Skip to content

Conversation

@muscariello
Copy link
Member

@muscariello muscariello commented Sep 11, 2025

  • Migrated Hardhat config and modules to ESM for Hardhat 3.x compatibility
  • Removed incompatible plugins and dependencies
  • Automated Go binding generation using abigen and jq
  • Updated Taskfile and scripts for modern build pipeline
  • All changes tested and committed

This is a draft PR for review and further integration.
Experiment with ERC-8004: Trustless Agents

closes #388 when merged

@github-actions
Copy link
Contributor

github-actions bot commented Sep 11, 2025

The latest Buf updates on your PR. Results from workflow Buf CI / buf (pull_request).

BuildFormatLintBreakingUpdated (UTC)
✅ passed⏩ skipped⏩ skipped✅ passedSep 12, 2025, 8:48 AM

@codecov
Copy link

codecov bot commented Sep 11, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.

📢 Thoughts on this report? Let us know!

@msardara msardara marked this pull request as ready for review September 11, 2025 18:24
@msardara msardara requested a review from a team as a code owner September 11, 2025 18:24
@muscariello muscariello marked this pull request as draft September 11, 2025 18:33
@muscariello
Copy link
Member Author

@ramizpolic I ported our previous work from Nov 2024 to provide community an insight about a trustless trust schema.

@muscariello muscariello changed the title fix: ESM Hardhat 3.x, abigen Go bindings, and build pipeline modernization Trustless Agents: ESM Hardhat 3.x, abigen Go bindings, and build pipeline modernization Sep 12, 2025
@github-actions
Copy link
Contributor

github-actions bot commented Sep 12, 2025

Hey there and thank you for opening this pull request! 👋🏼

We require pull request titles to follow the Conventional Commits specification and it looks like your proposed title needs to be adjusted.

Details:

No release type found in pull request title "Trustless Agents: ESM Hardhat 3.x, abigen Go bindings, and build pipeline modernization". Add a prefix to indicate what kind of release this pull request corresponds to. For reference, see https://www.conventionalcommits.org/

Available types:
 - BREAKING
 - build
 - chore
 - ci
 - docs
 - feat
 - fix
 - perf
 - refactor
 - revert
 - style
 - test
 - release

@ramizpolic
Copy link
Member

ramizpolic commented Sep 12, 2025

I was thinking about this for a bit. If we leverage the OCIs referrer API, we could also attach the signature confirmation from the chain to a given record. This would allow records to be signed by a native sigstore signature, and also optionally with a chain-based signing.

@muscariello
Copy link
Member Author

muscariello commented Sep 12, 2025

The LGPL2 (ethereum) + Apache 2 mix does not work so we may have to create separate command line tools to make this work together. To be discussed.

@github-actions
Copy link
Contributor

[api] total: (statements) 3.5%
[client] total: (statements) 0.0%
[server] total: (statements) 28.8%
[cli] total: (statements) 0.0%

@muscariello muscariello marked this pull request as ready for review September 12, 2025 08:54
@muscariello muscariello marked this pull request as draft September 12, 2025 08:54
@github-actions github-actions bot added the stale Denotes an issue or PR that has become stale and will be auto-closed. label Nov 16, 2025
@ramizpolic ramizpolic added no-stale Denotes an issue or PR that should be preserved from going stale. and removed stale Denotes an issue or PR that has become stale and will be auto-closed. labels Nov 17, 2025
@agntcy agntcy deleted a comment from github-actions bot Nov 17, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

no-stale Denotes an issue or PR that should be preserved from going stale.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Port EVM PoC

3 participants