Skip to content

Conversation

@kevaundray
Copy link
Contributor

@kevaundray kevaundray commented Dec 9, 2025

Original: https://hackmd.io/@kevaundray/SkxCvcQMZe

Note:

Working group does not imply that you are bounded to any commitment. The working group for a particular project consists mainly of the people already working on that project, are responsible for that project within their respective team or their input will be needed for important parts of the project

List of teams that we have reached out to and have replied:

EL

  • Erigon
  • Reth
  • Nimbus-EL
  • Nethermind
  • Geth (Reviewed, waiting for approval)
  • Ethrex
  • Besu

CL

  • Lodestar
  • Grandine
  • Nimbus-CL
  • Teku
  • Lighthouse
  • Prysm

EF

  • zkEVM team
  • PandaOps
  • Security
  • STEEL
  • DevOps
  • Cryptography research
  • Snarkification
  • RIG
  • Ethproofs
  • Networking (Reviewing)

Copy link

@codygunton codygunton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👋 EF ZKEVM team member here. I approve. I also make some suggestions regarding # Project 7: Security, where I'm part of the proposed working group.

Copy link

@jsign jsign left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm Ignacio from EF ZKEVM team.

LGTM! Left some nit comments.

Copy link

@han0110 han0110 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm Han from EF ZKEVM team.

The planning LGTM!

@bhartnett
Copy link

Ben here from the Nimbus team. Looks good to me!

Copy link

@maximmenshikov maximmenshikov left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving from the view point of the part where I am mentioned.
@kevaundray please add me to security discussions too :)

kevaundray and others added 2 commits December 10, 2025 16:28
Co-authored-by: Fredrik <fredrik@ethereum.org>
Co-authored-by: Justin Traglia <95511699+jtraglia@users.noreply.github.com>
projects.md Outdated
- Target specs
- SNARK prover
- SNARK verifier

Copy link

@fredrik0x fredrik0x Dec 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

if we add my suggestions above, then i guess we should also add milestones for that here

kevaundray and others added 8 commits December 10, 2025 19:21
Co-authored-by: Justin Traglia <95511699+jtraglia@users.noreply.github.com>
Co-authored-by: Fredrik <fredrik@ethereum.org>
Co-authored-by: Justin Traglia <95511699+jtraglia@users.noreply.github.com>
Co-authored-by: Justin Traglia <95511699+jtraglia@users.noreply.github.com>
Co-authored-by: Justin Traglia <95511699+jtraglia@users.noreply.github.com>
Co-authored-by: Justin Traglia <95511699+jtraglia@users.noreply.github.com>
Co-authored-by: Justin Traglia <95511699+jtraglia@users.noreply.github.com>
Co-authored-by: Justin Traglia <95511699+jtraglia@users.noreply.github.com>
@developeruche
Copy link

I am Uche from EPF.

The planning looks good to me!

Copy link

@twoeths twoeths left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm from lodestar, looks good to me

Copy link

@jflo jflo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Besu team approves with some notes on personnel changes.

@kevaundray kevaundray requested a review from misilva73 December 16, 2025 16:36
- zkVM that follows the security guidelines and proof sizes in EF cryptography research blogpost [TODO: INSERT LINK WHEN PUBLISHED]
- This will have provable security as a requirement
- Create Fork readiness review document
- This includes decisions on whether we will need bug bounties and audits for optional proofs

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not my call here, but I think this should be done to establish and evaluate a standard for zkVMs as these are new artefacts.

Co-Authored-By: Alexander Hicks <alexanderlhicks@users.noreply.github.com>
Co-Authored-By: raulk <raulk@users.noreply.github.com>
@kevaundray kevaundray requested a review from raulk December 18, 2025 00:51
Copy link

@jonathanpwang jonathanpwang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm Jonathan from the Axiom team (maintainers of OpenVM zkVM).

I left some questions around where ExecutionWitness optimizations that fall in-between the EL client and Guest Program should be categoried.

Co-authored-by: Jonathan Wang <jonathanpwang@users.noreply.github.com>
@kevaundray kevaundray requested a review from robik75 December 23, 2025 17:24

## Project 6: Benchmarking and Metrics

This a perpetual project.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is*

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.