Important
Bolt is an implementation of permissionless proposer commitments through PBS. In its essence, it consists in a light fork of the current MEV-Boost stack that allows users to request preconfirmations from proposers, and then adds a way for proposers to commit to transaction inclusion in a way that is easily verifiable.
The flow of Bolt can be summarized in the following steps:
- Users submit transactions to an RPC endpoint that will forward them to the proposer opted-in to Bolt in the consensus lookahead window.
- The proposer can accept this request and turn it into a "constraint" on the block that it is going to propose. This constraint acts as guarantee of inclusion of the transaction in the block, also known as a preconfirmation.
- Builders subscribe to proposer constraints in real time through a new relay streaming endpoint to keep informed about the preconfirmations.
- Builders build valid blocks that adhere to all constraints, and append inclusion proofs together with the bids to the relay.
- When it's time to propose a block, the proposer will fetch the best valid bid from the relay, and verify its inclusion proofs locally before signing the header.
- If the constraints are respected, the proposer can propose the payload as usual by sending the signed header back to the relay. If not, the proposer can self-build a payload and propose it directly instead.
The following diagram illustrates the flow:
sequenceDiagram
participant Beacon Node as beacon node
participant Bolt Sidecar as bolt-sidecar
participant MEV-Boost as mev-boost
participant PBS Relay as pbs relay
Beacon Node->>Bolt Sidecar: /eth/v1/builder/header
Note over Beacon Node, Bolt Sidecar: when it's time, the proposer's beacon node will ask for an externally built payload
Bolt Sidecar->>MEV-Boost: /eth/v1/builder/header
MEV-Boost->>PBS Relay: /eth/v1/builder/header_with_proofs
PBS Relay->>MEV-Boost: ExecutionPayloadHeader + InclusionProofs
MEV-Boost->>Bolt Sidecar: ExecutionPayloadHeader + InclusionProofs
alt Inclusion proofs sent by the relay are VALID
Bolt Sidecar->>Beacon Node: ExecutionPayloadHeader
Bolt Sidecar->>MEV-Boost: /eth/v1/builder/blinded-blocks
MEV-Boost->>PBS Relay: /eth/v1/builder/blinded-blocks
Note over MEV-Boost, PBS Relay: the relay can now broadcast the full payload.
else Inclusion proofs sent by the relay are INVALID
PBS Relay->>MEV-Boost: nil response
Bolt Sidecar->>Beacon Node: bolt-sidecar will generate a fallback ExecutionPayload that follows all constraints committed to by the proposer.
Bolt Sidecar->>MEV-Boost: /eth/v1/builder/blinded-blocks
MEV-Boost->>PBS Relay: /eth/v1/builder/blinded-blocks
PBS Relay->>Beacon Node: ExecutionPayload
Note over Beacon Node, Bolt Sidecar: after receiving the payload, the beacon node will broadcast it to the beacon chain p2p network.
end
This repository contains all the necessary components to illustrate the flow described above. It can be thought of a reference implementation. In particular, the core components are:
- Bolt Sidecar: New validator software (akin to mev-boost) that handles the receipt of preconfirmation requests from users, translates them into constraints, and forwards them to relays. Additionally, it handles the fallback logic to produce a block locally when relays send invalid inclusion proofs.
- Builder: A fork of the Flashbots builder that subscribes to new constraints from relays, builds blocks that respect them, and includes the necessary proofs of inclusion in the bid submitted to relays.
- Relay: A fork of the Flashbots relay that receives constraints from proposers, and forwards them to builders. It also receives bids with proofs of inclusion from builders, verifies them and forwards the best bid to proposers for block proposal.
- MEV-Boost: A fork of the Flashbots MEV-Boost sidecar that includes new API endpoints to proxy requests from the Bolt Sidecar to the connected relays.
- Bolt Contracts: A set of smart contracts for peripheral functionality such as proposer registration and permissionless dispute resolution for attributable faults.
Additionally, this repository contains the necessary scripts to spin up a Kurtosis devnet with all the components running, and a simple web demo to showcase the preconfirmation flow.
We are using a full Kurtosis devnet stack, with custom Docker images for the core components outlined above. The exact version of the Ethereum-package used in our devnet can be seen here.
8GB of RAM and a modern laptop CPU are recommended to run the devnet efficiently, but it should work on most machines. Please Open an issue if you encounter any problems.
Make sure you have the following requirements on your machine:
- Docker engine installed and running
- Just installed
- Kurtosis CLI installed
- Foundry installed
Warning
The Kurtosis CLI version tested is 0.88.16
. Some issues may arise if you are
using a different version. Please make sure to install the correct version.
Then, clone this repository and navigate to the root directory of the project:
git clone git@github.com:chainbound/bolt.git && cd bolt
Running the devnet and demo is straightforward once you have the requirements installed. Just run the following commands in your terminal:
# build all necessary docker images locally first
just build-images
# spin up the kurtosis devnet on your machine
just up
# run the web demo servers.
just demo
The web demo will be available on your browser at http://localhost:3000
.
The demo app will remain open until you press Ctrl+C
in the terminal where
you ran the just demo
command.
To stop the devnet, run the following command:
# if you want to simply stop all running containers
just down
# if you want to remove all the data and stop the Kurtosis engine
just clean
Warning
Remember to shut down the devnet environment when you are done with it, as it consumes significant resources (CPU & RAM) on your machine.
The Bolt sidecar offers an optional set of metrics that can be scraped by a Prometheus server, and shown in Grafana dashboards. They show various informations such as the number of constraints received, the number of blocks proposed, etc.
These metrics are enabled by default but can be disabled by setting running the sidecar with the --metrics
flag set to false
.
MIT. Forked repositories have their own licenses.