Documentation
Build with the quiet agent.
Everything you need to integrate SHADE — from the conceptual model to the wire-level details of each privacy primitive.
Quick links
Start here.
Quickstart
Hold $SHADE, generate a Semaphore proof in your browser, subscribe to your XMTP inbox. Five minutes to your first signal.
Architecture
The three-layer stack — ingestion and scoring, privacy primitives, delivery and action — and how they compose.
Privacy primitives
Semaphore, XMTP, Phala TEE, and Railgun. Cryptographic assumptions, threat model, and what is in and out of scope.
Builder API
Authenticated WebSocket stream of scored launches, with rate limits enforced via per-credential token buckets.
Whitepaper
SHADE: A Privacy-Preserving AI Agent for Token Discovery on Base
The full technical paper — adversarial model, formal privacy properties, scoring methodology, anonymity-set analysis, and tokenomics. Written in the spirit of the Bitcoin paper: short, precise, and verifiable under stated cryptographic assumptions.
Primitive reference
- Semaphore
- BN254 · Groth16 · Poseidon · WebAssembly proofs
- XMTP
- X3DH key agreement · Double Ratchet · AES-256-GCM
- Phala TEE
- Intel SGX · AMD SEV-SNP · Remote attestation
- Railgun
- Shielded UTXO · zk-SNARK balance proofs · Base settlement