Skip to content

Instantly share code, notes, and snippets.

@denniswon
denniswon / gist:30bde30c18bd1b315e1d39a6ce08c188
Created February 24, 2026 00:59
Newton whitepaper design decision analysis
---
Design Decision Analysis
Decision 1: Interactive DKG vs Deterministic Derivation
This is about how operators produce their threshold HPKE keypair — the (t,n)-threshold key that clients encrypt to.
Option A: Interactive DKG (Distributed Key Generation)
A multi-round interactive protocol (e.g., Feldman VSS, Pedersen DKG, or FROST DKG) where operators jointly generate a threshold
@denniswon
denniswon / gist:32f8d9d25144dbc435f6da7c0f24f242
Created February 22, 2026 16:13
E2E Test: Stagef Secrets Upload Flow
Plan to implement │
│ │
│ E2E Test: Stagef Secrets Upload Flow │
│ │
│ Context │
│ │
│ We need a cross-service E2E test that validates the full API key + secrets upload pipeline across newton-dashboard-api and │
│ newton-prover-avs gateway on the Sepolia stagef environment. Thi
Plan to implement │
│ │
│ Newton Privacy Layer - Phase 1A Implementation Plan │
│ │
│ Overview │
│ │
│ Add privacy-preserving data handling to the existing Two-Phase Consensus protocol. All changes follow existing codebase patterns and │
│ maintain backward compatibility through Option<T> fields and fea
---
Repository Changes Audit: Impact on Newton Privacy Layer
★ Insight ─────────────────────────────────────
This analysis compares the current codebase (as of Feb 10, 2026) against the Linear issues and Notion docs created on January 17, 2026.
Since then, ~70 non-merge commits landed, including major architectural features like Two-Phase Consensus, Two-Digest System, direct
attestation validation, and significant gateway refactoring. These changes strengthen the privacy layer integration rather than invalidate
it, but several Linear issue descriptions reference outdated struct names, missing file paths, and don't account for new architecture.
─────────────────────────────────────────────────
@denniswon
denniswon / openclaw-security-setup.md
Created February 6, 2026 19:23 — forked from jordanlyall/openclaw-security-setup.md
OpenClaw Security-First Setup Commands - Companion to my X article on hardening your AI agent setup

OpenClaw Security-First Setup Commands

Companion to: "How I Set Up OpenClaw Without Giving It the Keys to My Life"

Phase 1: Harden the Machine

Create Dedicated User

sudo sysadminctl -addUser openclaw -password - -home /Users/openclaw
## User
https://github.com/newt-foundation/newton-prover-avs-deploy/actions/runs/21700832804 prod deployment failed. But I do not see any error or issue (or cant find it myself), I do not see any errors on datadog for the services either for sepolia prod. Help me fix this issue.
## Assistant
I'll help you investigate this failed deployment. Let me first fetch the GitHub Actions run details to understand what went wrong.
**Tool Call: `cd /Users/denniswon/projects/newton-prover-avs-deploy && gh run view 21700832804 --json status,conclusion,jobs,name,headBranch,event 2>&1`**
Status: Failed
⏺ Based on the investigation summary, I understand the root cause: in centralized mode, the Gateway operator goes through a
CHANNEL-based path while external operators go through a DIRECT aggregation path. This creates two separate aggregations instead of
one unified aggregation.
Let me examine the current flow in sync.rs and implement the fix:
⏺ Read 1 file (ctrl+o to expand)
⎿  Loaded crates/CLAUDE.md
⏺ I can see the issue clearly now. Let me trace through the code:
@denniswon
denniswon / gist:f2c7e5410eafd255cbc59d7e0f0cf500
Created January 30, 2026 15:19
0x6c3f3e7d9e5ca0621123e2930a98521c5e46df16328539e90bcecdb6880ba6d2
{"spans":[{"name":"submit_aggregated_response"},{"name":"submit_aggregated_response"}],"task_manager":"0xCbC425b73e01C9B8f40c62b638F9750486127B75","level":"ERROR","service":"newton-prover-gateway","calldata_hex":"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
@denniswon
denniswon / gist:f544c603c424fe27a3becb67536a3329
Created January 30, 2026 14:44
Aggregation failed: Task response not found for task 0xaf3de20205e44c75f63bbbce0fd29d2e14362ab38ac2c16b339cedff73e3e1f3
{"spans":[{"name":"submit_aggregated_response"},{"name":"submit_aggregated_response"}],"task_manager":"0xCbC425b73e01C9B8f40c62b638F9750486127B75","level":"ERROR","service":"newton-prover-gateway","calldata_hex":"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
@denniswon
denniswon / diff-v2.txt
Created January 7, 2026 02:06
make diff-v2
dennis.won@magic ~/projects/deploy (cdk-v2-test ✭ ✗) » make diff-v2
Stack NewtonAVS-Sepolia-Stagef-Network
Security Group Changes
┌───┬──────────────────────────────────────┬─────┬────────────┬──────────────────────────────────────┐
│ │ Group │ Dir │ Protocol │ Peer │
├───┼──────────────────────────────────────┼─────┼────────────┼──────────────────────────────────────┤
│ + │ ${ALBSecurityGroup.GroupId} │ In │ TCP 80 │ Everyone (IPv4) │
│ + │ ${ALBSecurityGroup.GroupId} │ In │ TCP 443 │ Everyone (IPv4) │
│ + │ ${ALBSecurityGroup.GroupId} │ Out │ Everything │ Everyone (IPv4) │
├───┼──────────────────────────────────────┼─────┼────────────┼──────────────────────────────────────┤