Skip to main content
CONFIDENTIAL & PROPRIETARY - SOLICITED PROPOSAL © 2025 Inkwell Finance, Inc. All Rights Reserved. Commercial use, reproduction, or distribution prohibited without written agreement with Inkwell Finance, Inc.

Executive Summary

Problem

Liquidity is fragmented across chains; BTC and other assets can’t be used as collateral cross‑chain without trust trade‑offs.

Solution

Non‑custodial, cross‑chain lending via Ika’s 2PC‑MPC and Sui’s parallel execution using least‑privilege, time‑bound capabilities.
No pools; bilateral P2P.

Differentiation

No standing keys; pre‑signed, verifiable flows; security‑first SDLC; compliance‑first design.
No pools; bilateral P2P.

Why now

MPC infra maturity, robust oracles, and demand for BTC collateral utility unlock better UX and security.

RFP ask

Seed grant of $100k to deliver the RFP deliverables (8–12 weeks).

Roadmap (high level)

M1: BTC→USDC on Sui testnet
M2: extend to Ethereum/Solana
M3: advanced risk + audits
M4: mainnet + liquidity
Inkwell enables native, non‑custodial cross‑chain collateralization by combining a user‑owned key share with a decentralized MPC cluster and a protocol‑held DWalletCap-avoiding both custodial and pooled‑trust assumptions.

Project Overview

No shared liquidity pools. All loans are bilateral P2P contracts. The protocol coordinates checks and uses a protocol‑held DWalletCap to sign within scope; it never shares that capability with users, relayers, or keepers.
The core value of Inkwell Finance lies in solving a $10 trillion inefficiency through true cross-chain lending without trust assumptions. Inkwell Finance addresses the fundamental problem of liquidity fragmentation across blockchain networks. Currently, Bitcoin holders can’t use their $1.3T in assets for DeFi lending, and users with cross-chain portfolios can’t efficiently leverage their entire holdings. Existing solutions force impossible trade-offs between security, decentralization, and user experience. Our approach leverages Ika’s revolutionary 2PC-MPC technology and Sui’s parallel execution to enable users to deposit Bitcoin as collateral for Ethereum loans, or use any supported asset across any supported chain - all while maintaining true ownership through non-custodial MPC wallets. We’re not building another bridge; we’re creating the infrastructure for a unified, multi-chain financial system where liquidity flows as seamlessly as ink across paper.

Competitive Positioning (trust model archetypes)

  • Wrapped assets (wBTC): centralized/federated custody → single point of failure.
  • Bridge w/ DVNs (LayerZero): verification outsourced to third‑party networks.
  • Decentralized liquidity (THORChain): pooled, economic trust in validator set.
  • Inkwell: user key share + decentralized MPC + protocol‑held DWalletCap → non‑custodial, no pools, least‑privilege signing.

Alternatives & Differentiation

  • Bridges and wrapped assets: introduce custodial or economic trust, standing signing authority, and bridge-specific risk; UX friction and fragmentation remain.
  • Threshold custody and restaked bridges: reduce but do not eliminate trust; complex economic security that can degrade under stress.
  • Cross-chain liquidity networks (e.g., swaps/routers): enable movement, not position‑level collateralization across chains.
  • Inkwell difference: no standing keys, least‑privilege/time‑bound DWalletCap, pre‑signed envelope execution with on‑chain invariants; unified position across chains without bridges.

Team Pitch

Open roles (post‑grant / investor‑funded):
  • DeFi Protocol Engineer - lending protocol, risk, liquidation engine
  • Security Engineer - auditor background, cross‑chain vectors
  • DevOps / Infra Engineer - large‑scale blockchain infra
  • Community / Marketing & Growth

Team Hiring Timeline

  • Seed grant phase: executed by current core contributors; additional hires deferred to investor-funded stage.
  • Post-grant: begin full hiring once PoC validated; target 1 month from investor close for all roles.

Month-1 Barebones Demo

Objective

Deliver a minimal but real end-to-end demo that exercises Ika 2PC-MPC with Sui orchestration to prove feasibility and momentum within ~4 weeks.

Non-goals

  • Production-grade risk engine or liquidations automation
  • Multi-chain integrations beyond BTC testnet and Sui testnet
  • Full UI polish (CLI + minimal web page is sufficient)

Scope & Demo Deliverables

  • Ika integration
    • Start localnet Ika stack
    • Create borrower and lender dWallets via TypeScript scripts
    • Obtain limited, time-bound DWalletCaps for: deposit BTC collateral; disburse USDC loan;
  • Sui Move minimal protocol (MVP)
    • Events for audit trail: DepositRequested, DepositConfirmed, LoanDisbursed, RepayConfirmed
  • Presign + Verify flows
    • Pre-sign BTC deposit and USDC disbursement envelopes with on-chain guardrails (scope + expiry + price check)
    • Verify envelopes in Sui before emitting requests to relayer
  • Sui: Envelopes include validUntil (time/epoch) and a nonce; Move verifies these before the protocol uses its DWalletCap.
  • Solana: Transactions must reference a recent blockhash and lastValidBlockHeight (~2 min TTL). Presigned Solana paths must broadcast within this window (or use nonce accounts if needed).
  • EVM: No native expiry; include a deadline in calldata/EIP‑712 and check it in-contract. We still gate signing on Sui by validUntil.
  • Bitcoin: No native expiry; we rely on Sui validUntil and immediate broadcast. Optional script-level constraints (CSV/CLTV) are possible but add complexity.
Note: The protocol holds the DWalletCap and never shares it with users, relayers, or keepers; per‑chain TTLs just add defense‑in‑depth.
  • Relayer (barebones)
    • Accepts signed envelopes for BTC deposit and broadcasts to Bitcoin testnet
    • Polls Bitcoin testnet and submits confirmation back to Sui via oracle runner
  • Oracle runner (minimal)
    • TX-confirmation feed for BTC deposit into Sui (block hash/txid inclusion)
  • CLI + thin demo web page
    • One-click (scripted) happy-path: create wallets → request deposit → confirm → disburse → repay
    • Record a 2–3 minute video demonstrating the sequence and invariants

Success Criteria (Month-1)

  • Happy-path run completes on camera and in logs with on-chain Sui events and BTC testnet txid
  • All Ika calls use zero-trust, pre-signed flows; no standing signing authority
  • Written demo guide + setup instructions committed to repo

Evidence to Share with Ika

  • Demo video + txids/objects links
  • Repo pointers: Move contracts, runners, CLI scripts
Grant award condition
Acceptance of the Proposal triggers the $100k award split into milestone deliverables; funds are dedicated to the barebones RFP deliverables. Desirable features beyond this scope proceed with investor funding.

Short technical note: capability scopes, expiry logic, and guardrails used.

Timeline (4 weeks)

  • Week 1: Ika + Environment
    • ika start local stack wired into repo; TS scripts to create borrower/lender dWallets
    • Define DWalletCap scopes and expiries for deposit/loan
  • Week 2: Sui MVP + Presign/Verify
    • Pre-sign deposit and disbursement envelopes; Sui-side verification logic
  • Week 3: Relayer + Oracle
    • Barebones relayer broadcasts BTC testnet deposit; oracle runner confirms inclusion to Sui
  • Week 4: End-to-End + Packaging
    • Wire repay path; run full demo; harden logs and error handling
    • Record video; prepare concise README for Ika review

Dependencies & Coordination

  • Ika: localnet 2PC-MPC presign/sign endpoints; assistance on capability scoping best practices
  • Sui: localnet accounts, faucet; minimal USDC test token (faucet or dev-mint for demo)

Risks & Mitigations

  • Ika API changes → Keep integration thin; schedule weekly sync; feature-flag endpoints
  • BTC testnet instability → Multi-node providers; retry/backoff; allow manual confirmation fallback for demo
  • Sui localnet USDC deployment → availability; dev-mint if needed
  • Cross-component timing/race issues → Use explicit state machine in Move; idempotent relayer submits; TTLs

Stretch (time-permitting)

  • Minimal Keeper to alert on health factor breaches (no auto-liquidation)

RFP Funding Request

$100,000 (flexible: $50k–$100k) Purpose: Seed grant to deliver a PoC/testnet MVP that validates Ika 2PC‑MPC integration and Sui orchestration. Larger audit, mainnet, and GTM costs are intended to be investor‑funded. Award trigger and use of proceeds: the $100k is payable upon acceptance of the Month-1 Barebones Demo and is earmarked to fund the barebones deliverables listed in documentation/RFP.md#deliverables. Desirable features beyond this barebones scope will be investor-funded thereafter.

RFP Scope and Deliverables (8-12 weeks)

  • End-to-end BTC→USDC borrowing and repay on Sui testnet v Ika 2PC‑MPC
  • Minimal Relayer, Keeper, and Oracle (Pyth) integration
  • Least‑privilege, time‑bound DWalletCaps; pre‑signed envelopes with on‑chain checks
  • Internal security review + threat model; incident runbook v0
  • Simple web UI + CLI runner; demo video and technical docs
  • Timeline: raw demo within 1 month (show initiative); polished deliverables 8–12 weeks
  • Outputs: testnet demo, docs, and investor materials for next funding stage

RFP Milestones, Roadmap & Budget

This section defines the short, grant-scoped execution plan tied to the $100k award and the Month-1 Barebones Demo.

Barebones Demo (Weeks 1–4)

  • Scope (barebones subset of Deliverables):
    • Minimal Sui MVP contracts enforcing zero-trust lending logic with events
    • dWallet integration via Ika 2PC-MPC: presign/sign for deposit, disburse, repay
    • Minimal Oracle + Relayer runners (BTC testnet tx confirmation; price guardrail via Pyth or static fallback)
    • CLI + minimal UI for happy-path demo; demo video + repo pointers
  • Budget $40,000
    • Development $24k - Sui MVP contracts; presign/verify flows; CLI + minimal UI; Ika wiring
    • DevOps $6k - localnet stacks; CI; logging/metrics for demo
    • Design $2k - minimal UI scaffolding for demo clarity
    • Security $3k - internal review of capability scope/expiry, invariant checks
    • Contingency $5k - BTC testnet instability, Ika API changes, retries/backoff

Testnet MVP (Weeks 5–8)

  • Harden presign/verify logic, error handling, and observability
  • Internal security review + initial threat model; incident runbook v0
  • Testnet deployment using BTC testnet collateral and Sui testnet USDC
  • Documentation: setup + demo guide
  • Budget $45,000
    • Development $22k - harden flows; error handling; observability; testnet deployment
    • DevOps $6k - environments, monitors/alerts, testnet infra costs
    • Design $5k - testnet UX clarity and demo polish
    • Security $5k - initial threat model, incident runbook v0
    • Contingency $7k - coordination with oracles/relayer; network variance

Optional (Weeks 9–12)

  • Replace static price guardrails with live Pyth in all checks
  • Minimal Keeper alerting (no auto-liquidation) time-permitting
  • Light UI polish for demo clarity
  • Budget $15,000
    • Development $4k - Pyth integration in all checks; small keeper alerting; minor UI polish
    • DevOps $3k - monitoring/metrics expansion; load tuning
    • Design $3k - final pass on demo clarity
    • Security $2k - additional hardening/tasks from threat model
    • Contingency $3k - buffer or revert to prior phases if unused

Budget Roll-up

  • Development: 24 + 22 + 4 = $50k
  • DevOps: 6 + 6 + 3 = $15k
  • Design: 2 + 5 + 3 = $10k
  • Security: 3 + 5 + 2 = $10k
  • Contingency: 5 + 7 + 3 = $15k
  • Total: $100k

GTM (first 8 weeks)

  • Weeks 1–4: Stand up channels (X, Discord, Telegram); publish technical explainers and demo threads; engage dev relations.
  • Weeks 5–8: Targeted outreach to whales/MMs; LBP/presale mechanics; fee rebates; contribution‑based airdrops for high‑signal participation.

RFP Budget

  • Total: $100,000

Development

$50,000

DevOps & Infrastructure

$15,000

Design & UX

$10,000

Security (internal)

$10,000

Contingency / Ika support / misc

$15,000
Notes
  • The $100k funds the barebones RFP deliverables above; desirable features proceed with investor funding thereafter.

Post-RFP Roadmap and Projected Budget

Post‑RFP planning disclaimer: The roadmap, GTM, and budgets below are directional and subject to change as we complete research, hiring, audits, and partner diligence. Treat this as a starting point for future planning, not a commitment.

Security Posture

Trust Model & Capability Flow

  • No standing signing authority is ever granted. The protocol holds the least‑privilege, time‑bound DWalletCap for each position; it is never shared with users, relayers, or keepers.
  • All sensitive actions are executed only by the protocol using its capability, after on‑chain checks: position state, price guardrails, and capability constraints (scope + TTL + nonce).
  • Failure modes are bounded: delays only degrade liveness; safety is preserved by expiries/rotation and invariant checks before any signing.
  • No external party ever receives a capability; actions are constrained by on‑chain checks and protocol‑held, non‑transferable capabilities.

Borrow & Lend sequence

Liquidation sequence (simplified)

Architecture Snapshot

  • No standing signing authority; all capabilities are least‑privilege, time‑bound, and validated on use.
  • Critical actions gated by oracles, position state, and cap TTL/scope; replay attempts are rejected or idempotent.
  • Safety over liveness: on failures or delays, positions do not execute unsafe actions; capabilities expire and are recalled.
There are no shared liquidity pools; each loan is a bilateral P2P contract. The protocol coordinates checks and signs using a protocol‑held DWalletCap; it never shares that capability with users, relayers, or keepers.

Parallel Liquidation Simulation (testnet)

  • Goal: Demonstrate concurrent processing of N liquidation checks without race conditions.
  • Setup: Testnet positions with varying health factors; controlled oracle deviation; relayer and keeper runners.
  • Success:
    • ≥95% of eligible liquidations finalized within target window; 0 safety violations; all on‑chain invariants (scope, TTL, nonce, price bounds) hold.
    • Deterministic idempotency for duplicate envelopes; no double‑liquidations.
  • Metrics: per‑chain inclusion latency; Sui verification guard time; relayer broadcast success; retries/error distribution.
  • Artifacts: replayable dataset, on‑chain events/logs, public dashboard snapshot, written report.

Threat Model (excerpt)

  • Malicious relayer/front‑running: Neutralized by pre‑signed envelopes plus on‑chain DWalletCap checks (scope, TTL, nonce). Any deviation invalidates execution. Relaying is permissionless; censorship is mitigated by anyone‑can‑relay design.

Assumptions & Dependencies

  • Ika 2PC‑MPC: availability of presign/sign APIs and support during M1–M2.
  • Oracles: Pyth coverage for BTC/ETH/SOL and stablecoins on target networks;
  • Testnet/mainnet stability: Sui testnet reliability for M1; Ethereum/Solana testnets for M2.
  • Audit scheduling: internal review by end of M1; external vendors reserved for M3; formal verification scope agreed.
  • Compliance counsel available during M1 for architecture reviews and during M3 for launch readiness.
  • Threat modeling: cross-chain attack surface, oracle dependencies, 2PC-MPC trust assumptions documented
  • Secure SDLC: code reviews, property tests, fuzzing, invariants and simulation of failure modes
  • Audits: internal review (M1); external audits (SlowMist/OtterSec) and formal verification of core safety-critical contracts (M3)
  • Bug bounty: public program opens prior to production (pre-M4)
  • Secrets and key material: no custodial control; user shares remain private; runners receive least-privilege, time-bound capabilities only
  • Incident response: runbooks, on-chain pausability for critical conditions, post-incident reviews

Data-backed assumptions (selected)

  • BTC collateral utilization ~45% (consistent with MakerDAO-style ratios and BIS ranges of 120–150% collateralization)
  • Liquidation stress reference: ~$325M liquidations in 24h during the 2022 downturn (used for stress testing and fee modeling)

Risk Analysis & Mitigation Strategy

Risk Matrix

Regulatory Engagement Plan (P2P)

  • Frameworks to monitor: FinCEN/BSA + Travel Rule (US), MiCA (EU), PSA (SG); local VASP/MSB definitions by deployment.
  • P2P stance: Counterparty‑driven KYC/KYB; small, crypto‑only bilateral loans can be non‑KYC where permitted by law.
  • Technical approach: Attestation‑based KYC (pass/fail) via Nautilus TEEs on Sui; Seal for encrypted data access; no PII on‑chain.
  • Supervised access: Establish legal pathway for regulators to subpoena underlying PII from the KYC provider if legally compelled.
  • Travel Rule readiness: Exchange beneficiary info when interacting with VASPs/fiat rails above thresholds; log audit events on Sui.
  • Geo‑controls: Block restricted jurisdictions; per‑deployment policy toggles; threshold‑based enforcement (amounts, roles, assets).
  • Documentation: Position paper on non‑custodial P2P marketplace operator scope and control boundaries; counsel review pre‑M3.

Interim Owner Assignments (until hiring completes)

  • CEO → Lead Architect (interim)
  • CFO → Lead Architect (interim) with external accounting support
  • HR Manager → Talent Acquisition lead
  • Product Manager → Frontend/UX Lead with Lead Architect support
  • Legal Team, Compliance Officer → external partners until in-house roles are filled

Key Performance Indicators (KPIs) & Success Metrics

Public dashboard (testnet→mainnet): collateralization ratios, liquidations, inclusion times, fees, and health factor distributions. URL TBD; publish raw datasets and methodology monthly.

Overall Project Success Metrics

Milestone-Specific KPIs

Continuous Monitoring KPIs

Technical Health

  • System Uptime: 99.9% target (measured hourly)
  • Response Time: <2 seconds API response (measured continuously)
  • Error Rate: <0.1% transaction failures (measured daily)

Security Metrics

  • Vulnerability Response: <24 hours for critical issues
  • Incident Resolution: <4 hours for system issues
  • Security Score: Maintain A+ rating on security dashboards

Business Metrics

  • User Growth: 20% month-over-month growth
  • TVL Growth: 15% month-over-month growth
  • Revenue Growth: 25% month-over-month growth

Community Metrics

  • Community Engagement: 70%+ active community members
  • Developer Adoption: 50+ developers building on protocol
  • Partnership Growth: 5+ strategic partnerships per quarter

Success Measurement Framework

Data Collection

  • Automated Monitoring: Real-time dashboards for technical metrics

Revenue Scenarios (Illustrative)

  • Assumptions (Base): $10M TVL at launch; 45% utilization; avg loan duration 60 days; origination fee 0.2%; protocol interest share 5% of interest; 0.05% execution fee on liquidations (2% annualized liquidation volume).
  • Conservative: $5M TVL, 30% utilization → ~$30–45K annualized gross fees.
  • Base: $10M TVL, 45% utilization → ~$120–180K annualized gross fees.
  • Aggressive: $25M TVL, 55% utilization → ~$400–600K annualized gross fees.
  • Notes: Fees exclude enterprise SLAs/APIs; BTC/EVM/SOL relay costs modeled in infra budget; unit economics improve with automation.
  • Manual Reviews: Weekly team assessments and milestone reviews
  • External Validation: Monthly third-party performance audits

Reporting Schedule

  • Daily: Technical health and security metrics
  • Weekly: Progress against milestone KPIs
  • Monthly: Comprehensive performance review
  • Quarterly: Strategic goal assessment and adjustment

Escalation Procedures

  • Yellow Alert: KPI falls below success threshold
  • Red Alert: KPI falls below acceptable threshold
  • Emergency Protocol: Critical system or security issues

Risk-Adjusted Success Criteria

Minimum Viable Success

If facing significant challenges, minimum acceptable outcomes:
  • Technical: 2+ chains operational with basic lending
  • Security: 0 critical vulnerabilities, external audit passed
  • Market: $2M+ TVL with 200+ active users
  • Financial: Project completed within 120% of budget

Stretch Goals

If execution exceeds expectations:
  • Technical: 5+ chains with advanced features
  • Security: Formal verification of 100% contracts
  • Market: $25M+ TVL with 2500+ active users
  • Financial: Project completed under budget with surplus

Other Funding & Long-Term Vision

Post‑RFP planning disclaimer: The long‑term vision and funding plan are provisional and will evolve with findings from RFP execution, market feedback, and regulatory guidance.
  • Funding Plan:
    • Post‑RFP we plan a Series A of $12–18M within 3–6 months of achieving testnet KPIs (BTC–USDC live, audit readiness).
    • Optional bridge ($3–5M SAFE) contingent on traction to accelerate integrations.
    • Non‑dilutive: pursue ecosystem grants/partnerships (e.g., Sui, oracle providers, cross-chain protocols) for infra and research.
  • Use of Proceeds (Series A):
    • Engineering (protocol, cross‑chain integrations, security): ~45–55%
    • Infrastructure/DevOps & Observability: ~10–15%
    • Security (audits, formal verification, bug bounty): ~10–15%
    • Compliance/Legal & Enterprise BD: ~10–15%

P2P Fee Touchpoints (summary)

  • Origination (borrower): 10–30 bps of draw; tiered by loan size/risk.
  • Execution (liquidation): relayer execution fee reimbursed from penalty; protocol share aligns incentives.
  • Optional enterprise: SLAs for private relayer, premium analytics/APIs.
    • Working capital & runway buffer: ~10%
  • Monetization Model:
    • Protocol fees: 0.1–0.3% loan origination; small share of interest; execution fee on pre‑signed liquidation relays.
    • Enterprise: private relayer SLAs, premium analytics/APIs, support tiers.
    • Open‑core + proprietary: smart contracts/runners OSS; Frontend and Backend remain closed‑source with commercial licensing.

Fee Model & Flows

Components and Defaults

  • Origination fee: 0.20% of draw (range 0.10–0.30%)
  • Reserve factor: 10% of interest to reserves (60% Insurance, 40% Treasury)
  • Liquidation penalty: 7% of repaid debt at liquidation (50% Insurance, 30% Relayer, 20% Treasury)
  • Relayer execution fee: USDC‑denominated reimbursement priced from on‑chain gas with safety multiplier 1.15× and per‑action caps (chain‑specific)
  • Deposit/withdraw/early‑repay: 0

Who pays and when

  • Borrower on draw: pays origination fee immediately; receives net draw or mints slightly more debt for net‑parity
  • During operation: only interest; reserve factor skimmed to reserves
  • On liquidation: borrower pays penalty; relayer reimbursed out of penalty; Insurance covers shortfalls, excess split per schedule

Accounting and denomination

  • Fees and reserves denominated in the debt asset on Sui (e.g., USDC)
  • Cross‑chain gas paid by relayer in native asset; reimbursed in USDC using oracle FX at execution with safety multiplier and caps
  • Insurance Fund maintains targets for shortfall coverage; governance can tune parameters within bounds

Borrow fee flow (simplified)

Liquidation fee flow (simplified)

Parameterization

  • Governed per market/chain: f_orig, reserve_factor, penalty, splits, exec fee base/variable/markup, safety multiplier, caps, insurance targets
  • Change policy: governance‑controlled with bounded ranges and notice periods; emergency changes subject to on‑chain pause/rollback procedures
  • Events: BorrowFee, InterestReserveAccrued, LiquidationPenalty, RelayerExecReimbursed, InsuranceTopUp
  • Go‑to‑Market (GTM):
    • Phase 1 (Crypto‑native): BTC collateral <-> stablecoin loans; incentives via fee rebates; targeted market makers.
    • Phase 2 (Protocol integrations): SDKs for wallets/DeFi protocols, co‑marketing with partners.
    • Phase 3 (Institutional): SLAs, compliance modules, custody integrations.
  • Long‑Term Vision (24–36 months):
    • 20+ assets across 8+ chains; portfolio‑level collateral (entire dWallets), privacy‑preserving compliance (e.g., ZK‑KYC attestations).
    • Progressive decentralization of governance and operations; community‑driven risk frameworks.
  • Traction Targets:
    • Year 1: $100M TVL across 4 chains; 10k MAU; $1.5–3.0M annualized fee run‑rate.
    • Year 2: $250M TVL; 25k MAU; $5–8M ARR; enterprise contracts signed.
    • Year 3: $1B TVL; institutional adoption; sustainable positive unit economics.
  • Token & Governance:
    • No token until PMF and audit‑ready status; then governance token to decentralize parameters/treasury.
    • Compliance‑first design; potential fee‑share and stewardship mechanisms subject to legal review.
  • Future Deliverables:
    • SDKs and integration guides (public), threat model & formal verification reports, operational runbooks (relayer/keeper/IR), governance & community documentation, enterprise integration playbooks.

Will your project be open source?

Sui Contracts

Apache-2.0

Oracle Runner

MIT

Keeper Runner

MIT

Relayer Runner

MIT

Frontend UI

Closed source

Backend API

Closed source

Documentation

CC BY 4.0
Subject to final alignment with client and partners.

FAQ

Glossary

References