Flashnet executes complex actions (AMM pool creation, swaps, CLOB, escrow, etc.) without a general-purpose VM by combining three independent actors. The model deliberately splits authority so that no single party can move funds or mutate state.Documentation Index
Fetch the complete documentation index at: https://docs.flashnet.xyz/llms.txt
Use this file to discover all available pages before exploring further.
Why the Split Works
- Custody stays with the user until the very moment all validators agree the intent is valid; the TEE cannot act without the shards, and validators cannot act without the enclave.
- m-of-n secret sharing permits liveness with up to
n − moffline or malicious validators while preventing sub-threshold collusion. - Deterministic enclave code + remote attestation constrains the TEE to a publicly auditable state machine.
- Accountability means that any validator who withholds shards or signs a bad intent can be proven dishonest and penalised.
Security Assumptions
- The enclave’s hardware isolation (e.g. SGX or Nitro) prevents key extraction; compromised hardware would be detected via failed remote attestation.
- At least m validators are honest and responsive; liveness requires this quorum.
- Spark finality ensures that once the tx is signed the state transition is immutable and can be sequenced to Bitcoin.