code can only be updated from the master chain if the bridge # Transaction is not yet validated so we need to use previous address # to get the genesis address previous_address = Chain.get_previous_address() Chain.get_genesis_address(previous_address) == 0x000070babcda15ea1e5d3e3fd5b3a4b92fcd48f1be3c533e4454ed77be76dbc5c68b ), code: Code.is_valid?(new_code) ] actions triggered_by: transaction, on: update_code(new_code) do Contract.set_type("contract") Contract.set_code(new_code) end #################### # Public functions # #################### export fun get_token_address() do "UCO" end ##################### # Private functions # ##################### fun contract_already_charged?(charged_contracts, chain_id, evm_contract) do chain_id = String.from_number(chain_id) evm_contract = String.to_lowercase(evm_contract) contracts = Map.get(charged_contracts, chain_id, Map.new()) Map.get(contracts, evm_contract, nil) != nil end fun add_charged_contracts(charged_contracts, chain_id, evm_contract, end_time) do chain_id = String.from_number(chain_id) evm_contract = String.to_lowercase(evm_contract) contracts = Map.get(charged_contracts, chain_id, Map.new()) updated_contracts = Map.set(contracts, evm_contract, end_time) Map.set(charged_contracts, chain_id, updated_contracts) end fun delete_old_charged_contracts(charged_contracts) do now = Time.now() for chain_id in Map.keys(charged_contracts) do contracts = Map.get(charged_contracts, chain_id) for address in Map.keys(contracts) do contract_end_time = Map.get(contracts, address) if contract_end_time <= now do contracts = Map.delete(contracts, address) end end charged_contracts = Map.set(charged_contracts, chain_id, contracts) end charged_contracts end fun valid_chargeable_code?(end_time, amount, user_address, secret_hash) do args = [ end_time, user_address, 0x00002075e9fb5329c7f5149802eb75f925d79b5fec5bfcf09dc81993cb9c39feaf5d, secret_hash, "UCO", amount ] expected_code = Contract.call_function(0x0000eeb877e7a3ffd7e81f9a1c4d5eedde7f881866c3154b99b78a9a54e3dfbdccd9, "get_chargeable_htlc", args) Code.is_same?(expected_code, transaction.code) end fun valid_signed_code?(htlc_address, amount, user_address) do valid? = false htlc_address = String.to_hex(htlc_address) last_htlc_transaction = Chain.get_last_transaction(htlc_address) if last_htlc_transaction != nil do args = [ user_address, 0x00002075e9fb5329c7f5149802eb75f925d79b5fec5bfcf09dc81993cb9c39feaf5d, "UCO", amount ] expected_code = Contract.call_function(0x0000eeb877e7a3ffd7e81f9a1c4d5eedde7f881866c3154b99b78a9a54e3dfbdccd9, "get_signed_htlc", args) valid? = Code.is_same?(expected_code, last_htlc_transaction.code) end valid? end fun get_chain_data(chain_id) do data = Map.new() if chain_id == 56 do data = Map.set(data, "endpoints", ["https://bsc-dataseed.binance.org","https://bsc-mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a"]) data = Map.set(data, "proxy_address", "0xe01f0ee653648192812b2d23cbfe7e147727b672") data = Map.set(data, "decimals", 8) end if chain_id == 137 do data = Map.set(data, "endpoints", ["https://polygon-mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a","https://polygon-mainnet.g.alchemy.com/v2/0aM2uAp3J-LsOlijDBZ3aZiCUvZdjiHb"]) data = Map.set(data, "proxy_address", "0xd5ca9f76495b853a5054814a10b6365ee8ed745b") data = Map.set(data, "decimals", 8) end if chain_id == 1 do data = Map.set(data, "endpoints", ["https://mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a","https://eth-mainnet.g.alchemy.com/v2/tgCq5a1zrmYn4ZjEn74UAW9gUXlDPzQi"]) data = Map.set(data, "proxy_address", "0x346dba8b51485ffbd4b07b0bcb84f48117751ad9") data = Map.set(data, "decimals", 8) end data end fun get_call_request(evm_contract, call, id) do abi_data = Evm.abi_encode(call) tx = [to: evm_contract, data: "0x#{abi_data}"] [jsonrpc: "2.0", id: id, method: "eth_call", params: [tx, "latest"]] end fun get_response(responses, id) do response = nil for res in responses do if res.id == id do response = Map.get(res, "result") end end response end fun any_nil?(list) do nil? = false for i in list do if i == nil do nil? = true end end nil? end fun get_tx_receipt_request(evm_tx_address) do [ jsonrpc: "2.0", id: 1, method: "eth_getTransactionReceipt", params: [evm_tx_address] ] end fun valid_tx_receipt?(tx_receipt, proxy_address, evm_contract, expected_event) do logs = nil for log in tx_receipt.logs do if String.to_lowercase(log.address) == proxy_address do logs = log end end if logs != nil do # Transaction is valid valid_status? = tx_receipt.status == "0x1" # Transaction interacted with proxy address valid_proxy_address? = String.to_lowercase(tx_receipt.to) == proxy_address # Logs are comming from proxy address valid_logs_address? = String.to_lowercase(logs.address) == proxy_address # Pool contract emmited expected event event = List.at(logs.topics, 0) valid_event? = String.to_lowercase(event) == expected_event # Contract minted match evm_contract in parameters decoded_data = Evm.abi_decode("(address)", List.at(logs.topics, 1)) topic_address = List.at(decoded_data, 0) valid_contract_address? = topic_address == String.to_lowercase(evm_contract) valid_status? && valid_proxy_address? && valid_logs_address? && valid_event? && valid_contract_address? else false end end fun valid_status?(call_status, expected_status) do decoded_data = Evm.abi_decode("(uint)", call_status) List.at(decoded_data, 0) == expected_status end fun enough_funds?(call_enough_funds) do decoded_data = Evm.abi_decode("(bool)", call_enough_funds) List.at(decoded_data, 0) == true end fun valid_hash?(call_hash, secret_hash) do secret_hash = "0x#{String.to_lowercase(secret_hash)}" decoded_data = Evm.abi_decode("(bytes32)", call_hash) List.at(decoded_data, 0) == secret_hash end fun valid_end_time?(call_end_time, end_time) do decoded_data = Evm.abi_decode("(uint256)", call_end_time) List.at(decoded_data, 0) == end_time end fun valid_amount?(call_amount, amount, decimals) do decoded_data = Evm.abi_decode("(uint256)", call_amount) big_int_amount = List.at(decoded_data, 0) decimal_amount = big_int_amount / Math.pow(10, decimals) decimal_amount == amount end fun valid_recipient?(call_recipient, evm_user_address) do decoded_data = Evm.abi_decode("(address)", call_recipient) String.to_uppercase(List.at(decoded_data, 0)) == String.to_uppercase(evm_user_address) end fun sign_for_evm(data) do prefix = String.to_hex("\x19Ethereum Signed Message:\n32") signature_payload = Crypto.hash("#{prefix}#{data}", "keccak256") sig = Crypto.sign_with_recovery(signature_payload) if sig.v == 0 do sig = Map.set(sig, "v", 27) else sig = Map.set(sig, "v", 28) end sig end fun query_evm_apis(endpoints, method, headers, body) do requests = [] for endpoint in endpoints do requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body) end Http.request_many(requests, false) end
Content (0 B)
{ "charged_contracts": { "1": {}, "137": { "0x1ea08b4fdfc63d10e767081ac019ef8d5595ba8c": 1731542040, "0xb2da6f418c368ec4fd9099d5aeefe2a516d905cb": 1731542460 }, "56": {} }, "requested_secrets": { "0000026260CA735F1E385FE025414808141D4E3C6746AEBCAE1F0E7A061CA3E71569": { "chain_id": 137, "end_time": 1716208740, "hmac_address": "00004FFE8645115E4810819ED47BF3D54AF99412D0F6B3B312DB780DDD8B6ED67A4A" }, "000002FE741A451E1C9318D354949D72F1128DC0CE4A3C646A5B8E8E4A14DAFFB11C": { "chain_id": 137, "end_time": 1724942820, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "0000F73CE4E8A2335697BBD89B436258C41CB1252CD7D90542AA85006BC3001E7AE9" }, "00003279512D3C51E490F2C9D2A0126A06DB1A7F96A22A17DEA6533B32664F034A45": { "chain_id": 137, "end_time": 1723633440, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "00006DD3DA0C9FE060FE171E3D16352F3399642848BAD48F7BCD44717C2F6B9C9FCF" }, "00004389428BA3B99980159E92D50B913F07D78AD663DD46C25D97B8943AFE856D57": { "chain_id": 137, "end_time": 1715903880, "hmac_address": "0000D2C44EAB5CCD42137156A400056D63FA01C2F5BC23C7FACA7816C4E38FC9D1AD" }, "0000520E00218EE38F45382BFFA5DAE16622F406519E2E100F017C718606A26DB6CF": { "chain_id": 137, "end_time": 1718427840, "hmac_address": "00000195A74CB6882D2E88DEBF57E4DFCCB0D29AF13B4B394E3626311CBFE273EC9F" }, "000055476851FAB79FCBB99BD85CD218AA29A5403572BB4AF9195BE48F5E7919B633": { "chain_id": 1, "end_time": 1721645340, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "0000FC51FB47AA137D26D5BC5A4A6833175024296F15293ADC043F09EC2CED3F6C07" }, "0000584603D899254376E496A9396A370A0E465364E9731991E36167686BBBFAF711": { "chain_id": 137, "end_time": 1724940540, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "0000404DC70BAADBA9810194A9EF59B657B350DF5D132A1F3A5697F7B2880B13549B" }, "00005E16EFA3687B7839A7F596F573404A3CAE624ED0127D3FFA7FB3EDB4A878924F": { "chain_id": 137, "end_time": 1724942700, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "000004AB3757DEF30803E135C281FEBC7154B6F8117C3F3041CC350A415D2F539083" }, "00009545F6D85F62110B690C78810181AC98853C9539D2E15CBAB8A8791C6767F5C6": { "chain_id": 137, "end_time": 1725282840, "evm_user_address": "0x7f0f44c4edfbb7c54501547009d32a2bc788be79", "hmac_address": "0000E7A2022A912024510B1FC281966E1A8CF5A0E2B888BFA7591ABEDE95649FB7CB" }, "0000A4F2F00F18C38BBB65C84093DA265A477D555BE95BD10D72C79FB25C5C78089F": { "chain_id": 137, "end_time": 1714258020, "hmac_address": "000087849B359682CC19FDC0D51E2159EAFBDC81D5BBA078898ECE8F4E6D91A9ECAA" }, "0000A556D989B411A3500074A2262700941CA3908788BAB50A476F563ADE6AB67CCD": { "chain_id": 137, "end_time": 1715693880, "hmac_address": "000083359120E10BDF9EC0BD8C0D4A9726B62548DECAE74A710DFB23650BE9B3EB10" }, "0000AC66DC77CE296F59A43EC81193271798C808C77AA4D5ECECE714DE1D4C103888": { "chain_id": 137, "end_time": 1715874600, "hmac_address": "000051373B18A3488DAB9C6348D6662CA765576AAF9ADB41311D55153459A49FB447" }, "0000C1D7A78C8623DF76D6C0F828B1B3005BFD1EF9CC4F01E9085515141121E707FB": { "chain_id": 137, "end_time": 1718656080, "hmac_address": "000016CA89A584BD453D88E391CB2E2467DD8CD9F27F27C5DF3640F64F501692DEAB" }, "0000C6DA4EC5A8DF238C59582F1E1C073490303E88DD39AFF1BD9A079B389862EB48": { "chain_id": 137, "end_time": 1715870160, "hmac_address": "000058ED3FE7F85CE5912204F6DCE8A11A28FCCAE685940CD4EE93978BD4AC718707" }, "0000D60B0638875B0DF73DBAEE5B298286A5E82F11E56A34F95B9A7FDD3EE36F1266": { "chain_id": 56, "end_time": 1727264160, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "0000BE7E21240303519DF3D056B9CBBD5B4755B63BA6C55587879B71B50AB5425D6B" }, "0000ED0D323C89AA21A34D54AF709B3C2B7B13E98913D3A9B693D14F784E578C729C": { "chain_id": 1, "end_time": 1722511800, "evm_user_address": "0xad1f4df14dc3eb4094092cf44b713067431813b8", "hmac_address": "0000DE60DB4C9A2038BFD68972A10054FD98DE3FB7E68203086A9C27E68604E6343E" }, "0000EF49932B7A87BE788002A9D1727098639E0186AD2E66692FFC6B07221BDE8ED0": { "chain_id": 1, "end_time": 1721647980, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "0000DCE7482904BC0D781AB612696D3CEA6562363F1B5E11C54C7ACFB2DAC06DF51D" }, "0000F12AC0846D1D547EE50694E9D6AB40B81928D85193246510A4E427C903E83856": { "chain_id": 137, "end_time": 1724941440, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "00005B1DC8F3F75CF9D9C61A475EFD7A2BB19E3F778CEC8A901CF0AC97EA36370EA5" }, "0000FC611D060ED4A0B49EB161E06136EAB61FE490F1C5343D4A7241C2794EF75801": { "chain_id": 137, "end_time": 1724941800, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "0000E1608FBE4C2F047361B8111CB0C96094A778A0CF4F8390C909F168FDD3345763" }, "0000FD9B62664DDD571DC2CF7270A844C9716259328EF58CFEE75B5BA71204650502": { "chain_id": 137, "end_time": 1724941920, "evm_user_address": "0xccbe79dc320a924a851cc58df19b2dc97c2ae692", "hmac_address": "0000DA7378D581605C44D70E553F2196AE21833FA792E84C6BB4CAE5FE3134ADB793" } } }
-
Secret shared with 1 key
Encoded secret
68342DEF817059D3E29A972E85D0F223213696CFA03E3D1C1C49724A5748CDAF8A569E319ABA0E095B2DDB07C6993C1CC4C31C3A5C97A10B39D62EC5
Authorized keys
- 000122A6CD9ED07E46835D6E88E5BD0BEE84C3F5E5DBF8E916AD9B2EC912C44AFEC2
-
Resolved 00000DFC...84DCprovision
[ "0xB2Da6f418c368Ec4fD9099D5aeeFe2A516d905Cb", [ "https://polygon-mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a", "https://polygon-mainnet.g.alchemy.com/v2/0aM2uAp3J-LsOlijDBZ3aZiCUvZdjiHb" ], { "r": "852356C5FE0221DA888056937569536AFE12AF2F162CDFA27A0511038F16C86E", "s": "32749E892E6B36D284034AB84DC2E1B4F599CF394CD5800754CD6D83239E66A6", "v": 28 }, "0xd5ca9f76495b853a5054814a10b6365ee8ed745b" ]
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 00006CC0...F879At 2024-11-13 22:02:54 UTCAmount 209,222,831.48772792 UCO
Previous public key
000167C10A4B0017EBF26B5C04203754CB3B38F9C253AF7131FA69098358840EE21D
Previous signature
2A237280CCEB0634E227C5BB5E1645E9DA6CAA3DE6A8C2BED22A50554E2B1A5D30AEAF8E15E20E15F0B5041BAE5D83E49CA152A49A9D053C7F833C6FD9CF4A0E
Origin signature
3045022100A0D780CC77BD0795AD5A2D92A1F83814F5F1B951B2BABD233507890B184BEB2C02201137A11838EDA6EAF4C05FD89151290EFC08AF2513E062C5E04EEB378281E7F2
Proof of work
010204480DD0A3F06534B4F9B9D93AC3BCC7EA8437BAE24295DBCB92035EE4E5C7AC86DE42699A2F1481F9F892D528363680AF126B34DADED27CFC5CF4F778B7027D14
Proof of integrity
0000EE2E71F0BD0FE6863DF06B2DE7A4F4D303A7FC71D598D36FDBDD25D48D1CF7
Coordinator signature
44CB67749ACF33EEEA9AF426C3BA21ADB009592DC3151AF15071DD31F0AA6FF2FCD33891E58BE2939483863709ED77BBB1837B313BB73358305B62C2745DC606
Validator #1 public key
0001AA2CB2D202420DADFCF965225B9F0493D1F148F07850C02BD27BD58234E9E58D
Validator #1 signature
58E58374EF1E0AF0B83FADD60FD52B038F73B12756FE630CAB2A1412726C57DCA684C34F2AC2A222DBE82507240A81504EF962CC0FB686F54A05BF1E912F990A
Validator #2 public key
000105B4FDF46B9FE90C30A471DCE4D296CCCDC27242C6CDA6E48622F4330C646100
Validator #2 signature
57CA5C66144FBCF8FB88B9EEC5258726088D7950573E26B07F0EBB37F8003D8551BB523D36890F894F29D7CC47E386865F01F105907432134C2D20C91E59F204