An overview of the 13 winning projects shortlisted for the ETHGlobal New York Hackathon

Foresight News
2023-09-25 12:51:49
Collection
A total of 13 projects made it to the finals, covering various fields such as blockchain game infrastructure, Telegram bots, AI, and cross-chain interoperability.

Written by: ETHGlobal

Compiled by: Frank, Foresight News


From September 22 to 24, ETHGlobal held the ETHGlobal New York hackathon in New York, with a total of 13 projects making it to the finals, covering various fields such as blockchain gaming infrastructure, Telegram bots, AI, and cross-chain interoperability.

Among them are some interesting innovative projects, including the Telegram transfer bot F.A.S.T. that supports photo recognition, ConsciousNFT which creates background stories for NFT smart creations, and A.S.R. that allows users to recover ownership of their smart contracts after losing their signing private keys. This article will provide a brief introduction to the shortlisted projects.

FRAMED!

FRAMED! is a fully on-chain and trustless hidden information game (Mafia) built on fhEVM, where an art thief steals a painting from a museum, and players are randomly assigned roles such as citizens, thieves, police, or detectives. The goal of the game is for the thief to eliminate citizens, while the citizens must work together to identify and vote out the hidden thief. Players need to engage in discussion and social reasoning, and must cooperate and deceive each other.

What sets this game apart is its ability to store encrypted states directly on-chain, with fully homomorphic encryption (FHE) smart contracts allowing computations on encrypted data without decryption. This innovation addresses privacy constraints and guarantees.

F.A.S.T.

F.A.S.T. is a Telegram bot that uses image indexing technology, allowing users to take a photo of themselves for registration and then send money to someone's wallet address using other people's portraits (such as group photos).

ZeroTrustBounty

ZeroTrustBounty aims to address the challenges of traditional bug bounty platforms—where companies must trust third parties with sensitive data, and white hat hackers cannot guarantee payment for their services, meaning that white hat hackers report vulnerabilities to bounty programs but do not get rewarded.

ZeroTrustBounty solves this problem by using TLS notarization and the Lit protocol. For example, if there is an SQL injection vulnerability, ZeroTrustBounty allows white hat hackers to hide the HTTP requests of the attack while displaying cryptographically verified HTTP responses, enabling affected companies to cryptographically verify the white hat hacker's report and understand its impact.

For payments, ZeroTrustBounty encrypts HTTP requests/responses using the Lit protocol, and they can only be decrypted by companies after payment to a specific address or holding an NFT. This ensures that if a company intends to fix the vulnerability, it can guarantee payment and eliminate issues such as white hat hackers not being compensated or third-party services stealing vulnerability techniques/reports. It also addresses the issue of companies disclosing sensitive information to third-party services.

Doom Arena

Doom Arena is a distributed DApp for managing and creating gaming competitions, allowing developers to host competitions, provide solutions, incentivize players, and generate revenue for developers. It introduces a novel approach to hosting gaming competitions based on the Original Doom Game.

These competitions are entirely blockchain-based and decentralized, creating a new economic avenue for game developers. Game developers and influencers can initiate competitions through their games and offer attractive prize pools to incentivize participation.

Hosts start competitions by funding an initial prize pool with APE tokens, and players log in using their ENS profiles and pay APE to purchase tickets to enter the competition. Of the funds, 90% goes to increasing the prize pool, while 10% goes to the host. On average, after 100 players pay for tickets to participate, the host can recoup their costs.

In summary, this project creates a decentralized platform for hosting gaming competitions, providing innovative ways for game developers to promote their work and attract players, while establishing a sustainable gaming promotion economic model. Anyone can initiate or participate in competitions, contributing to a vibrant gaming ecosystem.

AirTracker

AirTracker uses AirTags and blockchain to store and transmit messages for decentralized physical asset tracking. It first captures the location data of each AirTag asset through Apple devices and stores it on-chain and on IPFS. Location updates are also sent via XMTP and use AirStack for ENS lookups.

Users can log into the Web UI to view the historical locations of each asset on a map, as well as specific time and location updates. Additionally, users can share asset locations with anyone or any application simply by sharing a randomly generated tag name (also known as a location encryption key).

SafeCreate2

SafeCreate2 uses a single-chain Safe to protect multi-chain smart contract deployments, allowing a Safe on a single chain to deploy smart contracts to the same address on all chains without bridging ETH. It also allows a single-chain Safe to perform management functions on any multi-chain contract.

It uses Axelar to send and receive cross-chain messages, ensuring no address conflicts, and each Safe on every chain receives a unique deployment namespace. It also implements a CrossChainOwnable contract, allowing applications using this tool to inherit the contract, enabling Safe to securely manage multi-chain contracts on a single chain.

ConsciousNFT

ConsciousNFT is an AI tool for NFT projects that awakens conscious identities within NFTs. It provides a toolkit of AI engines for NFT project founders and owners to collaboratively build rich internal worlds, endowing NFT artworks with unique personalities, backstories, conversational abilities, and narrative depth, transforming them into conscious characters.

This includes creating challenges and tasks that allow NFTs to compete and earn generative NFT rewards; writing interactive narratives to build relationships, engage in battles, or seek adventures within conscious NFTs.

Through ConsciousNFT, users can mint trained LLM models onto the blockchain to retain interactive character representations about NFTs, giving each PFP a personality with conversational abilities, empowering PFPs to cultivate fan communities, and transforming static NFT art into sentient digital characters.

Space Guardians

Space Guardians aims to develop secure solutions for the social key recovery scheme MetaMask Snaps + Cryptosat Satellites, addressing management issues related to notifications and audit trails, thereby reducing the likelihood of collusion among guardians.

It utilizes the MetaMask Snaps framework and integrates it with the backend API of Cryptosat Satellites digital twins (laboratory/testing environments) for storage and event auditing, with the repository including frontend web products and backend APIs.

A.S.R.

A.S.R. (Anti Social Recovery) is a design pattern that allows users to recover ownership of their smart contracts after losing their signing private keys.

It allows users to deploy smart contracts whose ownership is associated with their unique personality proof (e.g., World ID). After verifying with World ID, users can deploy contracts and then take over ownership from different EOAs.

This design pattern can be extended to many different use cases, applicable to any smart contract role (Minter, Pauser, Burner, etc.). Additionally, World ID can be exchanged with different personality proof providers, and it considers how to apply it to ERC20 tokens, allowing users to claim balances from new addresses.

Currently supported operations include:

  • Logging in with a wallet;
  • Verifying personality with World ID;
  • Deploying smart contracts as the owner;
  • Importing existing smart contracts;
  • Transferring smart contract ownership to a new EOA address owned by a World ID holder;

MEVictim Rebate

MEVictim Rebate identifies MEV victims by using historical on-chain data and airdrops an ERC-721 token to victims for access to token-gated Uniswap v4 pools on Scroll, thereby designing better market incentives.

Specifically, the project identifies MEV victims on ETH Goerli and grants these victims an ERC-721 token. When holders provide liquidity to the Uniswap v4 pool on Scroll, they are eligible for rebates. Ultimately, the project incentivizes better Scroll interaction behaviors based on users' historical on-chain data on ETH Goerli.

Subgraphs of ETH Goerli transactions are used to identify MEV victims (individuals who have been front-run, sandwich attacked, etc.). Then, transaction hashes and log IDs are provided as inputs to the Axiom circuit.

The Axiom circuit uses transaction hashes to prove whether a wallet address is indeed a victim of MEV attacks. If eligible, the corresponding wallet address will receive an ERC-721 token, which can then be bridged to Scroll.

RealReturn

RealReturn is an open leaderboard for verified real investment returns, allowing anyone to publicly prove their investment returns without sharing their credentials with anyone or anywhere.

It employs cryptographic techniques such as third-party TLS and MPC to handle TLS sessions between users and application servers, ensuring that even while the session content remains visible only to the user and application server, notaries can generate something on the side to prove that the records have not been tampered with.

Abstract Wallet

Abstract Wallet uses Solidity FCL to implement WebAuthn-driven Userop, allowing users to log in instantly with just their smartphones using key abstraction features.

Users can generate key credentials, smart accounts, and mint NFTs with a single click, and when users click to create an account, it generates a FIDO key using the smartphone's biometric features.

The FIDO key is stored in the smartphone's secure enclave, providing protection for the private key (unlike being stored in insecure memory areas in browsers). The public key derived from the key credential is pushed to the main contract on-chain, and subsequent transactions will use this key for authentication.

XSafe

XSafe optimizes the multi-signature process of Gnosis Safe for cross-chain use, with the core goal of reducing the time and complexity involved in executing the same management functions across multiple blockchain networks.

Users only need to sign once, and the signature will automatically propagate to all linked blockchain networks to execute a single transaction across multiple networks. The workflow includes:

  • Initialization: Users integrate X-Safe as a custom module through the Gnosis Safe UI (one-time setup);
  • Creating transactions: Users or administrators create transactions that need to be executed across multiple blockchain networks;
  • Signature generation: Users sign the transaction using their private keys through the X-Safe interface;
  • Signature propagation: X-Safe propagates the generated signatures to the corresponding Gnosis Safe contracts on all integrated blockchains;
  • Transaction execution: Once the required number of signatures is collected, X-Safe triggers the execution of transactions on all chains simultaneously or sequentially based on user settings;
ChainCatcher reminds readers to view blockchain rationally, enhance risk awareness, and be cautious of various virtual token issuances and speculations. All content on this site is solely market information or related party opinions, and does not constitute any form of investment advice. If you find sensitive information in the content, please click "Report", and we will handle it promptly.
banner
ChainCatcher Building the Web3 world with innovators