Serai is a new DEX, built from the ground up, initially planning on listing Bitcoin, Ethereum, DAI, and Monero, offering a liquidity-pool-based trading experience. Funds are stored in an economically secured threshold-multisig wallet.
Find a file
Luke Parker fab7a0a7cb
Use the deterministically built wasm
Has the Dockerfile output to a volume. Has the node use the wasm from the
volume, if it exists.
2024-03-22 02:19:09 -04:00
.github Add just-the-docs based user-facing documentation 2024-03-11 17:55:27 -04:00
audits Add coins/bitcoin audit by Cypher Stack 2023-08-21 01:20:09 -04:00
coins Reconcile the two copies of scalar_vector.rs in monero-serai 2024-03-02 17:15:16 -05:00
common Use OptimisticTransactionDb 2024-03-20 23:42:40 -04:00
coordinator Typo fix for prior commit 2024-03-11 02:20:51 -04:00
crypto Resolve latest clippy and a couple no longer needed fmt notes 2024-01-22 22:13:37 -05:00
docs Add slightly nicer formatting re: Protocol Changes doc 2024-03-12 00:59:51 -04:00
message-queue PR to track down CI failures (#501) 2024-01-04 01:08:13 -05:00
mini Add workspace lints 2023-12-17 00:04:47 -05:00
orchestration Use the deterministically built wasm 2024-03-22 02:19:09 -04:00
patches zstd 0.13 2024-03-20 21:53:57 -04:00
processor Monero: fix decoy selection algo and add test for latest spendable (#384) 2024-02-19 21:34:10 -05:00
spec Move docs to spec 2024-03-11 17:55:05 -04:00
substrate Use the deterministically built wasm 2024-03-22 02:19:09 -04:00
tests Reduce coordinator tests contention re: cosign messages 2024-03-20 08:23:23 -04:00
.gitattributes Correct audit file upload 2023-03-20 17:35:45 -04:00
.gitignore Add validator set rotation test for the node side (#532) 2024-02-24 14:51:06 -05:00
.rustfmt.toml .rustmfmt.toml: add edition 2023-07-20 15:28:03 -04:00
AGPL-3.0 Add an initial Substrate instantiation 2022-07-15 00:05:00 -04:00
Cargo.lock zstd 0.13 2024-03-20 21:53:57 -04:00
Cargo.toml Redo how WAL/logs are limited by the DB 2024-03-09 02:20:14 -05:00
CONTRIBUTING.md Clarify identation policy 2022-10-11 00:40:50 -05:00
deny.toml Redo Dockerfile generation (#530) 2024-02-09 02:48:44 -05:00
LICENSE Update licenses 2023-01-11 23:05:31 -05:00
README.md Add docs, correct URL 2024-03-11 20:00:01 -04:00
rust-toolchain.toml Rust 1.77 2024-03-21 20:09:33 -04:00

Serai

Serai is a new DEX, built from the ground up, initially planning on listing Bitcoin, Ethereum, DAI, and Monero, offering a liquidity-pool-based trading experience. Funds are stored in an economically secured threshold-multisig wallet.

Getting Started

Layout

  • audits: Audits for various parts of Serai.

  • spec: The specification of the Serai protocol, both internally and as networked.

  • docs: User-facing documentation on the Serai protocol.

  • common: Crates containing utilities common to a variety of areas under Serai, none neatly fitting under another category.

  • crypto: A series of composable cryptographic libraries built around the ff/group APIs, achieving a variety of tasks. These range from generic infrastructure, to our IETF-compliant FROST implementation, to a DLEq proof as needed for Bitcoin-Monero atomic swaps.

  • coins: Various coin libraries intended for usage in Serai yet also by the wider community. This means they will always support the functionality Serai needs, yet won't disadvantage other use cases when possible.

  • message-queue: An ordered message server so services can talk to each other, even when the other is offline.

  • processor: A generic chain processor to process data for Serai and process events from Serai, executing transactions as expected and needed.

  • coordinator: A service to manage processors and communicate over a P2P network with other validators.

  • substrate: Substrate crates used to instantiate the Serai network.

  • orchestration: Dockerfiles and scripts to deploy a Serai node/test environment.

  • tests: Tests for various crates. Generally, crate/src/tests is used, or crate/tests, yet any tests requiring crates' binaries are placed here.

Security

Serai hosts a bug bounty program via Immunefi. For in-scope critical vulnerabilities, we will reward whitehats with up to $30,000.

Anything not in-scope should still be submitted through Immunefi, with rewards issued at the discretion of the Immunefi program managers.