Serai is a new DEX, built from the ground up, initially planning on listing Bitcoin, Ethereum, DAI, and Monero, offering a liquidity-pool-based trading experience. Funds are stored in an economically secured threshold-multisig wallet.
Find a file
Luke Parker a0a2ef22e4
Remove ethers-solc
ethers-solc was used for a type (now manually specified) and to call out to
solc. Since Foundry was already a documented dependency, a call to it now
handles building.

Removing this single crate removes a total of 17 crates from our dependency
tree. While these may still be around due to Foundry, they at least may not
be.

Further work to remove the requirement on Foundry for solc alone would be
appreciated.
2023-11-08 06:25:35 -05:00
.github Remove ethers-solc 2023-11-08 06:25:35 -05:00
audits Add coins/bitcoin audit by Cypher Stack 2023-08-21 01:20:09 -04:00
coins Remove ethers-solc 2023-11-08 06:25:35 -05:00
common Use a single long-lived RPC connection when authenticated 2023-11-07 17:42:19 -05:00
coordinator Add dedicated BatchSignId 2023-11-06 20:06:36 -05:00
crypto Remove unused dependencies 2023-11-04 19:26:38 -04:00
docs Remove ethers-solc 2023-11-08 06:25:35 -05:00
message-queue Don't default to basic-auth if it's enabled, yet require it to be specified 2023-11-06 10:42:01 -05:00
mini Add support for multiple multisigs to the processor (#377) 2023-09-25 09:48:15 -04:00
orchestration Fix accumulated bugs 2023-11-06 18:12:53 -05:00
processor Have processor's Network::new sleep until booted, not panic 2023-11-08 03:21:28 -05:00
substrate Remove frame-benchmarking-cli 2023-11-08 05:59:56 -05:00
tests Use a single long-lived RPC connection when authenticated 2023-11-07 17:42:19 -05:00
.gitattributes Correct audit file upload 2023-03-20 17:35:45 -04:00
.gitignore E2E test coordinator KeyGen 2023-08-14 06:54:17 -04:00
.rustfmt.toml .rustmfmt.toml: add edition 2023-07-20 15:28:03 -04:00
AGPL-3.0 Add an initial Substrate instantiation 2022-07-15 00:05:00 -04:00
Cargo.lock Remove ethers-solc 2023-11-08 06:25:35 -05:00
Cargo.toml Replace reqwest with simple-request 2023-11-06 09:47:12 -05:00
CONTRIBUTING.md Clarify identation policy 2022-10-11 00:40:50 -05:00
deny.toml Add missing crate to tests, remove no longer present RUSTSEC ignore 2023-11-05 12:11:08 -05:00
LICENSE Update licenses 2023-01-11 23:05:31 -05:00
README.md README.md: Add links to Reddit, Telegram and Website 2023-10-07 13:32:52 -04:00

Serai

Serai is a new DEX, built from the ground up, initially planning on listing Bitcoin, Ethereum, DAI, and Monero, offering a liquidity-pool-based trading experience. Funds are stored in an economically secured threshold-multisig wallet.

Getting Started

Layout

  • audits: Audits for various parts of Serai.

  • docs: Documentation on the Serai protocol.

  • common: Crates containing utilities common to a variety of areas under Serai, none neatly fitting under another category.

  • crypto: A series of composable cryptographic libraries built around the ff/group APIs, achieving a variety of tasks. These range from generic infrastructure, to our IETF-compliant FROST implementation, to a DLEq proof as needed for Bitcoin-Monero atomic swaps.

  • coins: Various coin libraries intended for usage in Serai yet also by the wider community. This means they will always support the functionality Serai needs, yet won't disadvantage other use cases when possible.

  • message-queue: An ordered message server so services can talk to each other, even when the other is offline.

  • processor: A generic chain processor to process data for Serai and process events from Serai, executing transactions as expected and needed.

  • coordinator: A service to manage processors and communicate over a P2P network with other validators.

  • substrate: Substrate crates used to instantiate the Serai network.

  • orchestration: Dockerfiles and scripts to deploy a Serai node/test environment.

  • tests: Tests for various crates. Generally, crate/src/tests is used, or crate/tests, yet any tests requiring crates' binaries are placed here.

Security

Serai hosts a bug bounty program via Immunefi. For in-scope critical vulnerabilities, we will reward whitehats with up to $30,000.

Anything not in-scope should still be submitted through Immunefi, with rewards issued at the discretion of the Immunefi program managers.