Skip to content

feat(vendors): add iExec confidential computing entry#99

Open
edenbd1 wants to merge 5 commits intoethereum:masterfrom
edenbd1:add-iexec-vendor
Open

feat(vendors): add iExec confidential computing entry#99
edenbd1 wants to merge 5 commits intoethereum:masterfrom
edenbd1:add-iexec-vendor

Conversation

@edenbd1
Copy link

@edenbd1 edenbd1 commented Mar 4, 2026

What are you adding?

  • Vendor/Protocol
  • Enterprise Use Case
  • Update to existing content
  • Other

Description

Add iExec to the vendors list as a confidential computing provider leveraging TEE for secure off-chain computation.

Checklist

  • I've checked this doesn't duplicate existing content
  • All links work
  • Info is accurate

edenbd1 and others added 2 commits February 27, 2026 14:51
Updated descriptions for clarity and consistency throughout the document. Enhanced the language for better readability and understanding of iExec's features and use cases.
Copy link
Collaborator

@rymnc rymnc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thank you for your PR!
https://docs.iex.ec/ refers to deployments on arbitrum, do you have a link to the mainnet deployment so we can check?

vendors/iexec.md Outdated

- Reliance on hardware security assumptions (Intel SGX trust model)
- Centralization considerations around TEE hardware supply
- Performance constraints for heavy workloads
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can we have something more concrete here which says what exactly cannot be run on this solution?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

good point, i have updated the section to clarify the limitations

edenbd1 and others added 3 commits March 6, 2026 03:48
Co-authored-by: Aaryamann Challani <43716372+rymnc@users.noreply.github.com>
Co-authored-by: Aaryamann Challani <43716372+rymnc@users.noreply.github.com>
Clarify performance constraints and memory limits for workloads.
@rymnc
Copy link
Collaborator

rymnc commented Mar 6, 2026

thanks for addressing comments @edenbd1
just have some clarifying questions:

  1. has this product undergone any audits?
  2. feat(vendors): add iExec confidential computing entry #99 (review)

@edenbd1
Copy link
Author

edenbd1 commented Mar 6, 2026

yes, there have been several audits over time:

iExec PoCo Audit – ConsenSys Diligence (2019)
https://www.iex.ec/academy/iexec-poco-audit-consensys-diligence

iExec v3 Security Audit – ChainSecurity (2019)
https://www.chainsecurity.com/security-audit/iexec-v3

RLC Multichain Bridge – Halborn (2025)
https://www.halborn.com/audits/iexec/rlc-multichain-bridge-979ae0

these cover core protocol components such as PoCo and the RLC bridge infrastructure

@edenbd1
Copy link
Author

edenbd1 commented Mar 6, 2026

@edenbd1
Copy link
Author

edenbd1 commented Mar 11, 2026

hi, i think all review comments have been addressed and checks are passing
is there anything still missing on my side for merge?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants