NECSS: A Framework for Private Applications (Phase 1) #8623
yoyoismee
started this conversation in
[NRG#4] Developer Tools
Replies: 1 comment
-
Smart contract security considerations are all about writing code that can’t be exploited. Since blockchain is permanent and public, one small bug can lead to big losses. Developers need to check for issues like reentrancy, overflows, and access control. It’s not just about making things work—it’s about making sure they work safely and can’t be abused. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
NECSS: A Framework for Private Applications (Phase 1)
Summary
NECSS (pronounced "nexus") or "Noir Entity Component System and Secret" is a comprehensive framework designed to accelerate the development of private applications using zero-knowledge proofs. By providing templates, code generation tools, out-of-the-box integrated modules, and standardized patterns, NECSS aims to do for ZK applications what MUD has done for fully-on-chain games.
In this first phase, we aim to ship an MVP that supports fundamental ZK design patterns such as commit-claim, signature-claim, note-nullifier schemes, privacy-preserving state transitions, etc. The scope encompasses the entire development stack: Noir for ZK circuits, Solidity for on-chain verification, TypeScript for client applications, and an indexing service for efficient data retrieval.
Motivation
Methodology
We plan to build in public and collaborate with the community to refine the direction and scope. While our initial design is heavily inspired by Lattice's MUD framework, we're adapting it specifically for the unique requirements of private applications using ZK proofs.
Core Components
1. NCESS Data Standard (aka components)
A standardized data management system for ZK applications that:
2. NCESS System Standard
3. Indexer
A specialized indexing service that track relevant data for each design pattern that works out of the box.
4. Client
5. CLI
Business Model
Timeline and Deliverables
Phase 1 (6 months)
Weeks 1-4: Community engagement and requirements refinement
Months 2-4: MVP Development
Months 5-6: Documentation, Examples, and Outreach
Team
We are co-founders of Tetration Lab, a research and development lab focused on zero-knowledge proofs, cryptography, and web3 technologies.
We previously developed multiple open-source cryptography libraries, focused on primitive cryptography implementation on smart contract (EVM) and Rust (Arkworks) (Ref: https://github.com/Tetration-Lab)
We also won multiple hackathon building novel privacy applications utilizing ZK and FHE technology, the notable one includes “zkVM”, a simple ZK vm that simplifies the process of turning simple vm into a provable vm with privacy components using ZK through Noir. Another one is “ZTF”, A on-chain ctf with claimable bounty using ZK through Risc-0 by proving malicious state transition of EVM contract state. (More: https://www.tetrationlab.com/)
Additionally, we won Zama bounty to implement the most efficient ECDSA signing in TFHE-rs. (Ref: zama-ai/bounty-program#45)
@yoyoismee - Signal: yoyoismee.48
@yoisha (https://yoisha.dev/) - Signal: @yyyoisha.64
Start Date
1 June 2025
Beta Was this translation helpful? Give feedback.
All reactions