Aegis
11 posts

Aegis
@aegis_ledger
Private payroll & treasury disbursements for DAOs on Solana. Shielded UTXO pool. Client-side ZK. Selective audit via viewing keys. Building on @cloak_ag









Introducing tendr.bid - sealed-bid RFP procurement on @solana. Live on devnet today. Building @tendrdotbid as part of @colosseum frontier hackathon. The problem - The RFP space is wildly fragmented. Every DAO, foundation, marketplace, and team posts requests for work somewhere different - Notion, Airtable, Discord, tweets, email threads. Freelancers and agencies burn hours chasing leads across fifty channels with no shared discovery, no standard format, no on-chain trail. When deals do happen, they ride on trust: legacy platforms (Upwork, Fiverr) take 10-20% and lock providers into walled-garden reputation. Off-platform handshakes have no recourse. The Solution - @tendrdotbid fixes that. Buyers post RFPs once. Providers commit cryptographically-private bids that even the buyer can't read until the bidding window closes - no bid-tipping, no shilled bids, no front-running between providers. USDC escrow releases per milestone. Portable on-chain reputation that travels with the wallet, not the platform. 2.5% platform fee - not 20%. Same primitive for a DAO commissioning an audit, a foundation funding a grant round, a freelancer pitching a six-month engagement, or an agency bidding on enterprise work. Two primitives doing two jobs neither can do for the other. @magicblock seals the bid CONTENTS at the account-data layer; @cloak_ag seals the bid SIGNER at the transaction-history layer. WHAT a bid contains - @magicblock Private Ephemeral Rollups. Each bid envelope (encrypted to both the buyer's per-RFP pubkey AND the provider's) is chunked onto a delegated BidCommit account whose reads are gated by a permission account inside a TEE-backed validator. Even the buyer can't decrypt until the on-chain `open_reveal_window` instruction flips the permission gate and that instruction reverts if `now < bid_close_at`. Without a TEE-gated rollup, encrypted account data is still readable by any RPC node serving the chain. PER is the only Solana primitive that turns "sealed even from the buyer" from a trust assumption into a cryptographic guarantee. Losers' envelopes stay sealed on PER forever. PER hides the bid CONTENTS, but every Solana transaction puts the signer's pubkey in plaintext on the base-layer chain. Without a second primitive, Solscan would still show the provider's main wallet in the bid-tx history - destroying bidder's anonymity even though the contents are sealed. So in private-bidder mode the bid is signed by a per-RFP ephemeral wallet (deterministically derived from the main wallet, recoverable on any device with no key backup), funded through @cloak_ag's shielded pool. The ZK proof breaks the on-chain link between the provider's main wallet (depositor) and the ephemeral (recipient). On chain the bidder appears as a fresh wallet with no provable link to the main one. Winners surface at award via an Ed25519 binding signature; losers stay anonymous forever. Beyond the privacy stack: full milestone escrow with three cancel paths and a structured dispute flow that pushes both sides to settle. Permissionless escape hatches so no party can hold the other hostage past a deadline. An operational workbench that surfaces the next concrete action per project. The whole mechanism is documented in-app at tendr.bid/docs. The mental model: don't pick "the privacy chain." Compose two narrow primitives where each does one thing well. @magicblock's PER for the data plane. @cloak_ag's shielded UTXO pools for the identity plane. Genuinely huge thanks to the @magicblock and @cloak_ag teams. Both shipped real working primitives instead of marketing pages. tendr.bid does not exist without your work. Thanks to @superteam @SuperteamEarn @SuperteamIN for the grant for Agentic Engineering and all the support to Solana Ecosystem. Live on devnet: tendr.bid · github.com/0xharp/tender Please do share your feedback below 👇 or in DMs ✉️. More enhancements coming soon 🔜!! Built by @0xharp #solana #frontier #colosseum #hackathon #tendr


