Skip to content
Closed

Idk #2207

Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
72 commits
Select commit Hold shift + click to select a range
d712f0a
Add deployment infrastructure and cross-chain integration
loydcercenia-Paul Oct 13, 2025
7de55b4
Add clean deployment workflow with tx tracking
loydcercenia-Paul Oct 13, 2025
803db75
Add Moralis API key to gitignore and integrate CryptonoutController
loydcercenia-Paul Oct 13, 2025
6de8cc7
Add Jupiter authority reannouncement with secure key management
loydcercenia-Paul Oct 13, 2025
17698d3
Add zero-cost authority transfer with Helius/QuickNode priority fee l…
loydcercenia-Paul Oct 13, 2025
6d59a18
Add on-chain verification and multisig execution - ALL VERIFIED ✅
loydcercenia-Paul Oct 13, 2025
ef84b81
Identify GLzZk1sczzW6fM4uPFeQCtTZQaf8H5VaBt99tUMbJAAW as new master c…
loydcercenia-Paul Oct 13, 2025
e094db1
Add asset transfer with valid signer and priority fee
loydcercenia-Paul Oct 13, 2025
d97c704
Reannounce FVhQ3QHvXudWSdGix2sdcG47YmrmUxRhf3KCBmiKfekf with new cont…
loydcercenia-Paul Oct 13, 2025
acd4060
Add rebates income check: 0.580587 SOL (16.12)
loydcercenia-Paul Oct 13, 2025
2edc8af
Add security bots: automated scans, Solana monitoring, auto-updates
loydcercenia-Paul Oct 13, 2025
9a4b33f
🔒 Auto-fix security vulnerabilities
sec-dummy Oct 13, 2025
c8b39f5
Multi-program deployment ready: 11/17 verified, 0.58 SOL income
loydcercenia-Paul Oct 13, 2025
521ec1b
Add comprehensive security: API protection, relayer verification, reb…
loydcercenia-Paul Oct 13, 2025
ada82b6
Integrate CryptonoutController as main repo base
loydcercenia-Paul Oct 13, 2025
d2d790e
Complete system verification: 100% operational, 0.58 SOL rebates, all…
loydcercenia-Paul Oct 13, 2025
baf3b11
⬆️ Update dependencies and apply best practices
loydcercenia-Paul Oct 19, 2025
c3a9966
Merge pull request #1 from loydcercenia-Paul/auto-updates
loydcercenia-Paul Oct 20, 2025
99301e0
⬆️ Update dependencies and apply best practices
loydcercenia-Paul Oct 26, 2025
c6e4d2d
Merge pull request #2 from imfromfuture3000-Android/auto-updates
imfromfuture3000-Android Oct 28, 2025
ab5024c
Create Agentic.ts
imfromfuture3000-Android Oct 28, 2025
fbd9f40
Helius API configured and verified: 0.243267 SOL confirmed
loydcercenia-Paul Nov 12, 2025
14630f2
BPFLoader reannounced: Master controller GLzZk1s..., Treasury 4eJZVbb...
loydcercenia-Paul Nov 12, 2025
4fca76f
Create codeql.yml
imfromfuture3000-Android Nov 12, 2025
e32c8b9
⬆️ Update dependencies and apply best practices
loydcercenia-Paul Nov 16, 2025
190efc2
Bump peter-evans/create-pull-request from 6 to 7
dependabot[bot] Dec 4, 2025
7b7afe3
Bump docker/build-push-action from 5.0.0 to 6.18.0
dependabot[bot] Dec 4, 2025
59a7f75
Merge pull request #4 from imfromfuture3000-Android:auto-updates
imfromfuture3000-Android Dec 11, 2025
52d13ab
Merge branch 'main' into main
imfromfuture3000-Android Dec 11, 2025
f5305ce
Potential fix for code scanning alert no. 10: Workflow does not conta…
Paulpete Dec 26, 2025
798400f
Merge pull request #10 from WhiteAiBlock/alert-autofix-10
Paulpete Dec 26, 2025
fefd13d
Potential fix for code scanning alert no. 12: Clear-text logging of s…
Paulpete Jan 4, 2026
9c637fe
Add Helius verification guide for DAO controller multisig
imfromfuture3000-Android Jan 4, 2026
a09dcde
Merge pull request #12 from WhiteAiBlock/codex/scan-and-deploy-contra…
Paulpete Jan 4, 2026
eed563e
Add CryptoGene agent blueprint
imfromfuture3000-Android Jan 18, 2026
23a692d
Merge pull request #13 from WhiteAiBlock/codex/scan-and-deploy-contra…
imfromfuture3000-Android Jan 18, 2026
14e8e6e
Add GROK_API_KEY to .env.example
imfromfuture3000-Android Jan 21, 2026
bc04624
Merge branch 'imfromfuture3000-Android:main' into main
imfromfuture3000-Android Jan 25, 2026
38c656b
Potential fix for code scanning alert no. 13: Clear-text logging of s…
imfromfuture3000-Android Jan 28, 2026
a7de82f
Add dependency audit and vulnerability scan workflow
imfromfuture3000-Android Jan 28, 2026
48261b1
Merge pull request #11 from WhiteAiBlock/alert-autofix-12
imfromfuture3000-Android Jan 28, 2026
288a4e8
Potential fix for code scanning alert no. 6: Workflow does not contai…
Paulpete Feb 22, 2026
156e781
🔒 Auto-fix security vulnerabilities
sec-dummy Feb 27, 2026
980dde4
build(deps): bump golang from 1.25.4-alpine to 1.26.0-alpine
dependabot[bot] Mar 1, 2026
89a3d0c
Bump @solana/spl-token from 0.1.8 to 0.4.14
dependabot[bot] Mar 1, 2026
7115784
Bump actions/github-script from 7 to 8
dependabot[bot] Mar 1, 2026
b611116
Bump @coral-xyz/anchor from 0.30.1 to 0.32.1
dependabot[bot] Mar 1, 2026
49e290e
Bump docker/metadata-action from 5.0.0 to 5.10.0
dependabot[bot] Mar 1, 2026
f5c60e1
Bump docker/login-action from 3.0.0 to 3.6.0
dependabot[bot] Mar 1, 2026
4af3716
Merge pull request #9 from WhiteAiBlock/dependabot/npm_and_yarn/solan…
Paulpete Mar 1, 2026
18b1f3d
🔒 Auto-fix security vulnerabilities
sec-dummy Mar 1, 2026
311a846
Merge pull request #19 from WhiteAiBlock/alert-autofix-6
Paulpete Mar 1, 2026
2ae26b5
Merge pull request #3 from WhiteAiBlock/dependabot/github_actions/doc…
Paulpete Mar 1, 2026
daf98d8
Merge pull request #1 from WhiteAiBlock/dependabot/github_actions/doc…
Paulpete Mar 1, 2026
0bec5f9
Bump reproducible-containers/buildkit-cache-dance from 2.1.4 to 3.3.0
dependabot[bot] Mar 1, 2026
aab0154
Merge pull request #7 from WhiteAiBlock/dependabot/github_actions/rep…
Paulpete Mar 1, 2026
ea4e355
Merge pull request #8 from WhiteAiBlock/dependabot/npm_and_yarn/coral…
Paulpete Mar 1, 2026
1233406
Merge pull request #6 from WhiteAiBlock/dependabot/github_actions/act…
Paulpete Mar 1, 2026
f07c002
Merge pull request #4 from WhiteAiBlock/dependabot/github_actions/pet…
Paulpete Mar 1, 2026
2a4ebaf
Merge pull request #5 from WhiteAiBlock/dependabot/github_actions/doc…
Paulpete Mar 1, 2026
8c54b5d
Bump docker/setup-buildx-action from 3.11.1 to 3.12.0
dependabot[bot] Mar 1, 2026
cdd294b
Merge pull request #26 from WhiteAiBlock/dependabot/github_actions/do…
Paulpete Mar 1, 2026
d832d2c
build(deps): bump golang from 1.25.4-alpine to 1.25.7-alpine
dependabot[bot] Mar 1, 2026
db8abff
Merge pull request #17 from WhiteAiBlock/dependabot/docker/golang-1.2…
Paulpete Mar 1, 2026
5d89867
Merge pull request #6 from WhiteAiBlock/main
imfromfuture3000-Android Mar 1, 2026
5925687
Merge pull request #27 from imfromfuture3000-Android/main
imfromfuture3000-Android Mar 1, 2026
78bd838
Merge pull request #18 from WhiteAiBlock/dependabot/docker/golang-1.2…
Paulpete Mar 2, 2026
4a8c90f
build(deps): bump goreleaser/goreleaser-action from 6.4.0 to 7.0.0
dependabot[bot] Mar 5, 2026
30a7e49
Merge pull request #28 from WhiteAiBlock/dependabot/github_actions/go…
Paulpete Mar 7, 2026
451e884
Merge pull request #7 from WhiteAiBlock/main
imfromfuture3000-Android Mar 12, 2026
8c68eb5
Merge branch 'main' into main
imfromfuture3000-Android Mar 12, 2026
16262a9
Create alibabacloud.yml
imfromfuture3000-Android Mar 16, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions .devcontainer/devcontainer.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
{
"image": "mcr.microsoft.com/devcontainers/universal:2",
"features": {
"ghcr.io/dhoeric/features/act:1": {},
"ghcr.io/nikiforovall/devcontainer-features/dotnet-csharpier:1": {},
"ghcr.io/devcontainers-extra/features/act:1": {},
"ghcr.io/devcontainers-extra/features/actionlint:1": {},
"ghcr.io/dotnet/aspire-devcontainer-feature/dotnetaspire:1": {}
}
}
13 changes: 13 additions & 0 deletions .env.example
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# RPC Endpoints
GROK_API_KEY=your_grok_key_here
SOLANA_RPC=https://api.mainnet-beta.solana.com
HELIUS_API_KEY=your_helius_key_here
QUICKNODE_ENDPOINT=your_quicknode_endpoint_here
MORALIS_API_KEY=your_moralis_key_here

# Relayer
RELAYER_URL=https://api.helius.xyz/v0/transactions/submit
RELAYER_FEE_PAYER=HeLiuSrpc1111111111111111111111111111111111

# DO NOT COMMIT ACTUAL KEYS
# Copy to .env and add real values
27 changes: 18 additions & 9 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -1,19 +1,28 @@
# To get started with Dependabot version updates, you'll need to specify which
# package ecosystems to update and where the package manifests are located.
# Please see the documentation for all configuration options:
# https://docs.github.com/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file

version: 2
updates:
- package-ecosystem: "gomod"
- package-ecosystem: "npm"
directory: "/"
schedule:
interval: "weekly"
- package-ecosystem: "docker"
interval: "daily"
open-pull-requests-limit: 10
reviewers:
- "loydcercenia-Paul"
labels:
- "dependencies"
- "automated"

- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "weekly"
- package-ecosystem: "github-actions"
labels:
- "github-actions"
- "automated"

- package-ecosystem: "docker"
directory: "/"
schedule:
interval: "weekly"
labels:
- "docker"
- "automated"
132 changes: 132 additions & 0 deletions .github/workflows/.github/workflows/dependency-audit.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,132 @@
name: "Dependency Audit & Vulnerability Scan"

# Run on push to main (or any branch), and on a daily schedule
on:
push:
branches:
- '**'
schedule:
- cron: '0 2 * * *' # daily at 02:00 UTC
workflow_dispatch:

concurrency:
group: dependency-audit
cancel-in-progress: true

jobs:
audit-node:
name: "Node.js / npm audit"
runs-on: ubuntu-latest
if: ${{ always() }}
steps:
- name: Checkout
uses: actions/checkout@v4

- name: Setup Node.js
uses: actions/setup-node@v4
with:
node-version: '18'
cache: 'npm'

- name: Install dependencies (npm)
if: ${{ hashFiles('**/package-lock.json') != '' }}
run: |
npm ci
- name: Run npm audit (JSON)
if: ${{ hashFiles('**/package-lock.json') != '' }}
run: |
set -o pipefail
npm audit --json > npm-audit.json || true
cat npm-audit.json
- name: Upload npm audit artifact
if: ${{ hashFiles('**/package-lock.json') != '' }}
uses: actions/upload-artifact@v4
with:
name: npm-audit-json
path: npm-audit.json

- name: Fail on high/critical npm findings
if: ${{ hashFiles('**/package-lock.json') != '' }}
run: |
jq -e '.advisories as $a | ($a | to_entries | map(.value) | map(select(.severity == "high" or .severity == "critical")) | length) > 0' npm-audit.json \
&& (echo "High/Critical vulnerabilities found in npm dependencies" && exit 1) || echo "No high/critical npm vulnerabilities"
audit-go:
name: "Go / govulncheck"
runs-on: ubuntu-latest
if: ${{ always() }}
needs: audit-node
steps:
- name: Checkout
uses: actions/checkout@v4

- name: Setup Go
uses: actions/setup-go@v4
with:
go-version: '1.24'

- name: Install govulncheck
run: |
set -eux
GO111MODULE=on go install golang.org/x/vuln/cmd/govulncheck@latest
export PATH=$PATH:$(go env GOPATH)/bin
- name: Run govulncheck (JSON)
run: |
set -eux
# run in module root; govulncheck returns 0 with no vulns, >0 otherwise
$(go env GOPATH)/bin/govulncheck -json ./... > govulncheck.json || true
cat govulncheck.json
- name: Upload govulncheck artifact
uses: actions/upload-artifact@v4
with:
name: govulncheck-json
path: govulncheck.json

- name: Fail on found Go vulnerabilities (HIGH/CRITICAL)
run: |
# govulncheck JSON has "vulns" entries; search for severity levels if available
if jq -e '.vulns | length > 0' govulncheck.json >/dev/null 2>&1; then
# Try to detect severity mentions; if none, fail so maintainers can review
if jq -e '.vulns | map(.fixed|length > 0 or true) | length > 0' govulncheck.json >/dev/null 2>&1; then
echo "Go vulnerabilities detected — please review govulncheck.json artifact."
exit 1
fi
fi
echo "No Go vulnerabilities detected (or none reported by govulncheck)."
results-notify:
name: "Publish summary"
runs-on: ubuntu-latest
needs: [audit-node, audit-go]
steps:
- name: Checkout
uses: actions/checkout@v4

- name: Download artifacts
uses: actions/download-artifact@v4
with:
path: artifacts

- name: Create short summary comment (if run from PR)
if: github.event_name == 'pull_request'
uses: actions/github-script@v7
with:
script: |
const fs = require('fs');
const path = 'artifacts';
let summary = `🔎 Dependency audit artifacts available:\\n\\n`;
const files = fs.readdirSync(path);
files.forEach(f => summary += `- ${f}\\n`);
github.rest.issues.createComment({
owner: context.repo.owner,
repo: context.repo.repo,
issue_number: context.issue.number || github.context.payload.pull_request.number,
body: summary
});
- name: Finish
run: echo "Artifacts uploaded: $(ls -la artifacts || true)"
122 changes: 122 additions & 0 deletions .github/workflows/alibabacloud.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,122 @@
# This workflow will build and push a new container image to Alibaba Cloud Container Registry (ACR),
# and then will deploy it to Alibaba Cloud Container Service for Kubernetes (ACK), when there is a push to the "main" branch.
#
# To use this workflow, you will need to complete the following set-up steps:
#
# 1. Create an ACR repository to store your container images.
# You can use ACR EE instance for more security and better performance.
# For instructions see https://www.alibabacloud.com/help/doc-detail/142168.htm
#
# 2. Create an ACK cluster to run your containerized application.
# You can use ACK Pro cluster for more security and better performance.
# For instructions see https://www.alibabacloud.com/help/doc-detail/95108.htm
#
# 3. Store your AccessKey pair in GitHub Actions secrets named `ACCESS_KEY_ID` and `ACCESS_KEY_SECRET`.
# For instructions on setting up secrets see: https://developer.github.com/actions/managing-workflows/storing-secrets/
#
# 4. Change the values for the REGION_ID, REGISTRY, NAMESPACE, IMAGE, ACK_CLUSTER_ID, and ACK_DEPLOYMENT_NAME.
#

name: Build and Deploy to ACK

on:
push:
branches: [ "main" ]

# Environment variables available to all jobs and steps in this workflow.
env:
REGION_ID: cn-hangzhou
REGISTRY: registry.cn-hangzhou.aliyuncs.com
NAMESPACE: namespace
IMAGE: repo
TAG: ${{ github.sha }}
ACK_CLUSTER_ID: clusterID
ACK_DEPLOYMENT_NAME: nginx-deployment

ACR_EE_REGISTRY: myregistry.cn-hangzhou.cr.aliyuncs.com
ACR_EE_INSTANCE_ID: instanceID
ACR_EE_NAMESPACE: namespace
ACR_EE_IMAGE: repo
ACR_EE_TAG: ${{ github.sha }}

permissions:
contents: read

jobs:
build:
runs-on: ubuntu-latest
environment: production

steps:
- name: Checkout
uses: actions/checkout@v4

# 1.1 Login to ACR
- name: Login to ACR with the AccessKey pair
uses: aliyun/acr-login@v1
with:
region-id: "${{ env.REGION_ID }}"
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"

# 1.2 Build and push image to ACR
- name: Build and push image to ACR
run: |
docker build --tag "$REGISTRY/$NAMESPACE/$IMAGE:$TAG" .
docker push "$REGISTRY/$NAMESPACE/$IMAGE:$TAG"
# 1.3 Scan image in ACR
- name: Scan image in ACR
uses: aliyun/acr-scan@v1
with:
region-id: "${{ env.REGION_ID }}"
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
repository: "${{ env.NAMESPACE }}/${{ env.IMAGE }}"
tag: "${{ env.TAG }}"

# 2.1 (Optional) Login to ACR EE
- uses: actions/checkout@v4
- name: Login to ACR EE with the AccessKey pair
uses: aliyun/acr-login@v1
with:
login-server: "https://${{ env.ACR_EE_REGISTRY }}"
region-id: "${{ env.REGION_ID }}"
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
instance-id: "${{ env.ACR_EE_INSTANCE_ID }}"

# 2.2 (Optional) Build and push image ACR EE
- name: Build and push image to ACR EE
run: |
docker build -t "$ACR_EE_REGISTRY/$ACR_EE_NAMESPACE/$ACR_EE_IMAGE:$TAG" .
docker push "$ACR_EE_REGISTRY/$ACR_EE_NAMESPACE/$ACR_EE_IMAGE:$TAG"
# 2.3 (Optional) Scan image in ACR EE
- name: Scan image in ACR EE
uses: aliyun/acr-scan@v1
with:
region-id: "${{ env.REGION_ID }}"
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
instance-id: "${{ env.ACR_EE_INSTANCE_ID }}"
repository: "${{ env.ACR_EE_NAMESPACE}}/${{ env.ACR_EE_IMAGE }}"
tag: "${{ env.ACR_EE_TAG }}"

# 3.1 Set ACK context
- name: Set K8s context
uses: aliyun/ack-set-context@v1
with:
access-key-id: "${{ secrets.ACCESS_KEY_ID }}"
access-key-secret: "${{ secrets.ACCESS_KEY_SECRET }}"
cluster-id: "${{ env.ACK_CLUSTER_ID }}"

# 3.2 Deploy the image to the ACK cluster
- name: Set up Kustomize
run: |-
curl -s "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | bash /dev/stdin 3.8.6
- name: Deploy
run: |-
./kustomize edit set image REGISTRY/NAMESPACE/IMAGE:TAG=$REGISTRY/$NAMESPACE/$IMAGE:$TAG
./kustomize build . | kubectl apply -f -
kubectl rollout status deployment/$ACK_DEPLOYMENT_NAME
kubectl get services -o wide
Loading