Skip to content

Instantly share code, notes, and snippets.

@denniswon
denniswon / gist:8ac0a41a1538344e6b799d113094736f
Created March 6, 2026 09:42
Reliability Analysis & Plan Review
---
Reliability Analysis & Plan Review
★ Insight ─────────────────────────────────────
This is a thorough first-pass reliability audit by a new team member. The approach — analysis doc identifying gaps, then a plan
doc with actionable tickets — is solid. I'm reviewing for factual accuracy against the actual codebase, priority correctness, and
any gaps the author may have missed.
─────────────────────────────────────────────────
---
@denniswon
denniswon / gist:b437d20946c761bd997839f52e0c02fe
Created March 5, 2026 19:24
Analysis: Database Schema Changes Required for Multichain Gateway
Now I have the complete picture. Let me compile the analysis.
---
Analysis: Database Schema Changes Required for Multichain Gateway
What the PRs Changed (Summary)
┌──────┬─────────────────────────────────────────────┬───────────────────────────────────────┐
│ PR │ Title │ DB Changes │
├──────┼─────────────────────────────────────────────┼───────────────────────────────────────┤
@denniswon
denniswon / gist:e716fd0542c617caeff89bfcb17c291d
Created March 5, 2026 03:15
Design: Destination Chain Challenge Relay to L1 for Slashing
Now I have the complete picture. Let me deliver the design analysis.
★ Insight ─────────────────────────────────────
ELIP-008 does NOT specify cross-chain slashing. It only covers one direction: L1→L2 operator table transport and L2 certificate
verification. The reverse direction (L2 challenge → L1 slashing) is entirely AVS-specific. This means Newton has full design
freedom here — there's no EigenLayer standard to conform to for the relay mechanism.
Critical finding from the contract analysis: The source chain's ChallengeVerifier.raiseAndResolveChallenge() (line 109)
requires allTaskHashes[taskResponse.taskId] to be non-zero — meaning the task must exist on the source chain. Destination-chain
tasks are never registered on the source chain's TaskManager. This means you cannot simply call the source chain's existing
@denniswon
denniswon / gist:eb560a373104299af2e2b1a249ebc878
Created March 3, 2026 19:57
Comprehensive Audit Report: Deploy Repo vs AVS Repo
---
Comprehensive Audit Report: Deploy Repo vs AVS Repo
CRITICAL: NetworkMode Destination Chain Mismatch
Severity: BLOCKING — the gateway and operator will fail to start in production.
The AVS repo's NetworkMode enum (crates/core/src/common/network.rs:41-47) defines destination chains that do NOT match the deploy repo's
configuration:
@denniswon
denniswon / gist:06ce7fed8a9b4dbd6749636391e51557
Created March 1, 2026 01:25
newton dev docs revamp roadmap
⏺ Phase 1 (.claude/ infrastructure) is complete. The original plan mentioned the next phases would cover the documentation revamp — new
pages, restructuring, FAQ/Glossary, etc.
I don’t have a detailed plan written for Phase 2. What would you like to tackle next? Some options:
1. Restructure the Developers tab — reorganize into the planned Getting Started → Guides → Concepts → Reference → Advanced → Resources
structure
2. Add new pages — FAQ, Glossary, or other missing content
3. Content audit — review existing pages for accuracy, broken links, outdated info
4. Something else — if you have a specific plan doc or priorities in mind
@denniswon
denniswon / gist:c303e43a9629142dcac51d7a493554ff
Created February 28, 2026 23:49
Cross-Chain Gateway — Phase 1 Implementation Plan
★ Insight ─────────────────────────────────────
Two operator-gateway communication patterns exist:
1. Sync path (newt_createTask): Gateway calls operator RPC (newt_evaluateAndSign), collects SignedTaskResponse as inline response.
Gateway drives the flow.
2. Async path (newt_sendTask): Gateway fires process_task to operator (returns immediately), operator processes in background, then
pushes SignedTaskResponse back to gateway's /aggregate Axum endpoint via ClientAggregator.
The /aggregate endpoint is a separate Axum route (not on /rpc jsonrpsee server), with no API key auth — BLS signature verification
serves as authentication. The watcher's /watcher endpoint follows this exact same pattern.
─────────────────────────────────────────────────
@denniswon
denniswon / gist:3bbf7867f9f1ad09c041a9da6fe88ba0
Last active February 27, 2026 19:12
the current progress on transporter and challenger including its e2e testing plan and flow
Plan to implement │
│ │
│ Plan: Separate Challenge Logic from Transporter, Expand Challenger Crate │
│ │
│ Context │
│ │
│ Newton Prover AVS bundles destination-chain challenge logic inside crates/transporter/. This violates separation of concerns: │
│ - Transport is privileged (onlyOwner on confirmGlobalTableRoot, updateOperatorTable)
★ Insight ─────────────────────────────────────
They don't need to share a key. My analysis conflated "per-chain signer" with "one signer per chain for all operations." In
reality, the dest chain contracts don't enforce that table updates and challenges come from the same address. These are
independent on-chain roles.
─────────────────────────────────────────────────
Let me verify what the contracts actually enforce:
⏺ Searched for 4 patterns, read 1 file (ctrl+o to expand)
⎿  Loaded contracts/CLAUDE.md
★ Insight ─────────────────────────────────────
They don't need to share a key. My analysis conflated "per-chain signer" with "one signer per chain for all operations." In
reality, the dest chain contracts don't enforce that table updates and challenges come from the same address. These are
independent on-chain roles.
─────────────────────────────────────────────────
Let me verify what the contracts actually enforce:
⏺ Searched for 4 patterns, read 1 file (ctrl+o to expand)
⎿  Loaded contracts/CLAUDE.md
@denniswon
denniswon / gist:c14da11214d9a5a9d0bb18d22c56f77a
Created February 25, 2026 07:19
TLSNotary Integration — Complete Technical State Analysis
---
TLSNotary Integration — Complete Technical State Analysis
1. Architecture Overview
The TLSNotary integration adds zkTLS (MPC-TLS based proof of web data) to Newton Protocol. It enables operators to
cryptographically verify that data was fetched from a specific HTTPS API without ever seeing the user's credentials.
┌─────────────┐ ┌──────────────┐ ┌──────────┐ ┌──────────────┐
│ Browser │ WS │ Newton │ TCP │ Target │ │ IPFS │