informalsystems / gmLinks
Tool to manage local gaiad instances - without docker
☆13Updated 8 months ago
Alternatives and similar repositories for gm
Users that are interested in gm are comparing it to the libraries listed below
Sorting:
- Drop-in replacement for CometBFT in end-to-end tests☆23Updated last year
- An example ABCI application making use of tendermint-rs and ibc-rs☆58Updated last year
- Implementation of Sunny's Mesh Security talk (Hackathon / Prototype status)☆88Updated 2 years ago
- ☆20Updated 3 years ago
- Building generic merkle proof format for IBC☆128Updated 6 months ago
- Painless multisig for many keys across many cosmos-sdk chains☆36Updated 2 weeks ago
- A standard for tokenized vaults written in CosmWasm☆16Updated 9 months ago
- ☆23Updated 6 months ago
- Secure SGX Sidecar for CosmWasm☆59Updated 2 months ago
- Database wrapper for CometBFT☆32Updated 2 weeks ago
- Tower-based ABCI interface.☆78Updated last year
- Celestia Specifications☆49Updated 3 years ago
- Advanced fuzzing via Model Based Testing for Cosmos blockchains☆84Updated 2 years ago
- This repository implements IBC solo machine which can be used to interface with other machines and replicated ledgers which speak IBC.☆43Updated 7 months ago
- An all-in-one IBC protocol providing fungible token transfer, interchain account, and async query functionalities☆41Updated 2 years ago
- This repository is for explaining objectives and technical description of how B-Harvest will implement zk-rollup module for Cosmos-SDK☆24Updated 5 years ago
- A cosmos network key-signer buildable in WASM☆29Updated 2 years ago
- This is a solidity implementation of IBC v2.☆95Updated this week
- ☆23Updated 2 years ago
- Testing infrastructure for the Celestia Network☆25Updated 3 weeks ago
- Eth2 light client implementation as a cosmwasm smart contract☆11Updated 2 years ago
- The Foundation for Compliant Self-sovereign Wallets☆41Updated last year
- A trust-minimized cross-chain execution environment.☆15Updated 4 months ago
- ☆40Updated last year
- An example re-entrancy attack on a flashloan vault.☆15Updated 3 years ago
- ICA☆81Updated 2 years ago
- An implementation of a DKG protocol for front-running protection on Anoma.☆84Updated 2 years ago
- Formalization of Typhon protocol☆30Updated last year
- A general purpose oracle leveraging ABCI++☆95Updated 10 months ago
- Namespaced Merkle Tree☆122Updated 2 months ago