Groth16 on BN254 verified fully on-chain. Three verification keys: commitment · transfer · withdraw. Solana solana-bn254 2.1.0 native.
Encrypt the strategy.
Institutional ZK privacy vault on Solana — nobody sees the alpha, everyone sees the rails.
Deposits and withdrawals stay visible to regulators. Internal flows stay invisible to everyone else.
Privacy where it counts.
Transparency where it must.
Deposits and withdrawals are always visible. Internal vault-to-vault movements are ZK-encrypted. Sentinel draws the line on-chain between what stays public and what stays private.
Deposits and withdrawals are always visible. Regulators and auditors see every entry and exit. No grey area. No hiding the money.
Internal vault-to-vault movements are ZK-encrypted. Amounts and destinations never touch the public ledger. Your allocation strategy stays yours.
Institutions do not need total privacy. They need privacy in the right places. Sentinel draws that line directly in the program logic.
Three layers. One vault.
Fund entry triggers a visible on-chain transfer. KYC and NORTH-token gating enforced at the rail level. Regulators see it. Front-runners don't gain anything.
Vault-to-vault movements are ZK-encrypted via Groth16. Amounts, destinations, and timing stay off the ledger. Nullifier registry prevents double-spend and replay.
On-chain volatility drives strategy selection automatically. Calm market → lending (Kamino + Marginfi, 5–15% APY). Volatile market → delta-neutral via Drift.
Withdrawals surface as visible system transfers. Full audit trail for compliance. Zero alpha leaked during the hold.
Institutional-grade.Not institutional-speed.
Balances encrypted with Solana ZK Token SDK 2.1.0. Nobody derives amounts from on-chain state.
Double-Spend Protection
Nullifier registry enforced at protocol level. Replay attacks blocked by design.
Single volatility threshold switches strategy. Max drawdown and circuit breaker guards before any allocation.
Any Solana program can call Sentinel via CPI. Voltr vaults, custom clients — no ZK reimplementation needed.
KYC levels and NORTH token gating at the rail level. Deposits and withdrawals always public. Internal flows always private. Designed for institutional audit requirements.
Composable by design.Verifiable by default.
• KYC / compliance levels per rail • NORTH token gating • CPI interface (sentinel-adaptor) • Composable: any program can call deposit / withdraw / confidential_transfer • Voltr vault compatible out of the box
• Volatility threshold trigger (default: 0.15) • Calm regime → Kamino + Marginfi lending (5–15% APY) • Volatile regime → Drift delta-neutral (long spot + short perp) • Max drawdown guard • Circuit breaker before allocation
• Groth16 proof system on BN254 • 3 verification keys (commitment / transfer / withdraw) • On-chain verification via solana-bn254 2.1.0 • ElGamal encrypted balance state • Nullifier registry (double-spend + replay prevention)
Swipe to navigate
C2WJzwp5XysqRm5PQuM6ZTAeYxxhRyUWf3UJnZjVqMV5// Sentinel — vault entry (devnet)
let vault = get_vault_state(ctx.accounts.vault)?;
require!(vault.is_open());
require!(user.kyc_level >= rail.min_kyc);
require!(north_balance >= rail.min_north_token);
let nullifier = poseidon(transfer_id, user.secret);
require!(!registry.contains(nullifier));
registry.insert(ctx.accounts.registry, nullifier);
deposit(
&mut ctx.accounts.vault,
amount,
&ctx.accounts.user_ata,
&ctx.accounts.kyc,
)?;
// Internal move stays ZK-encrypted
confidential_transfer(&mut vault, dest_vault, amount, &proof)?;
emit!(VaultDeposit { amount, vault: ctx.accounts.vault.key() });The vault is live.The alpha is yours.
Sentinel is deployed on Solana devnet. Request access to test institutional privacy on-chain.
- Devnet live
- KYC at rail
- ZK internal flows
