Skip to content

Conversation

@Jesse-Sawa
Copy link
Member

@Jesse-Sawa Jesse-Sawa commented Jan 27, 2026

Problem

Most teams using Predicate only need simple WHO-based access control (KYC, allowlists, time restrictions), but today they're forced to encode function signatures and handle parameters they don't actually use.

Solution

Split into two implementations:

  • BasicPredicateClient: For the majority of use cases that only validate WHO can call. No encoding onchain needed.
  • AdvancedPredicateClient: For complex policies that validate WHAT function, HOW MUCH value, or specific parameters.

Decision guide: "Do I need different rules based on WHAT users are doing, or just WHO is doing it?"

  • Just WHO → Basic
  • WHAT/HOW MUCH → Advanced

Sucessfull E2E V2 flow can be proven with this transaction

Note: to simplify the entire flow, we will need to modify the attestation API to ignore the data and msg_value fields

- Added BasicPredicateClient for WHO-based authorization only
- Added BasicVault example in inheritance folder (simplified authorization)
- Added AdvancedVault example in inheritance folder (uses existing PredicateClient)
- Updated README with decision guide: 'Do I need different rules based on WHAT users are doing, or just WHO?'
- Removed duplicate AdvancedPredicateClient (use existing PredicateClient instead)
- All examples now in src/examples/inheritance/ folder
@Jesse-Sawa Jesse-Sawa changed the title Bump version to 2.2.1 Introduce BasicPredicateClient Jan 28, 2026
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
@Jesse-Sawa Jesse-Sawa merged commit 28b3d32 into main Jan 28, 2026
3 checks passed
@Jesse-Sawa Jesse-Sawa deleted the sous branch January 28, 2026 01:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants