inco-svm
Inco SVM — Confidential Computing on Solana
Inco Lightning is a confidentiality layer for Solana that enables developers to build applications where sensitive data remains encrypted even during computation. It uses Trusted Execution Environments (TEEs) to deliver verifiable confidential compute — no new chain, no new wallet required.
Note: Inco SVM is currently in beta on Solana devnet. Features are subject to change.
Overview
- Encrypted Types —
Euint128andEboolhandles representing encrypted values stored off-chain - Homomorphic Operations — Arithmetic, comparison, bitwise, and control flow on encrypted data via CPI
- Access Control — Allowance PDA system for granting per-handle decryption permissions
- Attested Decryption — Ed25519 signature-verified decryption through TEE covalidators
- Confidential SPL Token — Privacy-preserving token standard with encrypted balances and transfers
- Client SDK —
@inco/solana-sdkfor encryption, decryption, and utility helpers
Architecture
Client Solana Program Inco Covalidator (TEE)
│ │ │
├─ encryptValue() ──────────►│ │
│ ├─ CPI: new_euint128 ─────────►│
│ │◄─── handle (u128) ──────────┤
│ ├─ CPI: e_add / e_sub / ... ──►│
│ │◄─── result handle ──────────┤
│ ├─ CPI: allow() ──────────────►│
│ │ │
├─ decrypt([handle]) ───────────────────────────────────────►│
│◄─── plaintext + Ed25519 attestation ──────────────────────┤
Inco Lightning Program ID: 5sjEbPiqgZrYwR31ahR6Uk9wf5awoX61YGg7jExQSwaj
Quick Start
Installation
Rust Crate (on-chain):
Add to your Cargo.toml:
[dependencies]
inco-lightning = { version = "0.1", features = ["cpi"] }
Add to Anchor.toml:
[programs.devnet]
inco_lightning = "5sjEbPiqgZrYwR31ahR6Uk9wf5awoX61YGg7jExQSwaj"
JavaScript SDK (client-side):
npm install @inco/solana-sdk
Basic Program Setup
use anchor_lang::prelude::*;
use inco_lightning::cpi::accounts::Operation;
use inco_lightning::cpi::{e_add, e_sub, e_ge, e_select, new_euint128, as_euint128};
use inco_lightning::types::{Euint128, Ebool};
use inco_lightning::ID as INCO_LIGHTNING_ID;
declare_id!("YOUR_PROGRAM_ID");
#[program]
pub mod my_confidential_program {
use super::*;
pub fn deposit(ctx: Context<Deposit>, ciphertext: Vec<u8>) -> Result<()> {
let cpi_ctx = CpiContext::new(
ctx.accounts.inco_lightning_program.to_account_info(),
Operation {
signer: ctx.accounts.authority.to_account_info(),
},
);
// Create encrypted handle from client ciphertext
let amount: Euint128 = new_euint128(cpi_ctx.clone(), ciphertext, 0)?;
// Add to existing balance
let new_balance = e_add(cpi_ctx, ctx.accounts.vault.balance, amount, 0)?;
ctx.accounts.vault.balance = new_balance;
Ok(())
}
}
#[derive(Accounts)]
pub struct Deposit<'info> {
#[account(mut)]
pub authority: Signer<'info>,
#[account(mut)]
pub vault: Account<'info, Vault>,
/// CHECK: Inco Lightning program
#[account(address = INCO_LIGHTNING_ID)]
pub inco_lightning_program: AccountInfo<'info>,
}
#[account]
pub struct Vault {
pub balance: Euint128,
}
Basic Client Usage
import { encryptValue } from "@inco/solana-sdk/encryption";
import { decrypt } from "@inco/solana-sdk/attested-decrypt";
// Encrypt a value before sending to program
const encrypted = await encryptValue(1000n);
await program.methods
.deposit(Buffer.from(encrypted, "hex"))
.accounts({ authority: wallet.publicKey, vault: vaultPda, incoLightningProgram: INCO_LIGHTNING_ID })
.rpc();
// Decrypt a handle (requires wallet signature)
const result = await decrypt([handleString], {
address: wallet.publicKey,
signMessage: wallet.signMessage,
});
console.log("Decrypted:", result.plaintexts[0]);
Encrypted Types & Handles
Handles are 128-bit references to encrypted values stored off-chain in the covalidator network.
| Type | Description | Rust Definition |
|---|---|---|
Euint128 |
Encrypted unsigned 128-bit integer | pub struct Euint128(pub u128) |
Ebool |
Encrypted boolean | pub struct Ebool(pub u128) |
Store handles directly in account structs:
#[account]
pub struct ConfidentialAccount {
pub balance: Euint128,
pub is_active: Ebool,
}
Input Functions
| Function | Description |
|---|---|
new_euint128(ctx, ciphertext, input_type) |
Create from client-encrypted ciphertext |
new_ebool(ctx, ciphertext, input_type) |
Create encrypted bool from ciphertext |
as_euint128(ctx, value) |
Trivial encryption of plaintext u128 (for constants like zero) |
as_ebool(ctx, value) |
Trivial encryption of plaintext bool |
Operations on Encrypted Data
All operations require a CPI context and return new handles.
let cpi_ctx = CpiContext::new(
ctx.accounts.inco_lightning_program.to_account_info(),
Operation { signer: ctx.accounts.authority.to_account_info() },
);
let result = e_add(cpi_ctx, a, b, 0)?;
The last parameter (scalar_byte) is 0 for encrypted-encrypted operations, 1 when the left operand is plaintext.
Arithmetic → Euint128
e_add, e_sub, e_mul, e_rem
Comparison → Ebool
e_ge, e_gt, e_le, e_lt, e_eq
Bitwise → Euint128
e_and, e_or, e_not, e_shl, e_shr
Control Flow (Multiplexer)
// Cannot use if/else on encrypted values — use e_select instead
let result = e_select(cpi_ctx, condition, if_true, if_false, 0)?;
Random Number Generation
let random_value = e_rand(cpi_ctx, 0)?;
See resources/rust-sdk-reference.md for the complete API.
Access Control
Decryption permissions are managed through Allowance PDAs derived from [handle.to_le_bytes(), allowed_address].
use inco_lightning::cpi::accounts::Allow;
use inco_lightning::cpi::allow;
let cpi_ctx = CpiContext::new(
ctx.accounts.inco_lightning_program.to_account_info(),
Allow {
allowance_account: ctx.accounts.allowance_account.to_account_info(),
signer: ctx.accounts.authority.to_account_info(),
allowed_address: ctx.accounts.user.to_account_info(),
system_program: ctx.accounts.system_program.to_account_info(),
},
);
allow(cpi_ctx, handle.0, true, user_pubkey)?;
Important: Operations produce new handles, and allowance PDAs depend on the handle value. You must simulate the transaction first to get the result handle, derive the PDA, then submit with remaining_accounts.
See resources/access-control.md for the full simulation-then-submit pattern.
Attested Decryption
Two modes:
| Mode | Purpose | Returns |
|---|---|---|
| Attested Reveal | Display values in UI | result.plaintexts |
| Attested Decrypt | Verify values on-chain | result.ed25519Instructions + program IX |
import { decrypt } from "@inco/solana-sdk/attested-decrypt";
const result = await decrypt([handle], {
address: wallet.publicKey,
signMessage: wallet.signMessage,
});
// Reveal: use plaintext directly
console.log(result.plaintexts[0]);
// Decrypt: verify on-chain
const tx = new Transaction();
result.ed25519Instructions.forEach(ix => tx.add(ix));
tx.add(yourProgramVerifyInstruction);
await sendTransaction(tx);
On-chain verification:
use inco_lightning::cpi::is_validsignature;
use inco_lightning::cpi::accounts::VerifySignature;
let cpi_ctx = CpiContext::new(
ctx.accounts.inco_lightning_program.to_account_info(),
VerifySignature {
instructions: ctx.accounts.instructions.to_account_info(),
signer: ctx.accounts.authority.to_account_info(),
},
);
is_validsignature(cpi_ctx, 1, Some(handles), Some(plaintext_values))?;
Confidential SPL Token
A full privacy-preserving token implementation. See resources/confidential-spl-token.md.
Key functions: initialize_mint, create_account, mint_to, transfer, approve
// Encrypt and transfer
const encrypted = await encryptValue(500_000_000n);
await program.methods
.transfer(Buffer.from(encrypted, "hex"), 0)
.accounts({ source: srcAta, destination: destAta, authority: wallet.publicKey })
.rpc();
Best Practices
- Always call
allow()after operations that produce handles you want to decrypt later - Use
remaining_accountsto pass allowance PDAs and grant access in the same transaction - Grant minimal permissions — only allow specific addresses to decrypt what they need
- Use the multiplexer pattern (
e_select) instead of if/else on encrypted conditions - Trivial encryption only for constants (like zero) — use client-side encryption for sensitive values
- Verify the intended handle in attestations to prevent handle-swap attacks
- Simulate transactions first to get result handles before deriving allowance PDAs
Resources
- Inco SVM Docs
- Rust SDK Reference
- JS SDK Reference
- Concepts Guide
- Confidential SPL Token
- Private Raffle Tutorial
- Next.js Template Repo
- Lightning Rod Solana Repo
Skill Structure
inco/
├── SKILL.md # This file — main reference
├── docs/
│ └── troubleshooting.md # Common issues and solutions
├── examples/
│ ├── basic-operations/
│ │ └── encrypted-operations.ts # Arithmetic, comparison, select
│ ├── confidential-spl-token/
│ │ ├── mint-and-transfer.ts # Mint & transfer confidential tokens
│ │ └── reveal-balance.ts # Decrypt and reveal token balance
│ └── private-raffle/
│ └── raffle-client.ts # Full raffle lifecycle client
├── resources/
│ ├── rust-sdk-reference.md # Complete Rust CPI API
│ ├── js-sdk-reference.md # JS SDK encryption & decryption
│ ├── access-control.md # Allowance PDAs & simulation pattern
│ └── confidential-spl-token.md # SPL token program reference
└── templates/
└── inco-svm-setup.ts # Starter template with helpers
More from sendaifun/skills
helius
Build Solana applications with Helius infrastructure. Covers transaction sending (Sender), asset/NFT queries (DAS API), real-time streaming (WebSockets, Laserstream), event pipelines (webhooks), priority fees, wallet analysis, and agent onboarding.
214solana-kit
Complete guide for @solana/kit - the modern, tree-shakeable, zero-dependency JavaScript SDK from Anza. Covers RPC connections, signers, transaction building with pipe, signing, sending, and account fetching with full TypeScript support.
200pumpfun
Complete PumpFun Protocol guide for building token launches, bonding curves, and AMM integrations on Solana. Covers Pump Program (token creation, buy/sell on bonding curves), PumpSwap AMM (liquidity pools, swaps), fee structures, creator fees, and SDK integration.
164meteora
Complete Meteora DeFi SDK suite for building liquidity pools, AMMs, bonding curves, vaults, token launches, and zap operations on Solana. Use when integrating DLMM, DAMM v2, DAMM v1, Dynamic Bonding Curves, Alpha Vaults, Zap, or Stake-for-Fee functionality.
163vulnhunter
Security vulnerability detection and variant analysis skill. Use when hunting for dangerous APIs, footgun patterns, error-prone configurations, and vulnerability variants across codebases. Combines sharp edges detection with variant hunting methodology.
144raydium
Complete Raydium Protocol SDK - the single source of truth for integrating Raydium on Solana. Covers SDK, Trade API, CLMM, CPMM, AMM pools, LaunchLab token launches, farming, CPI integration, and all Raydium tools.
143