Security & Privacy
Security
Minimal trust requirement
By using ERC-4337 standard, user operations within an MTX are authenticated by and executed in the ERC-4337 entry point contract. Other operations, such as dApp and solver operations, which are executed before and after user operations, are isolated from user operation execution. This reduces the need to trust Semantic Layer nodes and solvers, as isolated execution prevents them from performing unauthorized operations on behalf of the user.
Privacy
To ensure integrity and fairness in MTX submission and processing, certain information must remain confidential until the MTX is fully settled, preventing unauthorized execution of user operations or replication of solver strategies.
To address these privacy requirements, MTXs are encrypted. Given the relatively small data size of MTXs, asymmetric encryption is preferred for its simplicity over hybrid encryption. MTX are encrypted using a designated public key rather than being transmitted in clear text. Additionally, the MTX precompile offers helper functions to simplify the encryption and decryption process.