ByAUJay
DevOps and blockchain don’t just click together on their own--you’ve got to lay the groundwork first. Take a look at 7Block Labs’ enterprise-ready blueprint that helps you deliver Solidity and ZK while sticking to SOC2-compliant controls, keeping your costs predictable, and meeting production SLOs.
DevOps and Blockchain Integration: 7Block Labs’ Methodology
When it comes to launching blockchain solutions, 7Block Labs takes a one-of-a-kind approach that mixes DevOps principles with the incredible potential of blockchain tech. Here’s a quick look at how we make this integration work.
1. Understanding the Project Requirements
Before we jump into development, we take the time to really get to know what our clients are after. We collect all the necessary details and clear up any questions to ensure we have a strong base for the project.
2. Building a Cross-Functional Team
Collaboration is where the magic happens! We bring together a diverse group of experts--developers, operations pros, security specialists, and beyond--so that everyone can contribute their unique talents. This approach allows us to tackle every aspect of the project from different perspectives.
3. Utilizing Agile Methodologies
We really get into agile practices to keep improving and staying flexible during the development process. By slicing the project into bite-sized pieces, we can easily adapt to changes and make sure everything stays on course.
4. Emphasizing Automation
One of our main goals is to automate those pesky repetitive tasks. This not only saves us a ton of time but also cuts down on those annoying human errors. By using automation tools throughout everything from testing to deployment, we can really smooth out our processes and zero in on what truly counts--delivering a top-notch product.
5. Implementing Continuous Integration and Continuous Deployment (CI/CD)
CI/CD is really the backbone of what we do. We’ve got these automated pipelines in place that make it super easy to integrate code changes and roll out updates quickly. This way, our blockchain solutions are always running smoothly and are kept fresh!
6. Ensuring Security and Compliance
When it comes to blockchain, security is a must-have. We build in security features from day one, and we don’t stop there. We conduct regular audits and assessments to make sure we’re meeting industry standards. This approach helps us keep our clients’ data secure and protected.
7. Monitoring and Feedback Loop
Once the project goes live, our job doesn’t just stop there. We keep a close eye on how things are performing and gather feedback to make any needed tweaks. This way, we can fine-tune our solutions and offer ongoing support, all aimed at ensuring our clients succeed in the long run.
By mixing DevOps with blockchain, 7Block Labs boosts efficiency and rolls out solid solutions that really last. If you’re curious about how our approach can benefit your project, just give us a shout!
The Specific Technical Headache You’re Likely Living With
- Security Review Struggles: Navigating security reviews can feel like wandering through a maze. You’ve been there: smart contracts getting deployed right from laptops, private keys tucked away in CI secrets, and a total lack of clarity when it comes to your artifacts’ chain of custody. It's no surprise that SOC2 auditors get so worked up about change management and key management.
- On-Call SREs in the Dark: It can feel like your SRE team is navigating through a fog. Those node daemons, such as Geth, Besu, and Teku, just don’t vibe well with your app microservices' observability tools. So when block lag and peer churn hit, you’re left in a tough spot, watching your SLAs slip away without even a heads-up.
- Budget Whiplash from Rollup Fees and Release Windows: After Dencun, blob fees are really unpredictable, turning your budget into a wild rollercoaster. Finance is asking for clear numbers before you take the plunge, but let’s face it--your gas and DA cost models are more like fairy tales on a spreadsheet. For more details, head over to (eip4844.com).
- ZK is a Silo: When we talk about circuit changes, like with Halo2 or PLONK, they don’t really operate under the same guidelines as Solidity. This disconnect leads to proving keys, verifier contracts, and GPU/cluster provers becoming a bit out of sync, which can definitely create some headaches.
- Real Supply-Chain Risks: It’s easy to overlook how a single compromised NPM package can mess with your wallet or connect stack. This can lead to serious disruptions in your release pipelines and bump up your incident-response MTTR. Want to dive deeper? Head over to (ledger.com).
What That Risk Really Costs You
- Missed deadlines: If contract admins or multisigs skip out on timelocks or rollback plans, you’re in for an extra week or two of rework for every emergency hotfix. To make matters worse, infrastructure teams get stuck twiddling their thumbs, waiting for “just one more audit” to wrap up.
- Budget overrun: If you’re not staying on top of blob-fee monitoring and brushing off those pre-mortems, you might see your monthly L2 data availability costs soar by double digits. And here’s the kicker--Finance could put the brakes on procurement for the next phase.
- Audit failure exposure: Keeping those old cloud credentials around in your CI and not keeping tabs on your deployers? That’s definitely a recipe for trouble with SOC2 CC6/CC7 controls (you know, the ones about logical access and change management). Ignoring this can set you up for some hefty remediation costs later on.
- Vendor sprawl: When you’re juggling a ton of RPC providers, a mix of signers, and a hodgepodge of bridges, it just makes everything messier. This creates a mountain of security questionnaires, endless renewals, and way more areas to stress over in terms of potential incidents.
- Ops fatigue: If you’re not keeping an eye on Prometheus alerts for things like peer count, sync status, blob base fee, or txpool backpressure, you might end up discovering issues on Twitter instead of in Grafana. Honestly, that’s not exactly the ideal way to stay informed!
7Block Labs’ Methodology to Integrate DevOps and Blockchain (Technical but Pragmatic)
At 7Block Labs, we’re passionate about building a smooth delivery system that can easily align with SOC2 standards for Solidity, ZK, and node operations. The heart of what we do is our cloud-native CI/CD pipeline, which includes verifiable artifacts, policy-gated releases, and top-notch security with auditable key custody.
Security-first CI/CD for Solidity and ZK (SLSA + OIDC)
- Credentials: It's time to ditch those long-lived AWS credentials in GitHub Actions! We're shifting to OpenID Connect (OIDC) for role assumption, which allows each job to generate short-lived tokens. For more details, take a look at the GitHub docs.
- Provenance: We're all about that transparency! With GitHub's attest-build-provenance feature (which is powered by Sigstore), we're creating signed SLSA build-provenance attestations for our contract artifacts and Docker images. This makes it super easy for auditors to trace the origins of our artifacts and see what’s in them. Curious to dive deeper? Check it out here: GitHub Marketplace.
- Static + Property Tests by Default:
- Slither: This tool is really stepping up its game with its detectors and tailored org policies, making sure our PRs are top-notch. You can check out Slither right here.
- Foundry Invariant Testing: We’re making sure we’ve got everything covered with handlers and ghost variables, and we're also throwing in some fuzzing on those critical state machines. Want to dig deeper? Head over here.
- Echidna Property Tests: These tests focus on diving into differential and adversarial sequences. If you're curious to learn more, check out Echidna here.
- Release Choreography:
- Staged Deploy: First up, we kick things off with testnets. After that, we do some dry-runs on a shadow mainnet (simulating it with a forked state), and finally, we roll into a time-locked mainnet upgrade.
- Policy Gates: We really emphasize our policies here--it's “no provenance, no deploy” and “no timelock, no upgrade.”
Key Management That Procurement and Security Sign Off On (HSM-Backed Signers)
- We’re diving into Web3Signer as a network signer layer, leveraging vault/HSM backends like AWS KMS, Azure Key Vault, and HashiCorp Vault. This setup lets us handle Eth1 secp256k1 signing while keeping private keys completely safe. If you want to dig deeper, check it out here: Web3Signer Docs.
- AWS KMS has got your back with support for ECC_SECG_P256K1 for ECDSA_SHA_256. This definitely checks all the right boxes when it comes to enterprise standards for custody and auditability. And don't forget, you can also integrate IAM conditions by repo/ref to really lock down that least privilege approach. For more info, check out the AWS KMS Documentation.
- Governance Hardening:
- Get your Safe (multisig) owners set up to be the proposers for an OpenZeppelin Timelock. Don’t forget to enforce a minimum delay and use the Defender 2.0 workflow to handle upgrade proposals and verify bytecode. If you're looking for more details, check out the docs here: OpenZeppelin Governance.
- Align everything with SOC2 standards by focusing on key custody (CC6), change approval (CC7), and making sure you have incident playbooks lined up (CC7/CC9).
3) Production Node Operations on Kubernetes with First-Class Observability
- Clients:
- For execution, we’re rolling with Geth/Besu and Teku for consensus. And hey, don’t forget to turn on those Prometheus metrics and dashboards! You can get all the details here.
- If you’re diving into Helm charts for Besu in private networks (you know, like validators, transaction nodes, bootnodes), we’ve got your back with a Prometheus/Grafana setup and handy documentation for PVC expansion. Check it out here.
- Metrics and Alerts to Dodge Pager Fatigue:
- Keep an eye on a few key things: block import rate, head lag, number of peers, TX pool fill, JVM/heap (if you’re on Besu), and RPC saturation. The awesome part? You can snag Grafana’s Besu Overview dashboards that are ready to roll right out of the box. Check it out here.
- If you're a Geth user, don’t forget to expose
/debug/metrics/prometheuson port 6060 or any port of your choice. This way, you can scrape those metrics with Prometheus. Dive into the details here.
- Platform Patterns:
- Think about using StatefulSets paired with encrypted PVCs. It’s also a good idea to set up taints and tolerations to manage the affinity for your prover and validator. For peer-to-peer communication, using nodeports works well, while you should keep ingresses reserved for HTTPS RPC.
- When dealing with secrets, lean towards cloud-native solutions like AWS Secrets Manager or Azure Key Vault. Use them with CSI in “cloudNativeServices” mode for your Besu Helm charts. You can dive deeper into this topic here.
4) Economic Engineering: Cost Controls for Dencun/EIP‑4844
- Alright, so when it comes to blob-carrying transactions for rollups, we've got this cool separate fee market that really cuts down the data availability costs compared to calldata. These blobs don’t stick around for long--only about two weeks--and they chill on the consensus layer with the help of those beacon nodes. We monitor the blob base fee and tweak the batch sizes as required. If you want to dive deeper into this, check it out at (eip4844.com).
- Following the rollout of EIP‑4844, the fee situation on major L2s has really improved--like, we’re talking significant changes here. To keep track of everything, we’ve set up an “L2 fee ledger” that helps us sort through read-heavy and write-heavy workloads, plus it lets us forecast our costs every quarter. If you want to explore this more, check out (coinmarketcap.com).
5) ZK Delivery That Feels Like Software--Not Just Research
- Circuit Lifecycle:
- We’re keeping things organized by versioning our Halo2 circuits with semantic tags. This means that proving keys and the verifier ABI are now top-tier artifacts, all decked out with attestations. Oh, and our regression tests have joined the party as part of the CI process!
- Be sure to check out the privacy-scaling-explorations fork of Halo2, which is rocking a KZG backend on BN254. You can also dive into libraries like halo2-lib for handling Keccak and Merkle primitives. Find it all here.
- Proving Infrastructure:
- To scale our proofs effectively, we’re using managed provers like RISC Zero Bonsai to meet our latency SLOs. We've also incorporated wire autoscaling and proof receipt tracking into Grafana and our incident playbooks. If you want to dive deeper, check it out here.
6) Change Management and Rollback: Explaining to a Regulator
When it comes to managing changes and rolling things back, having the right processes is super crucial. Here’s a quick overview of how we tackle it:
- We utilize upgradeable contracts via EIP-1967 proxies, ensuring we double-check the storage layout during the build process. To keep things secure, we’ve implemented timelocked admin handoffs and set up Safe quorum thresholds in our CI policies. This means that nothing gets deployed unless we've got the right number of owners in agreement. For more details, check it out here.
- Check out these playbooks we use:
- “Stuck mempool or fork” runbook: When we're dealing with a traffic jam, we’ll switch over to an archival RPC, restart our policies, and refresh our peer list.
- “Compromised package” runbook: Whenever we run into issues with a package, we make sure that any failed provenance checks trigger a shutdown. We’ve got npm/yarn lockfile pinning locked down, and an emergency revocation is built into our OPA policy. Plus, we picked up some key insights from the Ledger Connect Kit incident that really help shape our SBOM attestations for front-end wallet/connect libraries. You can check out more about that here.
What this looks like in practice (concrete patterns you can lift)
- GitHub Actions YAML (Solidity/Foundry excerpt)
- Let’s set some permissions:
id-token: write; contents: read - Here’s what you need to do next:
- Check out the code with
actions/checkout@v4 - Install Foundry and run
forge test --ffi --fuzz-runs 1_000 - Don’t forget to use
crytic/slither-actionfor static analysis--make sure to fail the build if it finds any high or critical issues! - Then, run
actions/attest-build-provenance@v3withsubject-path: out/YourContract.json(just a heads-up: allow those attestations to be written) - Set up your AWS credentials using
aws-actions/configure-aws-credentials@v4, ensuring you’re assuming a role (and keep it clean--no long-lived keys, use OIDC instead) - Finally, deploy to the testnet via the Defender relayer using
hardhat/forge; create a timelock proposal and make sure you get those Safe approvals!
- Check out the code with
- Let’s set some permissions:
- Web3Signer on EKS
- We’ve got Web3Signer up and running behind a private NLB, using AWS KMS-backed SECP256K1 keys. Access to the signer is managed through IAM roles tied to GitHub OIDC trust conditions. On top of that, we’re serving up metrics on port 9546 for Prometheus. You can dive into all the details in the docs.
- Observability
- Make sure to configure Prometheus to scrape metrics from both Geth’s
/debug/metrics/prometheusendpoint and Besu’s/metrics. We’ve set up Grafana alerts that go off if the head lags by more than 2 blocks for more than 60 seconds. Plus, we get alerted if the blob_base_fee spikes to over 3 times the usual, helping us keep those L2 posting budgets in check. You can find more details here.
- Make sure to configure Prometheus to scrape metrics from both Geth’s
- Kubernetes (Besu)
- Go ahead and use the official Helm charts to set up bootnodes, validators, and RPC nodes. Just a heads up: make sure to turn on “cloudNativeServices” for storing keys in cloud vaults. And as your chain gets bigger, don't forget to increase the PVCs following the maintenance flow outlined in the docs. You can dive deeper into it here.
The GTM Metrics and ROI We Track in 90-Day Pilots
We don’t bother with vanity metrics here! Instead, we’re all about syncing our efforts with the engineering and procurement KPIs that truly make a difference.
- Security and Compliance
- Every deploy artifact we create comes with a signed SLSA attestation, so you can rest easy knowing there are no long-lived cloud credentials floating around in our CI/CD process. Auditors can easily connect the dots with SOC2 CC6/CC7, which focuses on access and change management. (docs.github.com)
- When it comes to governance, we’re totally on top of things with upgrades thanks to Timelock and Safe approvals. Plus, we make sure to check the bytecode before it goes live, just to cover all bases. (docs.openzeppelin.com)
- Reliability
- We've set some pretty high standards with our SLOs: we manage to keep block head lag under 2 blocks for 99.9% of the time, and our p95 RPC latency clocks in at under 200 ms. On top of that, our alert MTTD is now under 2 minutes, all thanks to some great work with our Prometheus rules.
- As for the change failure rate? We're proud to say it's less than 5%! We pull this off by using automatic canaries on testnets and running shadow mainnet simulations.
- Delivery Velocity
- We’ve really cut down on the lead time to mainnet. What used to be a lengthy “audit-and-pray” routine now takes just hours, all thanks to our new policy gates and pre-approved runbooks. These changes mean that typical pilot projects are launching 3-5 times quicker and with greater safety.
- Cost Control (The Money Phrases)
- With the “blob-aware” batch posting from EIP‑4844, we’re seeing a huge drop in rollup DA costs compared to regular calldata in a bunch of scenarios. We're treating this as a controllable expense and have set up alerts for blob fees. Check it out at (eip4844.com).
- Our HSM-backed signers allow us to streamline custody vendors and speed up those security review cycles. This really helps us cut down on those pesky hidden procurement costs.
Emerging Best Practices We Recommend Adopting Now
- Use OIDC across the board in CI/CD: This is a smart move to get rid of those pesky long-lived secrets. Team it up with Sigstore attestations to make sure your releases are not only “secretless” but also “provable.” Want to dive deeper? Check out the details here: GitHub Docs.
- Think of wallet/connect and front-end crypto libraries as if they're regulated supply chain parts: It's crucial to pin your versions, check those signatures, and implement a fail-closed policy if there's any discrepancy in attestations. We’ve noticed that using dynamic loader patterns can really widen the impact of any issues, so we prefer sticking to allowlists for our connect kits. If you’re curious for more details, check out this Ledger blog post.
- Start with Invariant Testing for Protocols: Before jumping into integration tests, it’s a great idea to jot down your invariants--think conservation of value, access control invariants, and those pesky fee accounting bounds. Give these a run with Foundry and Echidna in your CI pipeline. If you want to dig deeper, check out this link: Learn Blockchain.
- ZK as a product: It’s super important to ensure that your circuits, keys, and verifiers are included in the same Software Development Life Cycle (SDLC) as your contracts. Go for a solid backend--like the Halo2 PSE fork with KZG on BN254--and link it up with managed provers (like Bonsai) to keep that latency nice and reliable. You can dive deeper into it on GitHub.
- Kubernetes on Snowflake Nodes: Helm charts for Besu, along with Prometheus and Grafana, are pretty solid, so why not make the most of it? Leverage cloud-native secrets for handling your keys and keep track of PVC expansion as your chain scales up. For more handy tips, check out Besu's official site.
Where 7Block plugs in (and how we’re accountable)
- Architecture and Integration
We really get into the nitty-gritty of chain selection, L2 economics, key management, and governance--making sure everything works for your unique risk model. Take a peek at our personalized blockchain development services and blockchain integration for more info! - Secure Build and Audit
We’re keeping everything secure with Wire OIDC and SLSA, while also getting Slither, Echidna, and Foundry gates in place, along with official upgrade paths. And don’t forget, we can amp up this security with our security audit services and smart contract development. - Productization and go‑to‑market
If you're transitioning from POC to mainnet, we've got your back with SLAs, dashboards, and budgets that your Procurement team will love. And if you're diving into the dApp world, be sure to check out our web3 development services and dApp development solutions. - Cross‑chain and L2 strategy
With the 4844 rollup behind us, we’re all set with our playbooks and observability for bridging. Check out our cross-chain solutions development and blockchain bridge development to learn more! - Tokenization and asset platforms (if relevant to your roadmap)
We're here to be your bridge to on-chain finance, complete with enterprise on-ramps and controls that make auditing a breeze. Dive into what we have in store for you with our asset tokenization and asset management platform development options.
Brief, In-Depth Technical Example: Enterprise Upgrade with SOC2 Mapping
Scenario: Upgrading an ERC-4626 Vault
So, let’s picture this: you’re gearing up to upgrade an ERC-4626 vault. But hold on, this isn’t your run-of-the-mill upgrade. You’re about to roll out some fresh fee logic and throw in a ZK proof to make those claim histories a whole lot smoother.
Why Upgrade?
The aim here is to ramp up efficiency while still sticking to SOC2 standards. By making this upgrade, you're not just improving performance; you're also making sure that user data stays secure and private.
Key Components of the Upgrade
- New Fee Logic:
- We're shaking things up a bit with how fees are calculated and applied. This involves making some adjustments to the smart contract to introduce new rules that can be beneficial for users, all while keeping the system fair and square.
- ZK Proofs:
- Using zero-knowledge proofs is a game changer when it comes to compressing claim histories. This not only speeds things up but also adds an extra layer of security. Basically, users can confirm transactions without having to expose any sensitive info.
Implementation Steps
- Audit the Existing Contract:
- Kick things off by diving deep into the current ERC-4626 vault's code. Make sure you really grasp the existing logic and pinpoint any spots that may need a bit of TLC or updates.
- Develop New Fee Logic:
- Craft and experiment with a fresh fee model. Make sure it meets user expectations and sticks to any relevant regulations.
- Integrate ZK Proofs:
- Dive into adding the ZK proof features. You'll probably want to team up with some cryptography experts to make sure everything's secure and tight.
- Testing Phase:
- Dive into thorough testing for both the updates to the fee logic and the integration of ZK proofs. Make sure to take advantage of testnets to mimic real-world situations effectively.
- Documentation and Mapping to SOC2:
- While you're rolling out the upgrade, make sure to jot down every change you make. It's super important to connect those changes to SOC2 requirements. This way, you’ll have a clear picture of how the upgrade helps safeguard data security and privacy.
- Deployment:
- Launch the upgrade on the mainnet once you've done all the necessary testing. Keep a close eye on things to catch any issues that might pop up and need quick fixing.
- User Communication:
- Make sure to keep users in the loop about any changes. Share helpful documents that explain the perks of the upgrade and how it’ll enhance their experience.
Conclusion
Upgrading an ERC-4626 vault to introduce some cool new fee logic and ZK proofs is a thrilling project. Follow these steps to not only boost the vault’s functionality but also to meet SOC2 standards--this way, you keep user trust at a high level. Remember to keep the user experience in mind, and you’ll be on your way to a successful upgrade!
- Design
- So, the MINTER and PAUSER roles are sticking around, but now ownership is with Timelock. The Proposer role is held by the Safe, which operates as a 3-of-5 multi-signature wallet. Plus, the Executor role has been made more flexible for ease of use, and there's now a handy 48-hour delay for any actions. You can find more details here.
- We’ve also added storage layout checks in Continuous Integration to help avoid any accidental slot collisions when we roll out upgrades.
- CI/CD
- When it comes to PR triggers, we’ve got a solid setup in place. We're using Slither detectors to catch any high or critical issues, running Foundry tests, and checking invariants to ensure stuff like supply conservation and fee upper limits are in check. Plus, we’re throwing in some Echidna differential tests against the last release for good measure.
- During the build phase, we're all about generating a verifier contract for the new Halo2 circuit. We’re also planning to attach SLSA provenance to both the verifier and vault artifacts, making things nice and secure. And guess what? We’re ditching those static credentials by using OIDC for pushing containers to AWS. Check out how to do that here!
- Staging
- In the staging phase, we're all about deploying to the testnet using Defender. We’re whipping up a proposal package for Timelock, making sure to include bytecode verification, and prepping the transaction for the Safe. Check it out here: (openzeppelin.com)
- Production
- After we get the green light, Timelock jumps into action, queuing things up to execute after the delay. We're always checking in on the Grafana dashboards to keep tabs on head lag and RPC saturation throughout the event. Plus, we’ve got a safety net ready to roll--a pre-prepped proposal to revert the implementation address if something doesn’t go as planned after deployment.
- SOC2 Mapping
- When it comes to CC6 (Access), we make sure to keep our keys secure using KMS and have Web3Signer audited. Plus, we stick to least-privileged IAM roles for our CI. You can check out the details here.
- For CC7 (Change), every artifact and deployment is accompanied by a build attestation and an approver list--shout out to Safe and Timelock for that! Find more info on it here.
- And when it comes to CC7/CC9 (Incident), we keep our runbooks, alerts, and post-mortems neatly organized in the same toolchain we rely on for our app services.
Commercial outcomes you can forecast (no speculation)
- Predictable release costs: Shifting rollup DA posting to blob-aware batches while monitoring the blob base fee helps you manage your L2 costs more effectively. Don’t forget to update Finance each month with the necessary documentation. (eip4844.com)
- Procurement-ready security: By combining KMS/HSM signers with provenance attestations, you can speed up security review cycles and avoid any potential red flags regarding key custody. (docs.aws.amazon.com)
- SRE-parity operations: Make sure your node metrics are synced up with your go-to Prometheus/Grafana setup. This helps you stick to the same paging policy and MTTR goals as the rest of your platform. Check it out here: (geth.ethereum.org)
If you want to kick things off strong this quarter, check out this plan:
30-60-90 Day Plan
- 30 Days:
- Dive into OIDC and start setting up some basic SLSA attestations.
- Roll out Slither, Echidna, and Foundry gates.
- Create initial dashboards for Geth, Besu, and Teku.
- 60 Days:
- Place Web3Signer behind KMS.
- Roll out Timelock and get Safe governance up and running.
- Execute some shadow-mainnet simulations.
- 90 Days:
- Get the ZK prover pipeline integrated.
- Establish some blob-fee budget guardrails for those L2 batchers.
- Put together a SOC2-ready control matrix, including links to all the evidence.
Let's make your upcoming mainnet release smoother and turn Procurement into your ally instead of a hurdle.
Book a 90-Day Pilot Strategy Call
Ready to Kickstart Your Journey?
Let’s jump into a 90-Day Pilot Strategy Call! This session is designed to help you whip up a solid plan that’ll guide you toward your goals.
What to Expect
- Personalized Guidance: We'll team up to take a close look at your specific situation and what you really need.
- Actionable Steps: By the end of our time together, you'll walk away with a practical roadmap detailing the steps you need to hit your goals.
- Follow-Up Support: Our support doesn't end when the call does; we’ll keep in touch to ensure you’re staying on course.
How to Book
- Choose a Date: Select a time that fits your schedule from my calendar.
- Fill Out the Form: Take a moment to complete a short questionnaire; this will help me get a better sense of what you need.
- Confirm Your Spot: After everything’s set, I’ll shoot you a confirmation email with all the details.
Ready to Get Started?
Don’t wait around! Hit here to schedule your call and kick off your 90-day journey to success!
Can’t wait to chat!
References
- EIP‑4844 introduces blobs, a new fee market, and temporary data storage, which could really change the game for L2s. Take a look here: (eip4844.com).
- AWS has added support for ECC_SECG_P256K1 (also known as secp256k1 for those who are into the technical details) along with asymmetric signing. If you want to dive deeper, check it out here: (docs.aws.amazon.com).
- If you're a fan of Web3Signer, you'll want to check out the info on key storage backends such as KMS, Azure, and Vault for secp256k1. Get the full scoop here: (docs.web3signer.consensys.io).
- If you're keeping an eye on things with Geth, Besu, or Teku, make sure you check out the Prometheus metrics and the Besu Kubernetes Helm deployments--they're all available right here: (geth.ethereum.org).
- GitHub Actions has really stepped it up with OIDC, which means goodbye to those pesky long-lived secrets! Plus, they’ve introduced signed build provenance using Sigstore. Want to know more? Check it out here: (docs.github.com).
- We’ve had a security incident with the Ledger Connect Kit due to a supply-chain compromise--definitely some takeaways about package governance here. Check out the details: (ledger.com).
- If you're into tech, you might want to check out Halo2, which is a fork of PSE and comes with a KZG backend. It really focuses on managed prover operations. Get all the details here: (github.com).
Internal services and solutions
- Strategy, architecture, and builds: Curious about our web3 development services or want to dive into our blockchain development services? Check them out!
- Security and audits: Your project’s safety is our priority! We offer top-notch security audit services to ensure everything runs smoothly.
- Integrations and cross-chain: If you need assistance with blockchain integration, developing cross-chain solutions, or building a blockchain bridge, we’re here to help!
- Applications and smart contracts: Ready to kick off your project? Let’s get started with our dApp development, smart contract development, and DeFi development services.
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Building a Donation-Based Crowdfunding Platform That Gives Tax Receipts
**Summary:** Donation-based crowdfunding that includes tax receipts has become quite the complex puzzle across different regions. You've got to navigate IRS Pub 1771/526 rules, UK Gift Aid declarations, Canada’s CRA receipting, and the new eIDAS/OpenID4VCI wallets--all while keeping everything running smoothly.
ByAUJay
Why 'Full-Lifecycle Advisory' Beats Just Coding
**Summary:** Engineering teams that focus solely on “writing Solidity” often find themselves caught off guard by shifts in protocols, the need for composable security, and the procurement hurdles that are now impacting real ROI. Our full-lifecycle advisory service bridges the gap by connecting EIP-7702 smart accounts, modular decentralized applications (DA), and ZK-based compliance solutions.
ByAUJay
Why Your Project Could Really Use a 'Protocol Economist
Summary: A lot of Web3 teams are missing a crucial player: the “protocol economist.” And you can really see the impact--value slips away through MEV routing, token incentives that are all out of whack, and those sneaky changes to wallets after Pectra that end up messing with the unit economics. In this playbook, we’ll explore what a protocol economist can do to tackle these issues head-on.

