Seeker

Request proofs from the Fermah network.

Introduction

Seeker Overview

Testnet Access

Testnet access is currently permissioned. Please follow the onboarding steps below to get started with Fermah's proof generation network.

For Seekers

Seekers are participants who submit workflow-based proof requests to the Fermah network. Our universal proof generation layer enables you to generate proofs for any supported system through a unified, developer-friendly interface.

Installation

Set up your environment and install the Fermah Seek CLI.

Workflows

Learn how to create and execute proof generation workflows.

Security

Understand security best practices and considerations.

Support

Get help from our community and support team.

System Requirements

Base Configuration

  • JSON-RPC compatible client
  • 2GB RAM minimum
  • 10GB storage for proof data

Architecture Overview

Identity and Authentication

Seekers are authenticated using ECDSA key pairs:

  • Public keys serve as requester addresses
  • Private keys sign proof requests
  • Keys must be whitelisted

Network Interaction

Network Endpoints

Proof Requests are submitted via JSON-RPC to:

  • Testnet: https://Testnet.fermah.xyz:8080
  • Mainnet: https://mainnet.fermah.xyz:8080

Getting Started

  1. Install Fermah Seek CLI

  2. Set Up Authentication

    • Generate your ECDSA keypair using key management
    • Submit your public key for whitelisting
    • Store your private key securely
  3. Configure Your Environment

  4. Submit Your First Proof

Workflow-Based Proof Generation

Workflow Examples

# Compile your workflow
fermah-cli workflow compile <workflow-path>

# Submit workflow
fermah-cli workflow submit <workflow-id>

# Monitor status
fermah-cli workflow status <request-id>

Creating Your Workflow

  • Start with our provided workflow templates
  • Customize the template configuration based on your needs
  • Compile your workflow into WASM using the CLI

Workflow Execution

  1. Submit your compiled workflow to Fermah Core
  2. Core validates and stores your workflow
  3. Trigger execution through the CLI
  4. Monitor status and retrieve results

Advanced Features

Universal Proof System Support

Fermah supports multiple proof systems through a unified interface, allowing you to generate proofs for any supported system without changing your workflow structure.

Confidential Proof Delegation (Optional)

For sensitive computations, you can enable Confidential Proof Delegation which:

  • Protects input data using secure multi-party computation (MPC)
  • Splits input data across multiple MPC servers
  • Ensures data privacy during proof generation
  • Maintains information-theoretic security below compromise threshold

Resource Allocation

The system automatically:

  • Matches your proof request with appropriate Prover Nodes
  • Optimizes for cost and performance
  • Ensures fair pricing through dynamic matchmaking

Common Use Cases

ZK Rollups

Generate validity proofs for Layer 2 rollups and scaling solutions.

Privacy Solutions

Create zero-knowledge proofs for private transactions and data.

Identity Systems

Build verifiable credential systems with proof generation.

Gaming & NFTs

Implement verifiable randomness and ownership proofs.

Network Status

  • Testnet: Active (Permissioned)
  • Testnet: Coming Soon
  • Mainnet: In Development

Security Considerations

  • Keep private keys secure
  • Validate proof results
  • Monitor request status
  • Follow rate limiting guidelines

Support

For technical support:

  • Join our Discord
  • Email: support@fermah.xyz

Troubleshooting

Common issues and their solutions:

Connection Issues

If you're having trouble connecting to the network:

  1. Check your network endpoint configuration
  2. Verify your key is properly whitelisted
  3. Ensure your system meets minimum requirements

Proof Generation Failures

If proof generation fails:

  1. Verify your workflow configuration
  2. Check resource requirements
  3. Review the status codes

For detailed workflow specifications, compilation instructions, and gas estimation, see our Workflow Guide.