inco-svm

Inco SVM — Confidential Computing on Solana

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "inco-svm" with this command: npx skills add sendaifun/skills/sendaifun-skills-inco-svm

Inco SVM — Confidential Computing on Solana

Inco Lightning is a confidentiality layer for Solana that enables developers to build applications where sensitive data remains encrypted even during computation. It uses Trusted Execution Environments (TEEs) to deliver verifiable confidential compute — no new chain, no new wallet required.

Note: Inco SVM is currently in beta on Solana devnet. Features are subject to change.

Overview

  • Encrypted Types — Euint128 and Ebool handles representing encrypted values stored off-chain

  • Homomorphic Operations — Arithmetic, comparison, bitwise, and control flow on encrypted data via CPI

  • Access Control — Allowance PDA system for granting per-handle decryption permissions

  • Attested Decryption — Ed25519 signature-verified decryption through TEE covalidators

  • Confidential SPL Token — Privacy-preserving token standard with encrypted balances and transfers

  • Client SDK — @inco/solana-sdk for encryption, decryption, and utility helpers

Architecture

Client Solana Program Inco Covalidator (TEE) │ │ │ ├─ encryptValue() ──────────►│ │ │ ├─ CPI: new_euint128 ─────────►│ │ │◄─── handle (u128) ──────────┤ │ ├─ CPI: e_add / e_sub / ... ──►│ │ │◄─── result handle ──────────┤ │ ├─ CPI: allow() ──────────────►│ │ │ │ ├─ decrypt([handle]) ───────────────────────────────────────►│ │◄─── plaintext + Ed25519 attestation ──────────────────────┤

Inco Lightning Program ID: 5sjEbPiqgZrYwR31ahR6Uk9wf5awoX61YGg7jExQSwaj

Quick Start

Installation

Rust Crate (on-chain):

Add to your Cargo.toml :

[dependencies] inco-lightning = { version = "0.1", features = ["cpi"] }

Add to Anchor.toml :

[programs.devnet] inco_lightning = "5sjEbPiqgZrYwR31ahR6Uk9wf5awoX61YGg7jExQSwaj"

JavaScript SDK (client-side):

npm install @inco/solana-sdk

Basic Program Setup

use anchor_lang::prelude::*; use inco_lightning::cpi::accounts::Operation; use inco_lightning::cpi::{e_add, e_sub, e_ge, e_select, new_euint128, as_euint128}; use inco_lightning::types::{Euint128, Ebool}; use inco_lightning::ID as INCO_LIGHTNING_ID;

declare_id!("YOUR_PROGRAM_ID");

#[program] pub mod my_confidential_program { use super::*;

pub fn deposit(ctx: Context<Deposit>, ciphertext: Vec<u8>) -> Result<()> {
    let cpi_ctx = CpiContext::new(
        ctx.accounts.inco_lightning_program.to_account_info(),
        Operation {
            signer: ctx.accounts.authority.to_account_info(),
        },
    );

    // Create encrypted handle from client ciphertext
    let amount: Euint128 = new_euint128(cpi_ctx.clone(), ciphertext, 0)?;

    // Add to existing balance
    let new_balance = e_add(cpi_ctx, ctx.accounts.vault.balance, amount, 0)?;
    ctx.accounts.vault.balance = new_balance;

    Ok(())
}

}

#[derive(Accounts)] pub struct Deposit<'info> { #[account(mut)] pub authority: Signer<'info>, #[account(mut)] pub vault: Account<'info, Vault>, /// CHECK: Inco Lightning program #[account(address = INCO_LIGHTNING_ID)] pub inco_lightning_program: AccountInfo<'info>, }

#[account] pub struct Vault { pub balance: Euint128, }

Basic Client Usage

import { encryptValue } from "@inco/solana-sdk/encryption"; import { decrypt } from "@inco/solana-sdk/attested-decrypt";

// Encrypt a value before sending to program const encrypted = await encryptValue(1000n);

await program.methods .deposit(Buffer.from(encrypted, "hex")) .accounts({ authority: wallet.publicKey, vault: vaultPda, incoLightningProgram: INCO_LIGHTNING_ID }) .rpc();

// Decrypt a handle (requires wallet signature) const result = await decrypt([handleString], { address: wallet.publicKey, signMessage: wallet.signMessage, }); console.log("Decrypted:", result.plaintexts[0]);

Encrypted Types & Handles

Handles are 128-bit references to encrypted values stored off-chain in the covalidator network.

Type Description Rust Definition

Euint128

Encrypted unsigned 128-bit integer pub struct Euint128(pub u128)

Ebool

Encrypted boolean pub struct Ebool(pub u128)

Store handles directly in account structs:

#[account] pub struct ConfidentialAccount { pub balance: Euint128, pub is_active: Ebool, }

Input Functions

Function Description

new_euint128(ctx, ciphertext, input_type)

Create from client-encrypted ciphertext

new_ebool(ctx, ciphertext, input_type)

Create encrypted bool from ciphertext

as_euint128(ctx, value)

Trivial encryption of plaintext u128 (for constants like zero)

as_ebool(ctx, value)

Trivial encryption of plaintext bool

Operations on Encrypted Data

All operations require a CPI context and return new handles.

let cpi_ctx = CpiContext::new( ctx.accounts.inco_lightning_program.to_account_info(), Operation { signer: ctx.accounts.authority.to_account_info() }, ); let result = e_add(cpi_ctx, a, b, 0)?;

The last parameter (scalar_byte ) is 0 for encrypted-encrypted operations, 1 when the left operand is plaintext.

Arithmetic → Euint128

e_add , e_sub , e_mul , e_rem

Comparison → Ebool

e_ge , e_gt , e_le , e_lt , e_eq

Bitwise → Euint128

e_and , e_or , e_not , e_shl , e_shr

Control Flow (Multiplexer)

// Cannot use if/else on encrypted values — use e_select instead let result = e_select(cpi_ctx, condition, if_true, if_false, 0)?;

Random Number Generation

let random_value = e_rand(cpi_ctx, 0)?;

See resources/rust-sdk-reference.md for the complete API.

Access Control

Decryption permissions are managed through Allowance PDAs derived from [handle.to_le_bytes(), allowed_address] .

use inco_lightning::cpi::accounts::Allow; use inco_lightning::cpi::allow;

let cpi_ctx = CpiContext::new( ctx.accounts.inco_lightning_program.to_account_info(), Allow { allowance_account: ctx.accounts.allowance_account.to_account_info(), signer: ctx.accounts.authority.to_account_info(), allowed_address: ctx.accounts.user.to_account_info(), system_program: ctx.accounts.system_program.to_account_info(), }, ); allow(cpi_ctx, handle.0, true, user_pubkey)?;

Important: Operations produce new handles, and allowance PDAs depend on the handle value. You must simulate the transaction first to get the result handle, derive the PDA, then submit with remaining_accounts .

See resources/access-control.md for the full simulation-then-submit pattern.

Attested Decryption

Two modes:

Mode Purpose Returns

Attested Reveal Display values in UI result.plaintexts

Attested Decrypt Verify values on-chain result.ed25519Instructions

  • program IX

import { decrypt } from "@inco/solana-sdk/attested-decrypt";

const result = await decrypt([handle], { address: wallet.publicKey, signMessage: wallet.signMessage, });

// Reveal: use plaintext directly console.log(result.plaintexts[0]);

// Decrypt: verify on-chain const tx = new Transaction(); result.ed25519Instructions.forEach(ix => tx.add(ix)); tx.add(yourProgramVerifyInstruction); await sendTransaction(tx);

On-chain verification:

use inco_lightning::cpi::is_validsignature; use inco_lightning::cpi::accounts::VerifySignature;

let cpi_ctx = CpiContext::new( ctx.accounts.inco_lightning_program.to_account_info(), VerifySignature { instructions: ctx.accounts.instructions.to_account_info(), signer: ctx.accounts.authority.to_account_info(), }, ); is_validsignature(cpi_ctx, 1, Some(handles), Some(plaintext_values))?;

Confidential SPL Token

A full privacy-preserving token implementation. See resources/confidential-spl-token.md.

Key functions: initialize_mint , create_account , mint_to , transfer , approve

// Encrypt and transfer const encrypted = await encryptValue(500_000_000n); await program.methods .transfer(Buffer.from(encrypted, "hex"), 0) .accounts({ source: srcAta, destination: destAta, authority: wallet.publicKey }) .rpc();

Best Practices

  • Always call allow() after operations that produce handles you want to decrypt later

  • Use remaining_accounts to pass allowance PDAs and grant access in the same transaction

  • Grant minimal permissions — only allow specific addresses to decrypt what they need

  • Use the multiplexer pattern (e_select ) instead of if/else on encrypted conditions

  • Trivial encryption only for constants (like zero) — use client-side encryption for sensitive values

  • Verify the intended handle in attestations to prevent handle-swap attacks

  • Simulate transactions first to get result handles before deriving allowance PDAs

Resources

  • Inco SVM Docs

  • Rust SDK Reference

  • JS SDK Reference

  • Concepts Guide

  • Confidential SPL Token

  • Private Raffle Tutorial

  • Next.js Template Repo

  • Lightning Rod Solana Repo

Skill Structure

inco/ ├── SKILL.md # This file — main reference ├── docs/ │ └── troubleshooting.md # Common issues and solutions ├── examples/ │ ├── basic-operations/ │ │ └── encrypted-operations.ts # Arithmetic, comparison, select │ ├── confidential-spl-token/ │ │ ├── mint-and-transfer.ts # Mint & transfer confidential tokens │ │ └── reveal-balance.ts # Decrypt and reveal token balance │ └── private-raffle/ │ └── raffle-client.ts # Full raffle lifecycle client ├── resources/ │ ├── rust-sdk-reference.md # Complete Rust CPI API │ ├── js-sdk-reference.md # JS SDK encryption & decryption │ ├── access-control.md # Allowance PDAs & simulation pattern │ └── confidential-spl-token.md # SPL token program reference └── templates/ └── inco-svm-setup.ts # Starter template with helpers

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

solana-kit

No summary provided by upstream source.

Repository SourceNeeds Review
General

helius

No summary provided by upstream source.

Repository SourceNeeds Review
General

meteora

No summary provided by upstream source.

Repository SourceNeeds Review
General

pumpfun

No summary provided by upstream source.

Repository SourceNeeds Review