Skip to main content

103 posts tagged with "Solana"

Articles about Solana blockchain and its high-performance ecosystem

View all tags

Firedancer at 1M TPS: Solana's $100M Bet on Killing Single-Client Risk

· 9 min read
Dora Noda
Software Engineer

In December 2025, after roughly 1,200 days of development and a reported nine-figure investment from Jump Crypto, the full Firedancer validator client finally went live on Solana mainnet. Four months later, the verdict is in: it works, it ships block production at speeds nothing else on the network can match, and it has already attracted more than 20% of network stake. The harder question — the one Solana's institutional credibility now hinges on — is whether the network can reach the kind of client diversity that Ethereum spent a decade building, before its first catastrophic Agave bug forces the issue.

This is the story of the largest single-client engineering effort in blockchain history, why it matters more for resilience than for raw throughput, and what the remaining concentration risk means for builders deciding where to deploy in 2026.

A Three-Year Rewrite, Built From the Network Card Up

Jump Crypto began Firedancer in 2022 with a thesis that sounded almost reckless at the time: rewrite the entire Solana validator from scratch, in C, with a tile-based architecture borrowed from high-frequency trading systems. The team had originally targeted Q2 2024 for mainnet. They missed by roughly eighteen months.

The slip is itself instructive. Firedancer is not a fork of Anza's Agave (the Rust-based reference client) or of Jito-Solana (Agave's MEV-optimized fork). It is an independent C/C++ implementation that shares no execution code with the rest of the network, which means every consensus rule, transaction-processing path, and gossip protocol had to be re-implemented and battle-tested against live mainnet behavior before a single dollar of stake could safely run it.

Jump's intermediate solution — Frankendancer — paired Firedancer's high-performance networking stack with Agave's runtime. That hybrid quietly gathered stake throughout 2025: 8% in June, 20.9% by October. When the full Firedancer client crossed the line in December, much of that stake migrated naturally, giving the new client a credible production beachhead from day one.

What 1 Million TPS Actually Means

The headline number is real, but the asterisks matter. Firedancer's networking layer processed over one million transactions per second in stress testing — but those tests ran in a controlled six-node cluster spread across four continents, not on production mainnet. Real-world Solana today sustains roughly 5,000–6,000 TPS at the protocol level, with stable mainnet averages closer to 65,000 TPS during peak periods in April 2026.

The realistic mid-2026 trajectory is more modest and more useful: 10,000+ TPS in everyday production, a 2–3x improvement over today, with the headroom to absorb spikes that previously destabilized the network. That is the kind of throughput that genuinely changes what is buildable on-chain.

For context on what Firedancer actually optimizes:

  • Transaction ingestion: kernel-bypass networking that reads packets directly from the NIC, eliminating syscall overhead.
  • Signature verification: AVX-512 vectorized ed25519 verification that can chew through tens of thousands of signatures per second per core.
  • Block production: a tile-based pipeline where each validator function runs in its own pinned process, so a slow signature checker cannot starve a block producer.
  • Memory layout: cache-aware data structures that match modern server CPU topology rather than assuming a generic runtime.

None of this is sexy — it is exactly the kind of work that makes a database or a market-data feed go fast. Applied to a blockchain validator, it removes the bottlenecks that have repeatedly forced Solana into degraded states under load.

The Real Story: Killing the Single-Client Failure Mode

Throughput gets the press releases, but the more important contribution of Firedancer is structural. For the first time in its history, Solana has a validator client that shares no execution code lineage with Agave.

Consider the alternative. Jito-Solana — the dominant client by stake — is itself an Agave fork. Vanilla Agave runs on most of the rest. As of early 2026, the rough split is approximately:

  • Jito-Solana: 72% of staked SOL
  • Frankendancer / Firedancer: 21%
  • Vanilla Agave: 7%

Eighty percent of the network shares a common code ancestor. A single critical bug in Agave's runtime — the kind that has hit Ethereum execution clients twice in the past two years — would not be a degraded-performance event. It would be a network halt.

Ethereum learned this lesson the expensive way. The Reth bug in September 2025 stalled validators on versions 1.6.0 and 1.4.8 at block 2,327,426. That was an inconvenient incident that affected 5.4% of execution layer clients. Because the other 94.6% was distributed across Geth, Nethermind, Besu, and Erigon, the network kept producing blocks. The ecosystem treats 33% as the maximum any single client should ever hold, and even Geth's 48–62% share is considered an unresolved governance problem.

Solana's current 80%+ Agave-derived concentration is significantly worse than what Ethereum considers a crisis. Firedancer is the only credible exit.

What Has to Happen Next

The math is uncomfortable but tractable. For Solana to reach genuine multi-client resilience, two things need to occur during 2026:

  1. Jito users have to migrate to pure Firedancer. Jito's MEV-extraction logic is the gravitational mass holding the current concentration in place. Until that functionality is ported into a Firedancer-compatible plugin, large staking operations have a strong financial reason to stay on Agave-derived code.
  2. Agave + Jito combined stake has to drop below 50%. Once Firedancer crosses 50%, Solana can survive a catastrophic Agave bug without halting. That is the resilience floor every credible institutional custodian and ETF issuer is implicitly underwriting against.

The fact that Frankendancer adoption more than doubled in four months suggests the migration is achievable, but it is not automatic. Validator economics, monitoring tooling, and operational familiarity all favor incumbency. Jump and Anza have both signaled that 2026 is the year to push hard, but neither controls the validator set directly.

Firedancer + Alpenglow: The Combined Roadmap

Firedancer is only one half of Solana's most ambitious technical cycle since mainnet launch. The other half is Alpenglow, a complete consensus rewrite approved by 98.27% of voting SOL stake in September 2025.

Alpenglow retires Proof-of-History and TowerBFT, replacing them with two new components — Votor for fast-finality consensus and Rotor for data propagation. The headline outcome is finality dropping from roughly 12.8 seconds to 100–150 milliseconds, a 100x improvement that targets a Q3 2026 mainnet integration.

For institutional users, the combination matters more than either piece in isolation:

  • Sub-second finality makes settlement competitive with centralized exchanges, opening the door to on-chain high-frequency trading and real-world asset settlement that today still routes through traditional rails.
  • High throughput with multiple clients removes the "Solana goes down" objection that has historically kept enterprise treasury and tokenized-asset issuers cautious.
  • Independent code paths satisfy the diligence requirements that custodians and ETF authorized participants increasingly write into their network risk models.

The $58M daily ETF inflows and $827M in tokenized real-world assets that Solana attracted in early 2026 are a leading indicator. Institutional money does not commit to single-client networks at scale.

What Builders Should Take Away

If you are deploying on Solana in 2026, the practical implications are concrete:

  • Throughput headroom is real. The 5,000-TPS production ceiling has been a consistent design constraint for high-frequency dApps. By Q4 2026, that constraint substantially loosens, which changes the cost calculus for order books, on-chain games, and agent-driven workflows that previously had to batch or compress aggressively.
  • Latency assumptions need updating. If Alpenglow lands on schedule, settlement assumptions built around 12-second finality become obsolete. Designs that wait for confirmation before triggering downstream actions can collapse multiple round-trips into one.
  • Client-aware infrastructure matters more, not less. As Firedancer adoption grows, RPC providers, indexers, and monitoring tools that handle client-specific quirks gracefully will become the production-grade choice. Generic "Solana RPC" stops being a meaningful differentiator.
  • The concentration risk is still real. Until Jito stake migrates, a single Agave bug can still take the network down. Treasury-critical applications should design with that scenario in mind — not by avoiding Solana, but by understanding where the network sits on the resilience curve relative to Ethereum.

The Bottom Line

Firedancer's mainnet release is the most important infrastructure milestone in Solana's history, and it is not primarily about speed. It is about whether one of the most technically ambitious blockchains can grow up into a network that institutions can underwrite. The 1 million TPS demo is what gets the headlines, but the structural achievement is that Solana now has a credible path to looking like Ethereum on resilience metrics — provided validator economics cooperate.

The next twelve months will tell us whether Jump's $100M+ bet pays out. If Firedancer crosses 50% stake by the end of 2026 and Alpenglow ships on time, Solana enters 2027 as a genuinely different network — one with the throughput of a high-performance ledger, the finality of a real-time settlement system, and the client diversity of a credible institutional rail. If it stalls at 25–30% adoption, the headline number stays a marketing asset and the underlying single-client risk persists.

For developers and infrastructure teams choosing where to build, the read is straightforward: Solana in 2026 is more capable and more resilient than Solana in 2025, the trajectory is favorable, and the work that remains is operational rather than technical. That is a much better problem to have than the one Jump set out to solve four years ago.

BlockEden.xyz operates production-grade Solana RPC infrastructure designed for the multi-client era, with built-in support for Firedancer, Agave, and Jito-derived nodes. Explore our Solana API services to build on infrastructure that tracks where the network is going, not just where it has been.

DeFi's $606M April: Why 2026's Worst Hack Month Isn't About Smart Contracts

· 11 min read
Dora Noda
Software Engineer

In the first 18 days of April 2026, attackers drained more than $606 million from a dozen DeFi protocols — 3.7 times the entire Q1 2026 theft total in less than three weeks. It was the worst month for crypto theft since the $1.5 billion Bybit hack of February 2025, and the most damaging period for DeFi specifically since the bridge-exploit era of 2022.

But unlike 2022, almost none of it was caused by a smart contract bug.

The Kelp DAO bridge drain ($292M), the Drift Protocol oracle-and-key compromise ($285M), and the late-March Resolv Labs AWS heist ($25M) share a quieter, more uncomfortable common thread: they were all enabled by changes a protocol team made to its own trust assumptions — a default config, a pre-signed governance migration, a single cloud key — that no smart contract auditor had reason to flag. April 2026 isn't a story about Solidity. It's a story about the operational seams between code, infrastructure, and governance, and what happens when "upgrade" becomes the new attack surface.

A Worse-Than-Q1 Month, Compressed Into 18 Days

To appreciate just how anomalous April has been, the math has to be unpacked.

CertiK pegged Q1 2026 total losses at roughly $501 million across 145 incidents — itself an elevated figure inflated by January's $370M phishing wave (the worst month in 11 months at the time). February 2026 cooled to about $26.5 million. March crept back up to $52 million in 20 separate incidents, prompting PeckShield to warn of "shadow contagion" as repeat-attack patterns emerged across smaller DeFi venues.

Then April 1, 2026 — April Fool's Day — opened with the Drift exploit, the year's largest hack at the time. Eighteen days later, the Kelp DAO drain pushed past it. Together those two incidents alone exceed $577 million. Add the Resolv aftermath, ongoing infrastructure compromises, and the dozen smaller DeFi breaches accumulating in PeckShield and SlowMist trackers, and you arrive at $606M+ in roughly half a month.

For context, Chainalysis reported $3.4 billion in total crypto theft for all of 2025, with most of that concentrated in the Bybit breach. April 2026's pace would, if sustained, easily clear that benchmark before year-end. The threat hasn't grown in volume — it has grown in concentration and in attacker sophistication.

Three Hacks, Three Categorically Different Failure Modes

What makes the April spree analytically interesting — rather than just bleak — is that the three flagship incidents map cleanly onto three distinct attack classes. Each one targets a different layer of the stack, and each one is a class of failure that traditional smart contract auditors are not chartered to catch.

Class 1: Bridge Configuration as the New Single Point of Failure (Kelp DAO, $292M)

On April 18, an attacker drained 116,500 rsETH — roughly $292 million — from Kelp DAO's LayerZero-powered bridge. The technique, as reconstructed by CoinDesk and LayerZero's own forensics team, did not exploit a Solidity bug. It exploited a configuration choice.

Kelp's bridge ran a single-verifier (1-of-1 DVN) setup. Attackers compromised two RPC nodes serving that verifier, used a coordinated DDoS to force the verifier into failover, and then used the compromised nodes to attest that a fraudulent cross-chain message had arrived. The bridge released the rsETH on cue. LayerZero attributed the operation to North Korea's Lazarus Group.

What followed was a public blame war that itself reveals how fragile the operational layer has become. LayerZero argued that Kelp had been warned to use a multi-verifier configuration. Kelp countered that the 1-of-1 DVN model was the default in LayerZero's own deployment documentation for new OFT integrations. Both positions are, technically, true. The deeper point is that no audit firm — Certik, OpenZeppelin, Trail of Bits — productizes a review of "is your messaging-layer DVN configuration appropriate for the value you intend to bridge?" That conversation lives in a Slack channel between two teams, not in a deliverable.

Class 2: Pre-Signed Governance Authorizations as Latent Backdoors (Drift, $285M)

On April 1, Drift Protocol — Solana's largest perp DEX — was drained of roughly $285 million in twelve minutes. The attack chained three vectors:

  1. A counterfeit oracle target. The attacker minted ~750 million units of a fake "CarbonVote Token" (CVT), seeded a tiny ~$500 Raydium pool, and wash-traded it near $1 to manufacture price history.
  2. Oracle ingestion. Over time, that fabricated price was picked up by oracle feeds, making CVT appear like a legitimate quoted asset.
  3. Privileged access. Most damagingly, the attacker had previously social-engineered Drift's multisig signers into pre-signing hidden authorizations, and a zero-timelock Security Council migration had eliminated the protocol's last delay defense.

With the inflated collateral position approved against the manipulated oracle, the attacker executed 31 rapid withdrawals across USDC, JLP, and other reserves before any on-chain monitoring could trip.

Two details deserve emphasis. First, Elliptic and TRM Labs both attribute Drift to Lazarus, making it the second nation-state-grade DeFi compromise in eighteen days. Second, the protocol didn't fail — its governance plumbing did. The smart contracts behaved exactly as configured. The vulnerability lived in social engineering plus a governance upgrade that removed the timelock.

The Solana Foundation's response was telling: it announced a security overhaul within days, explicitly framing the incident as a coordination problem between protocols and the ecosystem rather than as a Solana protocol bug. That framing is correct. It is also an admission that the perimeter has moved.

Class 3: A Single Cloud Key Backing a Half-Billion-Dollar Stablecoin (Resolv, $25M)

The Resolv Labs incident on March 22 is the smallest of the three by dollars but the most instructive structurally. An attacker who had gained access to Resolv Labs' AWS Key Management Service (KMS) environment used the privileged SERVICE_ROLE signing key to mint 80 million unbacked USR stablecoins from approximately $100,000–$200,000 in real USDC deposits. Total cashout time: 17 minutes.

The vulnerability was not in Resolv's smart contracts — those passed audits. It was that the privileged minting role was a single externally-owned account, not a multisig, and its key sat behind a single AWS account. As Chainalysis put it, "a protocol with $500M TVL had a single private key controlling unlimited minting." Whether the original breach vector was phishing, a misconfigured IAM policy, a compromised developer credential, or a supply-chain attack remains undisclosed — and that ambiguity is itself the point. The protocol's attack surface was its DevOps perimeter.

The Common Thread: Upgrades Without Red-Team Review

Bridges, oracles, and cloud-managed signing keys feel like wildly different surfaces. But each of the April incidents traces back to the same operational pattern: a team made an upgrade — to a configuration, a governance process, or an infrastructure choice — that altered the protocol's trust assumptions, and no review process was structured to catch the new assumption.

Kelp upgraded to a default DVN setup that LayerZero documented but did not stress-test against $300M of liquidity. Drift upgraded its Security Council governance to remove timelocks, eliminating the very delay that would have surfaced the social-engineered authorizations. Resolv operationalized a privileged minting role on a single key as part of normal cloud DevOps.

This is exactly why OWASP added "Proxy and Upgradeability Vulnerabilities" (SC10) as an entirely new entry in its 2026 Smart Contract Top 10. The framework is finally catching up to where attackers have already moved. But OWASP rules don't run themselves; they require a human review pass that most protocols still don't budget for, because the dominant security narrative remains "we got audited."

That narrative is now demonstrably insufficient. Three of the largest 2026 incidents passed smart contract audits. The breach was elsewhere.

The $13B Capital Exodus and the Real Cost of Modular Trust

The economic damage radiates well past the stolen funds. Within 48 hours of the Kelp drain, Aave's TVL fell roughly $8.45 billion, and the broader DeFi sector shed more than $13.2 billion. The AAVE token dropped 16–20%. SparkLend, Fluid, and Morpho froze rsETH-related markets. SparkLend, perhaps benefiting most from the rotation, captured roughly $668 million in net new TVL as users sought venues with simpler collateral profiles.

The mechanism behind the contagion is worth naming explicitly. After draining Kelp's bridge, the attacker took the stolen rsETH, deposited it as collateral in Aave V3, and borrowed against it — leaving roughly $196 million in bad debt concentrated in a single rsETH/wrapped-ether pair. None of the lending venues accepting rsETH as collateral could see — because of how modular DeFi composes — that their collateral backstop was sitting in a single-verifier LayerZero bridge with a 1-of-1 failure mode. When the bridge went, every venue was simultaneously exposed to the same hole.

This is the invisible coupling problem at the heart of DeFi composability. Each protocol audits its own contracts. Almost no protocol audits the operational assumptions of the protocols whose tokens it accepts as collateral. The April 2026 cascade made that gap legible to every risk officer at every institutional desk currently weighing DeFi integration.

What Comes Next: From Audit to Continuous Operational Review

If there is a constructive read of the April spree, it is that it makes the next phase of DeFi security investment unavoidable. Three shifts are already visible:

1. Bridge-config disclosure as table stakes. Expect liquid restaking and cross-chain protocols to begin publishing — and updating — explicit DVN configurations, fallback rules, and verifier thresholds, the same way smart contract source code is published today. Configuration as a first-class disclosure artifact is overdue.

2. Timelock as a non-negotiable governance default. Industry analysis consistently puts the practical minimum delay for governance migrations at 48 hours — long enough for monitoring systems to detect anomalies and for users to withdraw. The Drift exploit will likely make zero-timelock migrations professionally indefensible by Q3.

3. Privileged-key custody under formal multi-party computation or HSM controls. Resolv's single-EOA minting role is now an industry cautionary tale. Protocols holding mint authority should expect their LPs and institutional integrators to require either threshold signature schemes or hardware-isolated key custody by default.

The deeper structural change is that "audit" as a one-shot deliverable is being replaced by continuous operational review — ongoing assessment of configurations, governance changes, and infrastructure dependencies that evolve faster than any annual audit cadence can track. The protocols that internalize this fastest will absorb the institutional capital that is, right now, sitting on the sidelines waiting for the bad debt to settle.

The Trust Surface Has Moved

April 2026 didn't deliver a new exploit class so much as it confirmed that the old defenses are pointed at the wrong perimeter. Smart contract audits remain necessary; they are not remotely sufficient. The trust surface in DeFi has expanded outward into bridge configurations, governance plumbing, and cloud-managed keys — and adversaries with the patience and resources of state-sponsored actors are now systematically working that perimeter.

The protocols that will earn the next wave of institutional integration are the ones that treat their operational posture with the same rigor they once reserved for their Solidity code. The teams still pointing at a year-old audit PDF as their security story are, increasingly, the teams about to make the next month's headlines.


BlockEden.xyz provides enterprise-grade RPC and indexing infrastructure for builders who need their dependencies to be the boring part of their stack. Explore our API marketplace to build on foundations designed for the operational rigor 2026 demands.

Binance Puts Tokenized SpaceX, OpenAI, and Anthropic in 270 Million Pockets

· 13 min read
Dora Noda
Software Engineer

On April 10, 2026, Binance quietly reshaped who gets to own the private internet.

A new "Pre-IPO" row appeared in the Markets section of the Binance Web3 Wallet — five tokenized assets referencing SpaceX, OpenAI, Anthropic, Anduril, Kalshi, and Polymarket, suddenly discoverable by the wallet's roughly 270 million users worldwide. No accreditation check. No brokerage account. No S-1. Just a tab.

None of those users receive shares. None get dividends, voting rights, or a seat in anyone's cap table. What they get is exposure — a synthetic, on-chain claim pegged 1:1 to equity held by a Solana-based tokenization protocol called PreStocks, which in turn holds its positions through a series of SPVs. It is, in structure, the same trick Republic and Securitize have run for accredited investors for years. What is unprecedented is the distribution surface: a consumer app 30 times larger than any brokerage that has tried this before.

Meme Launchpad 2.0: How Pump.fun and LetsBonk Are Rebuilding Solana's $6.7B Meme Economy

· 11 min read
Dora Noda
Software Engineer

Two years ago, launching a meme coin on Solana meant accepting a ritual: pay $950 to migrate to Raydium, get sniped by bots in the first block, watch the creator dump on bonding curve completion, and move on. By April 2026, that ritual is dead. Pump.fun has retired roughly $213 million in PUMP tokens through buybacks, LetsBonk grabbed 64% of launchpad market share in under a year, and both platforms are quietly rebuilding the meme economy around anti-sniper protection, creator revenue sharing, and reputation-gated launches.

The $6.7 billion Solana meme market is finally growing up — not because regulators forced it, but because two competing launchpads discovered that speculation without trust infrastructure eventually eats itself.

Solana's Kora Signing Node Is the Quiet UX Pivot That Could Reset the Consumer Crypto Race

· 12 min read
Dora Noda
Software Engineer

For five years, "insufficient SOL for transaction" has been Solana's most expensive error message. Every consumer app that ever pitched a non-crypto user lost some percentage of them right there — at the checkout step where a stranger has to acquire a second token just to spend the first one. In April 2026, the Solana Foundation finally shipped the answer: Kora, a fee relayer and signing node that lets dApps sponsor transactions natively, pay fees in any SPL token, and outsource signing to TEEs or KMS-backed vaults. It is not a flashy launch. It is a plumbing upgrade. And plumbing upgrades are how Base and Abstract quietly captured the last twelve months of consumer onboarding.

The question is no longer whether Solana can match the gasless UX of EVM consumer chains. Kora makes that part trivial. The question is whether closing the last-mile gap is enough to win back the developers who already built somewhere else.

What Kora Actually Ships

Strip away the marketing and Kora is three things bolted together: a transaction relayer, a remote signer, and a policy engine. A dApp constructs a transaction, sets a Kora node as the fee payer, the user signs the payload from an embedded wallet, and the Kora operator co-signs and broadcasts. Validators still get paid in SOL. The user never holds any.

What makes it interesting is the validation layer. A Kora node does not blindly relay anything users hand it. It does three checks before signing:

  • Instruction validation against the associated Solana programs, so malformed or malicious instructions get rejected before they hit a leader.
  • Oracle-backed fee adequacy, comparing the offered SPL token amount against current SOL price plus operator margin, so the relayer is never running at a loss.
  • Allowlist and blocklist enforcement at the program and token level, so an operator running a Kora node for a single dApp never accidentally sponsors a transaction targeting some random unaudited contract.

The signing path is where the architecture gets ambitious. Kora supports remote signing through Turnkey and AWS KMS out of the box, which means the private key that pays fees never lives on the relayer's disk. For a fintech building on Solana, that is the difference between "we rolled our own paymaster and crossed our fingers" and "our key custody story passes a SOC 2 audit."

The whole thing has been audited and differentially fuzz-tested by Runtime Verification, which is the kind of detail you mention only when you expect institutions to read the line item.

Why "Native" Beats "Smart Contract" Here

The temptation is to compare Kora to ERC-4337 and assume Solana is catching up. The architectures are doing different things, and the difference matters.

ERC-4337 is account abstraction implemented as a parallel system on top of Ethereum. It introduces a separate mempool, a UserOperation object, a bundler role, and an EntryPoint contract — none of which the base protocol natively understands. Bundlers package user operations, paymasters sponsor fees, and an on-chain contract enforces validation. It works, and it has been deployed across Ethereum mainnet and major L2s, but it is a six-year construction project to retrofit a UX feature that the protocol never anticipated.

Solana's design ate that complexity at the protocol layer years ago. Every transaction already has a feePayer field. Partial signatures are native. Programs can validate arbitrary instructions. Kora is not a bundler-and-paymaster construction; it is a node operator that fills in the feePayer slot and signs with one of the partial signatures the protocol already accepts.

The practical consequence is latency and developer surface area. ERC-4337 transactions go through a separate mempool with its own ordering rules and propagation delays. Kora transactions go through the same path as every other Solana transaction, with the same sub-400ms finality. There is no bundler arbitrage market to think about, no EntryPoint contract version to track, no UserOperation gas estimation to debug.

What this buys Solana developers is something close to "set the fee payer field, ship the dApp." What it loses is some of the optionality EVM smart accounts get for free — multi-key auth, batched calls, on-chain session policies — though much of that is being built separately on Solana through PDAs and program-controlled accounts.

The Last-Mile Gap Solana Actually Had

For all the talk about Solana's developer momentum in 2025 and 2026, the consumer wallet layer was the part that lagged. The infrastructure stack matured fast: Pump.fun's DEX volume topped $2B in Q1 2026, Jito and Marinade dominate liquid staking, Tensor turned NFT trading into a professional terminal. But every one of those products had to ship its own answer to "the user has no SOL."

The workarounds got creative. Pump.fun routed initial token acquisitions through embedded onramps. Jito pre-funded user accounts with dust amounts. Tensor leaned on Phantom and Backpack to handle the SOL acquisition step before users ever reached the bid book. Each of these worked individually and none of them composed. A user who onboarded through Pump.fun's flow did not arrive at Tensor with a fee-paying balance.

Meanwhile Base shipped Coinbase Smart Wallet's passkey flow, free gas sponsorship through Coinbase Developer Platform, and a developer SDK that hides the entire concept of a private key behind email login. Abstract took the same idea further with embedded wallets that feel like Web2 apps. The combined pitch to a consumer-app developer in 2025 was: build on Base, your users will not know they're onchain, and we'll pay the fees while you scale.

Kora does not replicate that pitch line for line. What it does is remove the architectural reason a Solana dApp could not write the same pitch. With Kora, a Solana team can now offer:

  • Email or passkey signup through Privy, Turnkey, or Coinbase Embedded Wallets.
  • Zero SOL balance required to transact.
  • Fees paid in USDC, BONK, or the dApp's native token if it has one.
  • Sub-second finality with no bundler in the path.

The pieces existed before. Octane was the open-source ancestor. Circle's Gas Station, Openfort, Portal, Gelato, Biconomy, and a half-dozen other vendors offered fee relaying as a service. What Kora changes is that the Solana Foundation itself is now shipping the standard, audited, KMS-compatible reference implementation. That removes "which third-party paymaster do we trust" from the decision tree for every team that was previously rolling their own or paying a vendor.

The Vendor Layer Above Kora

Where things get interesting is what happens to the embedded wallet vendors that already built around the gap Kora just closed.

Privy, acquired by Stripe in June 2025, has been the consumer-app wallet of choice for Solana dApps that want email login. Solana is officially a secondary chain for Privy — the depth is on EVM — but the embedded wallet flow extends to Solana, and Privy already supports configuring a fee payer wallet that the app manages. Kora does not replace Privy; it gives Privy a standardized backend to plug into rather than each customer running their own paymaster service.

Turnkey is the security-first embedded signer that pairs naturally with Kora's remote signing API. Turnkey explicitly does not include paymaster infrastructure, so Solana teams that want hardware-isolated keys plus gasless UX have been forced to bolt two vendors together. Kora collapses that integration.

Dynamic, acquired by Fireblocks in 2025, brings multi-chain auth to institutional teams. The Fireblocks-backed positioning makes Dynamic the natural choice for fintechs that need both Solana and EVM coverage with enterprise compliance. Kora gives Dynamic a clean Solana fee-abstraction story that does not require Fireblocks to ship a competing paymaster.

Coinbase Developer Platform is the awkward one. Coinbase has invested heavily in making Base the default consumer chain through Coinbase Smart Wallet, free Base gas, and the embedded wallet SDK. Kora narrows the differentiation Base has been selling, especially for apps that want USDC-native flows where Solana already has scale advantages.

The likely outcome is that Kora becomes the default Solana backend for every embedded wallet vendor that did not want to operate a paymaster service themselves. The vendors compete on auth UX, key management, and policy controls. Kora handles the fee relay underneath. That is healthier for the ecosystem than the prior state where every consumer Solana dApp made an independent vendor decision and had to evaluate the security of each candidate's homegrown relayer.

What This Does and Does Not Solve

Kora closes one gap definitively and leaves several others open. Worth being precise about which is which.

What Kora solves:

  • The "user must hold SOL" UX cliff for any dApp willing to subsidize fees in another token.
  • The "build vs buy a paymaster" decision for teams that previously had to choose between operational burden and vendor lock-in.
  • The institutional acceptability gap, since the audit and KMS support let regulated entities run Kora nodes without rolling their own.

What Kora does not solve:

  • Wallet acquisition itself — users still need an embedded wallet from somewhere, whether Phantom, Privy, Turnkey, or Coinbase.
  • Account abstraction primitives like batched calls and session keys, which are still being assembled separately on Solana through PDAs and other program-level patterns.
  • The economic question of who pays for the SOL that Kora operators front. For a dApp with token revenue or a stablecoin float, this is fine; for a free product, gas sponsorship is just a customer acquisition cost.
  • Cross-chain UX, which still requires the user to interact with a bridge or a chain abstraction layer like LayerZero, Wormhole, or Across.

The "gasless infrastructure as protocol primitive" thesis cuts both ways. Solana now has the cleanest native fee abstraction story of any major chain. It also means the differentiation moves up the stack to wallet UX, recovery flows, and account abstraction features where EVM has a multi-year head start.

The Strategic Read for Builders

For a team picking a chain in mid-2026, the calculus has shifted. Twelve months ago, the consumer-onboarding answer was Base, Abstract, or one of the new EVM consumer chains, full stop. Solana had developer mindshare and infrastructure momentum but lost retail users to the SOL acquisition step. That is no longer true.

A consumer dApp launching today on Solana with Privy or Turnkey on the front end and Kora on the back end has functionally the same UX surface as the equivalent stack on Base. Email login, gasless transactions, fee payment in USDC, sub-second finality. The remaining differences are the runtime model, the tooling ecosystem, and the available liquidity. For an app that wants Solana's throughput and DEX depth, the UX argument for picking EVM has gotten substantially weaker.

For teams already shipping on Base, Kora does not change the immediate decision. It does change the long-term competitive pressure. If the consumer dApps with the cleanest UX start showing up on Solana because the new infrastructure is one less integration to worry about, the gravity around Base's consumer-onboarding moat starts to shift.

The honest read is that Kora is necessary but not sufficient. It removes a specific reason developers were not picking Solana for consumer apps. It does not by itself create a new reason to pick Solana. The next two quarters will show whether the embedded-wallet vendors actually default to Kora, whether new consumer dApps cite it as a reason for their chain choice, and whether the existing EVM consumer chains respond by improving their own infrastructure stories.

Either way, "user must acquire SOL before transacting" is finally a legacy problem, not a current one. That alone is worth shipping.


BlockEden.xyz operates production-grade Solana RPC infrastructure for teams building consumer dApps, payment rails, and trading systems. If you're integrating gasless flows or scaling a Solana product, explore our API marketplace for low-latency endpoints designed for the next generation of consumer crypto.

Sources

Virtuals Protocol + BitRobot: When AI Agents Start Paying Robots

· 11 min read
Dora Noda
Software Engineer

The first time an autonomous on-chain agent paid a physical robot to pick up a coffee cup, no human was in the loop. No purchase order. No invoice. No bank wire. Just a smart contract, an x402 micropayment, and a humanoid arm that obeyed because the money cleared. That moment, quiet and uncelebrated, marked the dissolution of a boundary that the AI agent narrative had treated as load-bearing for two years: the wall between digital agents that trade tokens and physical machines that move atoms.

Virtuals Protocol's Q1 2026 integration with BitRobot Network is the first production system to dismantle that wall at scale. By wiring 17,000+ on-chain AI agents into a Solana-based subnet of robotic infrastructure, Virtuals has done something the embodied AI thesis has been gesturing at since OpenAI's robotics demos in 2018 but never quite delivered: it has given software agents wallets, identities, and task queues that reach into warehouses, sidewalks, and coffee shops. The implications run from a $4.44 billion embodied AI market in 2025 toward a projected $23 billion by 2030, and they reframe what "agentic commerce" actually means.

From Digital Trading to Physical Tasks

For most of 2024 and 2025, AI agent tokens lived in a tightly-bounded sandbox. Agents on Virtuals, ai16z, and similar platforms posted on social media, traded memecoins, ran DeFi strategies, and occasionally made each other laugh. Critics correctly noted that this was a closed loop — agents transacting with agents about things that only existed on chain. The real economy, the one with shipping pallets and delivery vans and broken HVAC units, remained untouched.

BitRobot changes the topology of that loop. Co-developed by FrodoBots Lab and Protocol Labs after an $8 million seed round backed by Solana Ventures, Virtuals Protocol, and Solana co-founders Anatoly Yakovenko and Raj Gokal, BitRobot is structured as a constellation of subnets. Each subnet contributes one specialized output that embodied AI needs: navigation data, manipulation skills, simulation environments, or model evaluation. Subnet 5, called SeeSaw, was launched directly with Virtuals as a partnership product — users record short videos of mundane tasks like tying shoelaces or folding laundry, upload them, and earn token rewards while the data trains the next generation of robotic policy models.

The numbers tell the adoption story bluntly. SeeSaw has already logged more than 500,000 completed tasks since its iOS launch in October 2025. The first on-chain agent to actually drive a physical machine, called SAM, is operating humanoid robots around the clock and posting its observations to X. None of this requires that you believe in the agent economy as a religious matter. It requires only that you accept the data: machine-controlled actions are now being initiated by smart contracts, paid for in tokens, and verified by on-chain evaluators.

The Three-Layer Standards Stack

What makes the Virtuals + BitRobot integration more than a one-off demo is the standards work happening underneath it. Three Ethereum and HTTP-level protocols arrived in early 2026 to make agent-to-machine commerce composable rather than artisanal:

  • x402 is an HTTP payment standard that lets agents settle micropayments in the same handshake as an API call. Built on the long-dormant HTTP 402 status code, it processed roughly $600 million in AI micropayments in its first months of production use, with Google Cloud and AWS adopting it as a billing primitive for agent-driven inference.
  • ERC-8004 is an Ethereum identity and reputation standard for AI agents. It answers the question every counterparty needs answered before signing a contract: who is this agent, what is its track record, and is it trustworthy enough to do business with?
  • ERC-8183, jointly launched by the Ethereum Foundation's dAI team and Virtuals Protocol on March 10, 2026, is the commercial layer. It introduces a job escrow primitive in which a Client deposits funds, a Provider executes the work, and an Evaluator verifies completion before the escrow releases.

The shorthand is useful: x402 says "how to pay," ERC-8004 says "who you are paying," ERC-8183 says "how to settle a dispute when the cleaning robot leaves a streak on your floor." Together they form an internet-native commerce stack designed for parties that cannot rely on courts, credit cards, or chargebacks. For embodied AI, that stack is not a luxury. It is the only available substrate, because legal contracts struggle to accommodate counterparties that are software agents owned by other software agents managed by token holders scattered across forty jurisdictions.

Why Solana for Robots, Ethereum for Commerce

The Virtuals + BitRobot integration is quietly multi-chain in a way that reveals architectural intent. BitRobot lives on Solana because robot data collection is a high-throughput, low-margin activity — paying contributors fractions of a cent for each video clip demands the kind of fee economics Ethereum L1 cannot provide. Virtuals, born on Base and active on Arbitrum, lives where institutional liquidity and the bulk of the agent commerce standards reside. The integration uses Solana for the physical-world data layer and Ethereum-aligned chains for the commerce layer.

This is the same pattern that crystallized in 2024 around stablecoin payments: Tron and Solana for the cheap, frequent transactions; Ethereum for the high-value, low-frequency settlements. The machine economy appears to be inheriting that division of labor rather than collapsing it. Anyone betting on a single-chain winner for embodied AI is likely to be disappointed, because the workload is naturally bimodal.

Comparing the Embodied AI Approaches

The Virtuals + BitRobot model is not the only attempt to commercialize embodied AI in 2026, and it is worth setting it against the alternatives:

  • Figure AI has raised over a billion dollars to build centralized humanoid robots for warehouse and manufacturing customers. Figure's economic model is classical capital equipment leasing: customers pay monthly for robot-hours. There is no token, no permissionless contributor base, and no mechanism for a third-party developer to extend or specialize the robots without going through Figure's commercial team.
  • Tesla Optimus is corporate-controlled in the deepest sense. The robots, the training data, the policy models, and the deployment decisions all live inside one company. Optimus is impressive engineering, but it sits entirely outside any open economic protocol.
  • OpenMind is pursuing what its team calls an "Android for robotics" — an open platform layer where any robot manufacturer can run a shared operating system. The philosophy overlaps with BitRobot's, but OpenMind has explicitly avoided crypto rails so far, betting that hardware OEMs are still uncomfortable with token-mediated incentives.
  • peaq Network is the closest philosophical cousin. peaq's Layer 1 has onboarded more than 3.3 million machines with verified identities and processed over 200 million transactions across 60 DePIN applications, framing itself as the foundational chain for the machine economy. The difference is that peaq is bottom-up infrastructure, while Virtuals + BitRobot is top-down composition of an existing agent economy with an existing robotics dataset.

The real question is not which approach wins. It is whether the open, multi-chain, token-incentivized model produces enough velocity in data collection and agent deployment to outrun the centralized alternatives before they lock in winner-take-most network effects.

The Market Math

The embodied AI market was valued at roughly $4.44 billion in 2025 and is projected to grow at a 39% CAGR to reach $23 billion by 2030, according to Research and Markets. The broader robotics technology market sits at $108 billion in 2025 and is on track to reach $376 billion by 2034 at a 15% CAGR. These are not crypto-native markets, but they are the addressable surface that crypto-native infrastructure now claims to coordinate.

Stack on top of that the AI-crypto sector itself, which trades in a roughly $52 billion combined market cap and counts Virtuals among its largest sub-protocols. Virtuals processed $13.23 billion in monthly trading volume in late 2025 and powers agents like Ethy AI, which has handled more than 2 million autonomous transactions. The capital is concentrated, the agent inventory is real, and the bridges to physical machinery are now live. The remaining question is how much of that $23 billion embodied AI TAM gets channeled through token-mediated rails versus traditional procurement contracts.

The bullish case is that any sufficiently autonomous robotic fleet will need a payment layer that operates without human approval at every transaction, and that requirement maps cleanly onto stablecoin-and-token rails rather than ACH transfers. The bearish case is that enterprise customers will demand SOC 2 compliance, KYC counterparties, and traditional contractual remedies that crypto-native systems cannot easily offer, pushing the embodied AI market toward boring centralized procurement no matter what the agents do under the hood.

What This Means for Builders

For developers and infrastructure providers, the Virtuals + BitRobot integration creates several concrete openings worth tracking:

  • Data labeling and contribution markets are no longer hypothetical. SeeSaw's 500,000 tasks suggest that consumer-grade contributors will participate in robot training when the rewards are denominated in liquid tokens. This is the closest thing to a working scaled DePIN flywheel for AI training data.
  • Agent reputation as a service becomes a real product category once ERC-8004 has counterparties who care. Agents that can prove uptime, dispute history, and successful job completion will command higher rates and access to higher-value escrowed work.
  • Multi-chain abstraction matters more, not less. Builders who have to bridge Solana data layers to Ethereum commerce layers to Base agent-spawning environments will need infrastructure that hides the seams. Reliable RPC, consistent indexing, and unified API access across these chains is the difference between a working agent and an idle one.

The Closing Frame

The Virtuals + BitRobot integration is not yet a transformed economy. It is a working prototype of one. The 17,000 agents managing physical robots are doing so at a pace measured in thousands of transactions per day, not millions, and the use cases skew toward training data collection rather than mission-critical industrial automation. Skeptics will point out, fairly, that the gap between SAM driving a humanoid for X clout and an autonomous fleet of warehouse robots negotiating contracts with a logistics company is enormous.

But the boundary that mattered most has been crossed. On-chain identity, on-chain payment, and on-chain dispute resolution now extend to physical actuators. Whatever the embodied AI market becomes between now and 2030, a meaningful share of it will run on rails that look more like Virtuals + BitRobot than like SAP. The question for the next eighteen months is which subnet, which standard, and which chain captures the most useful workloads first.

BlockEden.xyz provides enterprise-grade RPC and indexing infrastructure across Solana, Base, Ethereum, and other chains powering the AI agent and machine economy stack. Explore our API marketplace to build agent-driven applications on infrastructure designed for the multi-chain era.

Sources

The Great Unbundling: How DEXs Finally Cracked the CEX Moat in 2026

· 10 min read
Dora Noda
Software Engineer

In January 2026, a single DEX on Solana processed more daily volume than most top-20 centralized exchanges.

A few weeks later, the SEC and CFTC chairs walked onstage together and signed a memorandum promising to stop fighting about who regulates what. And somewhere in between, the ratio of DEX-to-CEX spot volume quietly crossed a line nobody quite believed would ever be crossed.

For most of crypto's history, "DEX vs. CEX" was a thought experiment that ended the same way: CEXs own liquidity, retail wants a clean app, and institutions demand fiat rails. DeFi was for the ideologues. In 2026, that argument is no longer academic. The structural unbundling of the centralized exchange is underway — and it's being pulled forward by three forces that finally arrived together: chain-abstracted wallets, intent-based execution, and on-chain liquidity depth that rivals mid-tier CEXs.

Harvard, CalPERS, Goldman: Inside the Q1 2026 13F Filings That Exposed Crypto's Quiet Institutional Takeover

· 10 min read
Dora Noda
Software Engineer

Retail investors sold roughly 62,000 BTC in the first quarter of 2026. Corporations, endowments, and pension-adjacent vehicles bought about 69,000. That simple swap — panicked sellers trading with patient buyers — is the story the Q1 13F filings now put on the record, and it is nothing like the narrative crypto twitter has been telling itself through the 47% drawdown from October 2025's $126,296 all-time high.

The headlines write themselves. Harvard's endowment raised its BlackRock IBIT stake by 257%, making a spot Bitcoin ETF its largest publicly disclosed holding at $442.8 million. Goldman Sachs disclosed $108 million spread across six separate spot Solana ETF products. CalPERS, the $506 billion California public pension, holds $165.9 million in Strategy shares and is actively debating direct Bitcoin exposure on the board level. And Q1 2026 drew a record $18.7 billion into spot Bitcoin ETFs even as the spot price fell from the $90Ks into the $60Ks.

45 Seconds to Drain Your Wallet: Inside Ledger's MediaTek Dimensity 7300 Exploit

· 9 min read
Dora Noda
Software Engineer

Plug a USB cable into a Nothing CMF Phone 1. Wait 45 seconds. Walk away with the seed phrase to every hot wallet on the device.

That is not a theoretical threat model. It is a live demo Ledger's Donjon research team published on March 11, 2026, targeting MediaTek's Dimensity 7300 (MT6878) — a 4nm system-on-chip shipping in roughly a quarter of Android phones worldwide, and the exact silicon Solana's flagship Seeker handset was built around. The flaw lives in the chip's boot ROM, the read-only code that runs before Android even loads. It cannot be patched. It cannot be mitigated by an OS update. The only fix is a new chip.

For the tens of millions of users who trust their smartphone as a crypto wallet, this is the moment the "mobile-first self-custody" narrative collided with the physics of silicon.