Build With Aspecta ID — Reshaping Developer Experiences at ETHBeijing

Aspecta
5 min readMay 5, 2023

Developer community is a critical component of the Web3 realm, as it plays a pivotal role in driving innovation, fostering collaboration, and enabling thoughts and ideas that were previously impossible.

ETHBeijing is one of the largest offline hackathon in East Asia post-covid with 57 selected teams competing in Public Goods, Layer2 Applications, and Open Research tracks. This exciting event gathering hackers from all around the world was hosted by PKU Blockchain DAO, WTF Academy, co-organized by ETHPlanet and Scroll. Other partners and sponsors include Chainlink, Consensys, Galxe, Mask Network etc.

As a technology partner for this event, Aspecta once again witnessed and documented the participation and achievements of the hackers, and helped to demonstrate their innovative projects and competent technical skills via Aspecta ID and ETH Beijing Hacker Directory.

ETHBeijing Hacker & Project Spotlight

Team Name & Track

  • Hacker: Liquan
  • Public Goods — SLOADS (Winner of Public Goods Track)
  • SLOADS Demo

What is SLOADS and what problems does it tackle?

Foundry is an Ethereum-based smart contract development toolchain, which we personally used quite a lot and inspired us to build this toolkit to streamline that experience. With SLOADS, we aim to add a feature that allows for easy retrieval of all storage slots in smart contracts, particularly for dynamic data structures such as Arrays and Maps. Based on these implementations, developers can conveniently explore the on-chain status of smart contracts, such as finding all wallet addresses associated with a certain token. To achieve this objective, our tasks involve modifying Foundry, Foundry-std, and Foundry-EVM cheatcodes to address issues we previously encountered.

How was your experience throughout ETHBeijing Hackathon?

As a relatively seasoned developer with 10+ years of experience, blockchain or Web3 in general has been a new source of innovation and excitement injected into my programming experiences. I actually came in with only the inspiration of what I hoped to build, but didn’t know anyone to form a team. Especially on the first day, there was a lot of running around to get to know other people, in terms of their background, skill sets, team-up situation, which was time-consuming and inconvenient. Luckily, I ended up meeting my two teammates working in blockchain, who went to the same school, and successfully built out this novel idea.

What do you think of digital identity for developers?

To be honest, I personally think DID can be quite formulaic at this point, as they essentially do similar things in similar ways. Also, the specific use case, as in what I can actually do with this identity, is still a question mark for me, and that was also my initial thought of Aspecta ID.

But when I actually used Aspecta ID, I realized it is beyond just DID, as it can very much function as an automatically updated developer resume, which contains my previous projects, repos and even decodes my skills. There are a lot of times I would need such a profile/resume, but putting in the time to regularly maintain this resume and use the most articulate language to present myself is no easy task, which is why I think Aspecta ID is pretty interesting. From another perspective, in future hackathons, pulling out each other’s Aspecta ID and refer to the hacker directory for team-up might solve my biggest headache during such events.

What are your plans after ETHBeijing hackathon?

As a full-time software engineer, I will definitely go back to my everyday work. But our team still hopes to continue fine-tuning SLOADS so that more user can actually use it to solve real-life problems.

During ETHBeijing, we completed the first few steps including modifying Foundry to enable the use of several new cheat codes in the tests of Solidity projects using Foundry templates and creating a local testing toolkit for contracts to simplify commands for interacting with contracts. ETHBeijing is just the beginning and we’re excited to see what SLOADS can bring in the near future.

Sneak Peek of Liquan’s Aspecta ID

ETHBeijing Winners At A Glance

Public Goods Track — PADO

With PADO , individual users can obtain their total asset information (e.g. cash and spot accounts) on the Binance exchange, and complete privacy protection proofs off-chain when the asset amount exceeds a threshold.

Users can choose to encode the proof result into an Ethereum attestation and submit it to the Ethereum network. One of the main advantages of the project is the use of Interactive Zero-Knowledge (IZK) proofs. Compared to the more familiar non-interactive ZK technologies, such as zk-SNARKs and zk-STARKs, IZK has significant advantages in terms of memory usage and processing Boolean logic. Thus, it is suitable for deploying zk-provers directly on user terminals.

Layer 2 Applications Track: GasLockR

GasLock R is the first trustless GasFi protocol: it uses Axiom, a ZK coprocessor to trustlessly read historical gas prices to provide verifiable, correctly priced GasFi derivatives based on financial models that are updated in real time. GasLockR is interoperable with other protocols and can be used as foundational on-chain infrastructure to build protocols and services that will solve the reliability, onboarding and UX problems we face today. It provides an efficient way to hedge against the risk of rising gas prices. With the trustless financial derivatives product, other wallets or services can build on reliable infrastructure for hedging gas fees.

Open Research Track: 0xdeadbeef

0xdeadbeef aims to research the current state of MEV and build a low-latency blockchain infrastructure, as well as a more accurate malicious token detection tool.

0xdeadbeef is building the MEV infrastructure Pioplat, which will provide the following: 1) a low-latency blockchain network that, through the use of better network algorithms and distributed synchronization protocols, will have lower block (transaction) reception and sending delays compared to other blockchain infrastructures; 2) a malicious token detection tool that uses techniques such as symbolic execution to help MEV bots identify malicious tokens and avoid losses caused by purchasing them.

Contact Us

--

--

🚀AI-powered identity network to empower builders and foster ecosystem growth: Every Aspect of Your Builder Adventure. Twitter:@aspecta_id