NORTH ARCHITECTURE

Encrypt the strategy.

Institutional ZK privacy vault on Solana — nobody sees the alpha, everyone sees the rails.

Deposits and withdrawals stay visible to regulators. Internal flows stay invisible to everyone else.

Groth16 ZK ProofsElGamal EncryptionSolana-nativeCPI-ready

Privacy where it counts.
Transparency where it must.

Deposits and withdrawals are always visible. Internal vault-to-vault movements are ZK-encrypted. Sentinel draws the line on-chain between what stays public and what stays private.

Deposits and withdrawals are always visible. Regulators and auditors see every entry and exit. No grey area. No hiding the money.

Internal vault-to-vault movements are ZK-encrypted. Amounts and destinations never touch the public ledger. Your allocation strategy stays yours.

Institutions do not need total privacy. They need privacy in the right places. Sentinel draws that line directly in the program logic.

Three layers. One vault.

Fund entry triggers a visible on-chain transfer. KYC and NORTH-token gating enforced at the rail level. Regulators see it. Front-runners don't gain anything.

Vault-to-vault movements are ZK-encrypted via Groth16. Amounts, destinations, and timing stay off the ledger. Nullifier registry prevents double-spend and replay.

On-chain volatility drives strategy selection automatically. Calm market → lending (Kamino + Marginfi, 5–15% APY). Volatile market → delta-neutral via Drift.

Withdrawals surface as visible system transfers. Full audit trail for compliance. Zero alpha leaked during the hold.

Institutional-grade.Not institutional-speed.

Groth16 on BN254 verified fully on-chain. Three verification keys: commitment · transfer · withdraw. Solana solana-bn254 2.1.0 native.

92% signal

Balances encrypted with Solana ZK Token SDK 2.1.0. Nobody derives amounts from on-chain state.

88% signal

Double-Spend Protection

Nullifier registry enforced at protocol level. Replay attacks blocked by design.

86% signal

Single volatility threshold switches strategy. Max drawdown and circuit breaker guards before any allocation.

84% signal

Any Solana program can call Sentinel via CPI. Voltr vaults, custom clients — no ZK reimplementation needed.

80% signal

KYC levels and NORTH token gating at the rail level. Deposits and withdrawals always public. Internal flows always private. Designed for institutional audit requirements.

94% signal

Composable by design.Verifiable by default.

• KYC / compliance levels per rail • NORTH token gating • CPI interface (sentinel-adaptor) • Composable: any program can call deposit / withdraw / confidential_transfer • Voltr vault compatible out of the box

• Volatility threshold trigger (default: 0.15) • Calm regime → Kamino + Marginfi lending (5–15% APY) • Volatile regime → Drift delta-neutral (long spot + short perp) • Max drawdown guard • Circuit breaker before allocation

• Groth16 proof system on BN254 • 3 verification keys (commitment / transfer / withdraw) • On-chain verification via solana-bn254 2.1.0 • ElGamal encrypted balance state • Nullifier registry (double-spend + replay prevention)

Swipe to navigate

Program IDC2WJzwp5XysqRm5PQuM6ZTAeYxxhRyUWf3UJnZjVqMV5
On-chain
// Sentinel — vault entry (devnet)
let vault = get_vault_state(ctx.accounts.vault)?;
require!(vault.is_open());
require!(user.kyc_level >= rail.min_kyc);
require!(north_balance >= rail.min_north_token);

let nullifier = poseidon(transfer_id, user.secret);
require!(!registry.contains(nullifier));
registry.insert(ctx.accounts.registry, nullifier);

deposit(
  &mut ctx.accounts.vault,
  amount,
  &ctx.accounts.user_ata,
  &ctx.accounts.kyc,
)?;

// Internal move stays ZK-encrypted
confidential_transfer(&mut vault, dest_vault, amount, &proof)?;

emit!(VaultDeposit { amount, vault: ctx.accounts.vault.key() });
Request access

The vault is live.The alpha is yours.

Sentinel is deployed on Solana devnet. Request access to test institutional privacy on-chain.

  • Devnet live
  • KYC at rail
  • ZK internal flows