kalidao / kali-legalLinks
☆15Updated 2 years ago
Alternatives and similar repositories for kali-legal
Users that are interested in kali-legal are comparing it to the libraries listed below
Sorting:
- Social Recovery Wallet that hides the identities of Guardians until recovery.☆48Updated 3 years ago
- A one-page simple agreement for future tokens. Learn the definitions in the glossary, learn the terms in the annex, and let's all work to…☆16Updated 11 months ago
- ☆34Updated 3 years ago
- My journey learning zero knowledge proof technologies in public! Feedback, help and contributions very much welcome☆65Updated 4 years ago
- Jupyter kernel for Cairo smart contract language☆32Updated 3 years ago
- ☆54Updated 3 years ago
- Templating for meta vaults☆23Updated 4 years ago
- KaliDAO core contracts☆59Updated 2 years ago
- World ID Example. Create an airdrop of ERC-20 tokens that can only be claimed once by a single human. Completely privacy preserving.☆26Updated 4 months ago
- Maximizing liquidity utilization while maintaining 50/50 inventory ratio☆27Updated 3 years ago
- General Token Incentives Infrastructure☆69Updated 2 years ago
- simple lockfile for your dapp's addresses and artifacts☆51Updated 3 years ago
- Mirror your Optimism NFTs on Ethereum☆31Updated 3 years ago
- ☆40Updated 5 years ago
- A flashloan module for Gnosis Safe.☆45Updated 4 years ago
- A trustless wallet scoring protocol☆22Updated last year
- ☆22Updated last year
- Bitcoin Mirror is a bitcoin light client that runs on ethereum.☆69Updated 3 years ago
- Full stack MERN app for the DAO Drops Project☆16Updated 2 months ago
- The Learning Curve smart contracts☆31Updated 2 years ago
- Cross chain governance libraries for rollups☆76Updated 3 years ago
- Mechanism for purchasing and redeeming fee tickets.☆27Updated 2 years ago
- A Maple flavored proxy factory☆12Updated last year
- A transaction guard that allows the owner to limit the multisig signers to calling specific function signatures on specific contracts.☆43Updated last year
- Extension for zk succinct non-interactive ownership proofs.☆40Updated 3 years ago
- Prevent frontrunning and malicious MEV on Ethereum by using a threshold cryptography-based distributed key generation (DKG) protocol.☆68Updated 8 months ago
- Notes from the ERC-4337 bundler working group☆20Updated 3 years ago
- Code I wrote for my Master's thesis☆19Updated 3 years ago
- LeXpunK Legal Defense Protocol for DAOs/Multisigs☆51Updated 3 years ago
- ☆81Updated 4 years ago