πŸ”± Trident Documentation

← Project Root

Organized following the Diataxis framework: tutorials, how-to guides, reference, and explanation.


πŸŽ“ Tutorials: learning-oriented

The Builder's Journey β€” six chapters that build one complete private application, from a four-line proof to a sovereign DAO.

# Document You Build
1 Prove a Secret A hash-locked proof β€” the primitive behind everything else
2 Build a Coin A private token with pay, mint, and burn
3 Build a Name Service An ENS-like registry of unique assets
4 Build a Liquidity Strategy A constant-product AMM for TIDE
5 Auction Names with Hidden Bids A Vickrey auction β€” sealed bids, honest pricing
6 Upgrade to a DAO Private coin-weighted voting that governs the name service

Foundations

Document Description
Tutorial Language walkthrough β€” types, functions, modules, inline asm

πŸ”§ Guides: task-oriented

Document Description
Compiling a Program Build, check, cost analysis
Running a Program Execute, test, debug
Deploying a Program Neptune scripts, multi-target deployment
Generating Proofs Execution trace to STARK proof
Verifying Proofs Proof checking, on-chain verification
Optimization Cost reduction strategies
Prompt Templates AI-assisted development prompts

πŸ“– Reference: information-oriented

Document Description
Language Reference Types, operators, builtins, sponge, Merkle, proof composition
Grammar (EBNF) Complete formal specification
IR Design TIR operations, tiers, lowering
Target Reference OS model, target profiles, cost models
VM Reference Virtual machine architecture
OS Reference Operating system model
Standard Library std.* module reference
CLI Reference Command-line interface
Error Catalog Every error message explained
Agent Briefing Compact format for AI code generation

Per-target documentation lives alongside its config:

πŸ’‘ Explanation: understanding-oriented

Document Description
Vision Three revolutions, one field β€” why Trident exists
Multi-Target Compilation One source, every chain
Programming Model Execution model, OS abstraction, six concerns
How STARK Proofs Work From traces to quantum-safe proofs
Provable Computing Comparative analysis of ZK systems
Formal Verification Symbolic execution, SMT, invariant synthesis
Content-Addressed Code Hashing, caching, registry, equivalence
The Gold Standard PLUMB framework, TSP-1 (Coin), TSP-2 (Card)
Skill Library 23 composable token capabilities
For Offchain Devs Zero-knowledge from scratch
For Onchain Devs Mental model migration from Solidity/Anchor/CosmWasm
Privacy The privacy trilateral: ZK + FHE + MPC over one field
Quantum Computing Why prime field arithmetic is quantum-native
Verifiable AI Why the next generation of zkML starts from prime fields
Cyber License Don't trust. Don't fear. Don't beg.

πŸ—ΊοΈ Project

Document Description
Development Plan Roadmap and status

Dimensions

hemera/docs
Hemera documentation explanation why Hemera works the way it does β€” design decisions and rationale. see explanation/ for the full index. guides task-oriented how-tos (phase 2 β€” not yet written). cli.md β€” hash files, check sums, encode/decode streams streaming.md β€” verified streaming for large files…
radio/docs
docs eventually-consistent multi-dimensional key-value documents replica a document instance identified by a NamespaceId (public key). contains unlimited entries. the namespace private key grants write authority over the entire document entries and authors an entry is identified by the tuple…
nox/docs
docs
bbg/docs
docs
zheng/docs
docs
nebu/docs
docs
rs/docs
docs

Pages in this namespace

Local Graph