CONFIDENTIAL & PROPRIETARY - SOLICITED PROPOSAL © 2025 Inkwell Finance, Inc. All Rights Reserved. Commercial use, reproduction, or distribution prohibited without written agreement with Inkwell Finance, Inc.
Executive Summary
Problem
Liquidity is fragmented across chains; BTC and other assets can’t be used as collateral cross‑chain without trust trade‑offs.
Solution
Non‑custodial, cross‑chain lending via Ika’s 2PC‑MPC and Sui’s parallel execution using least‑privilege, time‑bound capabilities.
No pools; bilateral P2P.
No pools; bilateral P2P.
Differentiation
No standing keys; pre‑signed, verifiable flows; security‑first SDLC; compliance‑first design.
No pools; bilateral P2P.
No pools; bilateral P2P.
Why now
MPC infra maturity, robust oracles, and demand for BTC collateral utility unlock better UX and security.
RFP ask
Seed grant of $100k to deliver the RFP deliverables (8–12 weeks).
Roadmap (high level)
M1: BTC→USDC on Sui testnet
M2: extend to Ethereum/Solana
M3: advanced risk + audits
M4: mainnet + liquidity
M2: extend to Ethereum/Solana
M3: advanced risk + audits
M4: mainnet + liquidity
Inkwell enables native, non‑custodial cross‑chain collateralization by combining a user‑owned key share with a decentralized MPC cluster and a protocol‑held DWalletCap-avoiding both custodial and pooled‑trust assumptions.
Project Overview
No shared liquidity pools. All loans are bilateral P2P contracts. The protocol coordinates checks and uses a protocol‑held DWalletCap to sign within scope; it never shares that capability with users, relayers, or keepers.
Competitive Positioning (trust model archetypes)
- Wrapped assets (wBTC): centralized/federated custody → single point of failure.
- Bridge w/ DVNs (LayerZero): verification outsourced to third‑party networks.
- Decentralized liquidity (THORChain): pooled, economic trust in validator set.
- Inkwell: user key share + decentralized MPC + protocol‑held DWalletCap → non‑custodial, no pools, least‑privilege signing.
Alternatives & Differentiation
- Bridges and wrapped assets: introduce custodial or economic trust, standing signing authority, and bridge-specific risk; UX friction and fragmentation remain.
- Threshold custody and restaked bridges: reduce but do not eliminate trust; complex economic security that can degrade under stress.
- Cross-chain liquidity networks (e.g., swaps/routers): enable movement, not position‑level collateralization across chains.
- Inkwell difference: no standing keys, least‑privilege/time‑bound DWalletCap, pre‑signed envelope execution with on‑chain invariants; unified position across chains without bridges.
Team Pitch
Lars van der Zande
Lead Architect - 5+ years blockchain (Solana); 10+ years full‑stack + DevOps.Lars brings 5+ years of blockchain development experience on Solana and 10+ years of web2 full-stack and DevOps expertise. As the Lead Architect, he’s responsible for the technical vision and implementation of Inkwell’s cross-chain lending protocol. He’s currently serving as interim CEO and CFO until the team completes hiring for these roles.
Guru
Graphics & UI/UX - 5+ years designing intuitive interfaces for web2 & web3.Guru has 5+ years of experience designing intuitive interfaces for both web2 and web3 applications. He focuses on creating user-friendly experiences that abstract the complexity of cross-chain operations, making DeFi lending accessible to a broader audience.
Gregory Nicholas
Business Development - Strategic partnerships and ecosystem growth.Gregory brings extensive experience in business development and strategic partnerships. He’s responsible for building relationships with RWA issuers, institutional partners, and ecosystem stakeholders to drive adoption of Inkwell’s cross-chain infrastructure.
Open roles (post‑grant / investor‑funded):
- DeFi Protocol Engineer - lending protocol, risk, liquidation engine
- Security Engineer - auditor background, cross‑chain vectors
- DevOps / Infra Engineer - large‑scale blockchain infra
- Community / Marketing & Growth
Team Hiring Timeline
- Seed grant phase: executed by current core contributors; additional hires deferred to investor-funded stage.
- Post-grant: begin full hiring once PoC validated; target 1 month from investor close for all roles.
Month-1 Barebones Demo
Objective
Deliver a minimal but real end-to-end demo that exercises Ika 2PC-MPC with Sui orchestration to prove feasibility and momentum within ~4 weeks.Non-goals
- Production-grade risk engine or liquidations automation
- Multi-chain integrations beyond BTC testnet and Sui testnet
- Full UI polish (CLI + minimal web page is sufficient)
Scope & Demo Deliverables
- Ika integration
- Start localnet Ika stack
- Create borrower and lender dWallets via TypeScript scripts
- Obtain limited, time-bound DWalletCaps for: deposit BTC collateral; disburse USDC loan;
- Sui Move minimal protocol (MVP)
- Events for audit trail: DepositRequested, DepositConfirmed, LoanDisbursed, RepayConfirmed
- Presign + Verify flows
- Pre-sign BTC deposit and USDC disbursement envelopes with on-chain guardrails (scope + expiry + price check)
- Verify envelopes in Sui before emitting requests to relayer
- Relayer (barebones)
- Accepts signed envelopes for BTC deposit and broadcasts to Bitcoin testnet
- Polls Bitcoin testnet and submits confirmation back to Sui via oracle runner
- Oracle runner (minimal)
- TX-confirmation feed for BTC deposit into Sui (block hash/txid inclusion)
- CLI + thin demo web page
- One-click (scripted) happy-path: create wallets → request deposit → confirm → disburse → repay
- Record a 2–3 minute video demonstrating the sequence and invariants
Success Criteria (Month-1)
- Happy-path run completes on camera and in logs with on-chain Sui events and BTC testnet txid
- All Ika calls use zero-trust, pre-signed flows; no standing signing authority
- Written demo guide + setup instructions committed to repo
Evidence to Share with Ika
- Demo video + txids/objects links
- Repo pointers: Move contracts, runners, CLI scripts
Grant award condition
Acceptance of the Proposal triggers the $100k award split into milestone deliverables; funds are dedicated to the barebones RFP deliverables. Desirable features beyond this scope proceed with investor funding.
Short technical note: capability scopes, expiry logic, and guardrails used.
Acceptance of the Proposal triggers the $100k award split into milestone deliverables; funds are dedicated to the barebones RFP deliverables. Desirable features beyond this scope proceed with investor funding.
Short technical note: capability scopes, expiry logic, and guardrails used.
Timeline (4 weeks)
- Week 1: Ika + Environment
- ika start local stack wired into repo; TS scripts to create borrower/lender dWallets
- Define DWalletCap scopes and expiries for deposit/loan
- Week 2: Sui MVP + Presign/Verify
- Pre-sign deposit and disbursement envelopes; Sui-side verification logic
- Week 3: Relayer + Oracle
- Barebones relayer broadcasts BTC testnet deposit; oracle runner confirms inclusion to Sui
- Week 4: End-to-End + Packaging
- Wire repay path; run full demo; harden logs and error handling
- Record video; prepare concise README for Ika review
Dependencies & Coordination
- Ika: localnet 2PC-MPC presign/sign endpoints; assistance on capability scoping best practices
- Sui: localnet accounts, faucet; minimal USDC test token (faucet or dev-mint for demo)
Risks & Mitigations
- Ika API changes → Keep integration thin; schedule weekly sync; feature-flag endpoints
- BTC testnet instability → Multi-node providers; retry/backoff; allow manual confirmation fallback for demo
- Sui localnet USDC deployment → availability; dev-mint if needed
- Cross-component timing/race issues → Use explicit state machine in Move; idempotent relayer submits; TTLs
Stretch (time-permitting)
- Minimal Keeper to alert on health factor breaches (no auto-liquidation)
RFP Funding Request
$100,000 (flexible: $50k–$100k) Purpose: Seed grant to deliver a PoC/testnet MVP that validates Ika 2PC‑MPC integration and Sui orchestration. Larger audit, mainnet, and GTM costs are intended to be investor‑funded. Award trigger and use of proceeds: the $100k is payable upon acceptance of the Month-1 Barebones Demo and is earmarked to fund the barebones deliverables listed in documentation/RFP.md#deliverables. Desirable features beyond this barebones scope will be investor-funded thereafter.RFP Scope and Deliverables (8-12 weeks)
- End-to-end BTC→USDC borrowing and repay on Sui testnet v Ika 2PC‑MPC
- Minimal Relayer, Keeper, and Oracle (Pyth) integration
- Least‑privilege, time‑bound DWalletCaps; pre‑signed envelopes with on‑chain checks
- Internal security review + threat model; incident runbook v0
- Simple web UI + CLI runner; demo video and technical docs
- Timeline: raw demo within 1 month (show initiative); polished deliverables 8–12 weeks
- Outputs: testnet demo, docs, and investor materials for next funding stage
RFP Milestones, Roadmap & Budget
This section defines the short, grant-scoped execution plan tied to the $100k award and the Month-1 Barebones Demo.Barebones Demo (Weeks 1–4)
- Scope (barebones subset of Deliverables):
- Minimal Sui MVP contracts enforcing zero-trust lending logic with events
- dWallet integration via Ika 2PC-MPC: presign/sign for deposit, disburse, repay
- Minimal Oracle + Relayer runners (BTC testnet tx confirmation; price guardrail via Pyth or static fallback)
- CLI + minimal UI for happy-path demo; demo video + repo pointers
- Budget $40,000
- Development $24k - Sui MVP contracts; presign/verify flows; CLI + minimal UI; Ika wiring
- DevOps $6k - localnet stacks; CI; logging/metrics for demo
- Design $2k - minimal UI scaffolding for demo clarity
- Security $3k - internal review of capability scope/expiry, invariant checks
- Contingency $5k - BTC testnet instability, Ika API changes, retries/backoff
Testnet MVP (Weeks 5–8)
- Harden presign/verify logic, error handling, and observability
- Internal security review + initial threat model; incident runbook v0
- Testnet deployment using BTC testnet collateral and Sui testnet USDC
- Documentation: setup + demo guide
- Budget $45,000
- Development $22k - harden flows; error handling; observability; testnet deployment
- DevOps $6k - environments, monitors/alerts, testnet infra costs
- Design $5k - testnet UX clarity and demo polish
- Security $5k - initial threat model, incident runbook v0
- Contingency $7k - coordination with oracles/relayer; network variance
Optional (Weeks 9–12)
- Replace static price guardrails with live Pyth in all checks
- Minimal Keeper alerting (no auto-liquidation) time-permitting
- Light UI polish for demo clarity
- Budget $15,000
- Development $4k - Pyth integration in all checks; small keeper alerting; minor UI polish
- DevOps $3k - monitoring/metrics expansion; load tuning
- Design $3k - final pass on demo clarity
- Security $2k - additional hardening/tasks from threat model
- Contingency $3k - buffer or revert to prior phases if unused
Budget Roll-up
- Development: 24 + 22 + 4 = $50k
- DevOps: 6 + 6 + 3 = $15k
- Design: 2 + 5 + 3 = $10k
- Security: 3 + 5 + 2 = $10k
- Contingency: 5 + 7 + 3 = $15k
- Total: $100k
GTM (first 8 weeks)
- Weeks 1–4: Stand up channels (X, Discord, Telegram); publish technical explainers and demo threads; engage dev relations.
- Weeks 5–8: Targeted outreach to whales/MMs; LBP/presale mechanics; fee rebates; contribution‑based airdrops for high‑signal participation.
RFP Budget
- Total: $100,000
Development
$50,000
DevOps & Infrastructure
$15,000
Design & UX
$10,000
Security (internal)
$10,000
Contingency / Ika support / misc
$15,000
- The $100k funds the barebones RFP deliverables above; desirable features proceed with investor funding thereafter.
Post-RFP Roadmap and Projected Budget
Post‑RFP planning disclaimer: The roadmap, GTM, and budgets below are directional and subject to change as we complete research, hiring, audits, and partner diligence. Treat this as a starting point for future planning, not a commitment.
Security Posture
Trust Model & Capability Flow
- No standing signing authority is ever granted. The protocol holds the least‑privilege, time‑bound DWalletCap for each position; it is never shared with users, relayers, or keepers.
- All sensitive actions are executed only by the protocol using its capability, after on‑chain checks: position state, price guardrails, and capability constraints (scope + TTL + nonce).
- Failure modes are bounded: delays only degrade liveness; safety is preserved by expiries/rotation and invariant checks before any signing.
- No external party ever receives a capability; actions are constrained by on‑chain checks and protocol‑held, non‑transferable capabilities.
Borrow & Lend sequence
Liquidation sequence (simplified)
Architecture Snapshot
- No standing signing authority; all capabilities are least‑privilege, time‑bound, and validated on use.
- Critical actions gated by oracles, position state, and cap TTL/scope; replay attempts are rejected or idempotent.
- Safety over liveness: on failures or delays, positions do not execute unsafe actions; capabilities expire and are recalled.
There are no shared liquidity pools; each loan is a bilateral P2P contract. The protocol coordinates checks and signs using a protocol‑held DWalletCap; it never shares that capability with users, relayers, or keepers.
Parallel Liquidation Simulation (testnet)
- Goal: Demonstrate concurrent processing of N liquidation checks without race conditions.
- Setup: Testnet positions with varying health factors; controlled oracle deviation; relayer and keeper runners.
-
Success:
- ≥95% of eligible liquidations finalized within target window; 0 safety violations; all on‑chain invariants (scope, TTL, nonce, price bounds) hold.
- Deterministic idempotency for duplicate envelopes; no double‑liquidations.
- Metrics: per‑chain inclusion latency; Sui verification guard time; relayer broadcast success; retries/error distribution.
- Artifacts: replayable dataset, on‑chain events/logs, public dashboard snapshot, written report.
Threat Model (excerpt)
- Malicious relayer/front‑running: Neutralized by pre‑signed envelopes plus on‑chain DWalletCap checks (scope, TTL, nonce). Any deviation invalidates execution. Relaying is permissionless; censorship is mitigated by anyone‑can‑relay design.
Assumptions & Dependencies
- Ika 2PC‑MPC: availability of presign/sign APIs and support during M1–M2.
- Oracles: Pyth coverage for BTC/ETH/SOL and stablecoins on target networks;
- Testnet/mainnet stability: Sui testnet reliability for M1; Ethereum/Solana testnets for M2.
- Audit scheduling: internal review by end of M1; external vendors reserved for M3; formal verification scope agreed.
- Compliance counsel available during M1 for architecture reviews and during M3 for launch readiness.
- Threat modeling: cross-chain attack surface, oracle dependencies, 2PC-MPC trust assumptions documented
- Secure SDLC: code reviews, property tests, fuzzing, invariants and simulation of failure modes
- Audits: internal review (M1); external audits (SlowMist/OtterSec) and formal verification of core safety-critical contracts (M3)
- Bug bounty: public program opens prior to production (pre-M4)
- Secrets and key material: no custodial control; user shares remain private; runners receive least-privilege, time-bound capabilities only
- Incident response: runbooks, on-chain pausability for critical conditions, post-incident reviews
Data-backed assumptions (selected)
- BTC collateral utilization ~45% (consistent with MakerDAO-style ratios and BIS ranges of 120–150% collateralization)
- Liquidation stress reference: ~$325M liquidations in 24h during the 2022 downturn (used for stress testing and fee modeling)
Risk Analysis & Mitigation Strategy
Risk Matrix
Regulatory Engagement Plan (P2P)
- Frameworks to monitor: FinCEN/BSA + Travel Rule (US), MiCA (EU), PSA (SG); local VASP/MSB definitions by deployment.
- P2P stance: Counterparty‑driven KYC/KYB; small, crypto‑only bilateral loans can be non‑KYC where permitted by law.
- Technical approach: Attestation‑based KYC (pass/fail) via Nautilus TEEs on Sui; Seal for encrypted data access; no PII on‑chain.
- Supervised access: Establish legal pathway for regulators to subpoena underlying PII from the KYC provider if legally compelled.
- Travel Rule readiness: Exchange beneficiary info when interacting with VASPs/fiat rails above thresholds; log audit events on Sui.
- Geo‑controls: Block restricted jurisdictions; per‑deployment policy toggles; threshold‑based enforcement (amounts, roles, assets).
- Documentation: Position paper on non‑custodial P2P marketplace operator scope and control boundaries; counsel review pre‑M3.
Interim Owner Assignments (until hiring completes)
- CEO → Lead Architect (interim)
- CFO → Lead Architect (interim) with external accounting support
- HR Manager → Talent Acquisition lead
- Product Manager → Frontend/UX Lead with Lead Architect support
- Legal Team, Compliance Officer → external partners until in-house roles are filled
Key Performance Indicators (KPIs) & Success Metrics
Overall Project Success Metrics
Milestone-Specific KPIs
Continuous Monitoring KPIs
Technical Health
- System Uptime: 99.9% target (measured hourly)
- Response Time: <2 seconds API response (measured continuously)
- Error Rate: <0.1% transaction failures (measured daily)
Security Metrics
- Vulnerability Response: <24 hours for critical issues
- Incident Resolution: <4 hours for system issues
- Security Score: Maintain A+ rating on security dashboards
Business Metrics
- User Growth: 20% month-over-month growth
- TVL Growth: 15% month-over-month growth
- Revenue Growth: 25% month-over-month growth
Community Metrics
- Community Engagement: 70%+ active community members
- Developer Adoption: 50+ developers building on protocol
- Partnership Growth: 5+ strategic partnerships per quarter
Success Measurement Framework
Data Collection
- Automated Monitoring: Real-time dashboards for technical metrics
Revenue Scenarios (Illustrative)
- Assumptions (Base): $10M TVL at launch; 45% utilization; avg loan duration 60 days; origination fee 0.2%; protocol interest share 5% of interest; 0.05% execution fee on liquidations (2% annualized liquidation volume).
- Conservative: $5M TVL, 30% utilization → ~$30–45K annualized gross fees.
- Base: $10M TVL, 45% utilization → ~$120–180K annualized gross fees.
- Aggressive: $25M TVL, 55% utilization → ~$400–600K annualized gross fees.
- Notes: Fees exclude enterprise SLAs/APIs; BTC/EVM/SOL relay costs modeled in infra budget; unit economics improve with automation.
- Manual Reviews: Weekly team assessments and milestone reviews
- External Validation: Monthly third-party performance audits
Reporting Schedule
- Daily: Technical health and security metrics
- Weekly: Progress against milestone KPIs
- Monthly: Comprehensive performance review
- Quarterly: Strategic goal assessment and adjustment
Escalation Procedures
- Yellow Alert: KPI falls below success threshold
- Red Alert: KPI falls below acceptable threshold
- Emergency Protocol: Critical system or security issues
Risk-Adjusted Success Criteria
Minimum Viable Success
If facing significant challenges, minimum acceptable outcomes:- Technical: 2+ chains operational with basic lending
- Security: 0 critical vulnerabilities, external audit passed
- Market: $2M+ TVL with 200+ active users
- Financial: Project completed within 120% of budget
Stretch Goals
If execution exceeds expectations:- Technical: 5+ chains with advanced features
- Security: Formal verification of 100% contracts
- Market: $25M+ TVL with 2500+ active users
- Financial: Project completed under budget with surplus
Other Funding & Long-Term Vision
Post‑RFP planning disclaimer: The long‑term vision and funding plan are provisional and will evolve with findings from RFP execution, market feedback, and regulatory guidance.
-
Funding Plan:
- Post‑RFP we plan a Series A of $12–18M within 3–6 months of achieving testnet KPIs (BTC–USDC live, audit readiness).
- Optional bridge ($3–5M SAFE) contingent on traction to accelerate integrations.
- Non‑dilutive: pursue ecosystem grants/partnerships (e.g., Sui, oracle providers, cross-chain protocols) for infra and research.
-
Use of Proceeds (Series A):
- Engineering (protocol, cross‑chain integrations, security): ~45–55%
- Infrastructure/DevOps & Observability: ~10–15%
- Security (audits, formal verification, bug bounty): ~10–15%
- Compliance/Legal & Enterprise BD: ~10–15%
P2P Fee Touchpoints (summary)
- Origination (borrower): 10–30 bps of draw; tiered by loan size/risk.
- Execution (liquidation): relayer execution fee reimbursed from penalty; protocol share aligns incentives.
-
Optional enterprise: SLAs for private relayer, premium analytics/APIs.
- Working capital & runway buffer: ~10%
-
Monetization Model:
- Protocol fees: 0.1–0.3% loan origination; small share of interest; execution fee on pre‑signed liquidation relays.
- Enterprise: private relayer SLAs, premium analytics/APIs, support tiers.
- Open‑core + proprietary: smart contracts/runners OSS; Frontend and Backend remain closed‑source with commercial licensing.
Fee Model & Flows
Components and Defaults
- Origination fee: 0.20% of draw (range 0.10–0.30%)
- Reserve factor: 10% of interest to reserves (60% Insurance, 40% Treasury)
- Liquidation penalty: 7% of repaid debt at liquidation (50% Insurance, 30% Relayer, 20% Treasury)
- Relayer execution fee: USDC‑denominated reimbursement priced from on‑chain gas with safety multiplier 1.15× and per‑action caps (chain‑specific)
- Deposit/withdraw/early‑repay: 0
Who pays and when
- Borrower on draw: pays origination fee immediately; receives net draw or mints slightly more debt for net‑parity
- During operation: only interest; reserve factor skimmed to reserves
- On liquidation: borrower pays penalty; relayer reimbursed out of penalty; Insurance covers shortfalls, excess split per schedule
Accounting and denomination
- Fees and reserves denominated in the debt asset on Sui (e.g., USDC)
- Cross‑chain gas paid by relayer in native asset; reimbursed in USDC using oracle FX at execution with safety multiplier and caps
- Insurance Fund maintains targets for shortfall coverage; governance can tune parameters within bounds
Borrow fee flow (simplified)
Liquidation fee flow (simplified)
Parameterization
- Governed per market/chain: f_orig, reserve_factor, penalty, splits, exec fee base/variable/markup, safety multiplier, caps, insurance targets
- Change policy: governance‑controlled with bounded ranges and notice periods; emergency changes subject to on‑chain pause/rollback procedures
- Events: BorrowFee, InterestReserveAccrued, LiquidationPenalty, RelayerExecReimbursed, InsuranceTopUp
-
Go‑to‑Market (GTM):
- Phase 1 (Crypto‑native): BTC collateral <-> stablecoin loans; incentives via fee rebates; targeted market makers.
- Phase 2 (Protocol integrations): SDKs for wallets/DeFi protocols, co‑marketing with partners.
- Phase 3 (Institutional): SLAs, compliance modules, custody integrations.
-
Long‑Term Vision (24–36 months):
- 20+ assets across 8+ chains; portfolio‑level collateral (entire dWallets), privacy‑preserving compliance (e.g., ZK‑KYC attestations).
- Progressive decentralization of governance and operations; community‑driven risk frameworks.
-
Traction Targets:
- Year 1: $100M TVL across 4 chains; 10k MAU; $1.5–3.0M annualized fee run‑rate.
- Year 2: $250M TVL; 25k MAU; $5–8M ARR; enterprise contracts signed.
- Year 3: $1B TVL; institutional adoption; sustainable positive unit economics.
-
Token & Governance:
- No token until PMF and audit‑ready status; then governance token to decentralize parameters/treasury.
- Compliance‑first design; potential fee‑share and stewardship mechanisms subject to legal review.
-
Future Deliverables:
- SDKs and integration guides (public), threat model & formal verification reports, operational runbooks (relayer/keeper/IR), governance & community documentation, enterprise integration playbooks.
Will your project be open source?
Sui Contracts
Apache-2.0
Oracle Runner
MIT
Keeper Runner
MIT
Relayer Runner
MIT
Frontend UI
Closed source
Backend API
Closed source
Documentation
CC BY 4.0