Only this pageAll pages
Powered by GitBook
1 of 39

Landslide

Loading...

Product Guides

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Integrations

Loading...

Loading...

Loading...

Loading...

FAQ

Loading...

Loading...

Overview

Loading...

Loading...

Loading...

Fundamentals

Loading...

Roadmap

Loading...

How to connect Cosmostation

Cosmostation Wallet

Download and install Cosmostation Wallet as a browser extension

  • Create Wallet:

  • Save the mnemonic phrase afterward. To store this password, we recommend using , as they're the most secure password management solution.

  • Verify your seed phrase

  • Reconnect to Cosmostation extension and enter a password

  • Navigate to "Add Custom Chain" > "Add a custom Cosmos chain."

  • Once the chain is added, return to the wallet and select the new chain:

Dashlane

Security Audit

Description of the Oak Security audit for Slide SDK

Slide SDK was audited by Oak Security, you can read the audit here.

Higher than v0.50

Integrating the Avalanche Light-Client Module in Your Cosmos SDK Application

Enhance your Cosmos SDK application by integrating the light-clients/14-avalanche module. Follow this step-by-step guide to easily import and register the Avalanche light-client in your project.

1. Import the Avalanche Light-Client Module

First, ensure you import the Avalanche (ava) module into your Cosmos SDK application. Typically, this is done in the ibc.go file, where your application's modules are defined.

2. Register the Avalanche Module in the Module Manager

Next, add the ava module to your application’s ModuleManager. Locate the section where you initialize the ModuleManager and include the Avalanche light-client:

3. Add module to the RegisterIBC function

Finally, register the Avalanche module in the RegisterIBC function of your application. This function is typically found in the ibc.go file.


By following these steps, you'll successfully integrate the Avalanche light-client module into your Cosmos SDK application, enabling enhanced interoperability with Avalanche-based chains.

Conect your wallet to a local network

Cosmostation Wallet

Download and install Cosmostation Wallet as a browser extension

  • Create Wallet:

  • Save mnemonic phrase afterward

  • Verify your seed phrase

  • Reconnect to Cosmostation extension and enter a password

  • Navigate to "Add Custom Chain" > "Add a custom Cosmos chain". Once the chain is added, return to the wallet and select the new chain:

Case Study: Osmosis

Explaining the Osmosis integration

Cosmoswap

Here is a quick overview of how works on the Osmosis decentralized exchange:

Cosmoswap leverages Osmosis's pooled liquidity infrastructure to enable customizable "outposts" - IBC-connected DEX deployments on other chains.

For example, Landslide functions as a Cosmoswap outpost on Avalanche. Landslide, built with the Cosmos SDK, handles the Avalanche-side transactions and liquidity routing.

Osmosis manages the core liquidity pools and validation logic. Landslide contains router contracts directing trades to Osmosis over IBC.

IBC Connection

Overview

For a detailed overview, please refer to the

The below diagram depicts the interaction between two Cosmos SDK-based chains, Osmosis and Landslide, through the IBC protocol. The IBC Relayer acts as a mediator between the two chains.

When a message transfer is initiated by Chain A (Osmosis), it generates a packet commitment (hash) and stores it in the KV store by key (port, channel, sequence). Then it emits a packet event and the IBC Relayer handles this event. The IBC Relayer queries for the packet commitment proof from Chain A (Osmosis), which is then returned by Chain A (Osmosis). The IBC Relayer creates a message to relay the packet to Chain B (Landslide).

After receiving the message, Chain B (Landslide) sends back a WriteAck result to the IBC Relayer. The IBC Relayer then queries for the acknowledgement proof from Chain B (Landslide), which is then returned by Chain B (Landslide). The IBC Relayer creates an acknowledgement message containing the packet, acknowledgement, and proofs, which is then sent to Chain A (Osmosis).

Run Landslide on Testnet

How to Run Landslide on a Testnet

License

License terms

Slide SDK is launched under a

The license limits use of the v0.1 source code in a commercial or production setting until April 1st, 2027. After this, the license will convert to a general public license. This means anyone can fork the code for their own use — as long as it is kept open source.

The Gaia Labs Labs team will create documents that outline the forking process here.

How to connect Metamask
  • How to get tokens from Faucet

  • How to deploy CosmWasm contract

  • How to connect wallet to testnet
    How to connect Cosmostation
    How to connect Keplr
    Business Source License 1.1 (BUSL 1.1).
    import (
      // other imports...
      ava "github.com/cosmos/ibc-go/v8/modules/light-clients/14-avalanche"
    )
    app.ModuleManager = module.NewManager(
      // other modules...
      ava.AppModuleBasic{},
    )
    func RegisterIBC(registry cdctypes.InterfaceRegistry) map[string]appmodule.AppModule {
    	modules := map[string]appmodule.AppModule{
            // other modules... 
            ava.ModuleName: ava.AppModuleBasic{},
        }
    ...
    }
    This allows users on Avalanche to tap into swaps powered by Osmosis's deep liquidity pools in a decentralized manner. Avalanche validators handle trades while Osmosis validators govern pool actions.

    Cosmoswap outposts like Landslide go beyond basic bridges. They create customizable DEX environments tuned to each chain's needs while benefiting from Osmosis's back-end infrastructure.

    Active transaction listening via WebSockets provides rich insights into swap status and performance. This enhances user experience with timely notifications.

    Overall, Cosmoswap unlocks new horizons for multi-chain decentralization by deploying adaptable outposts that harness Osmosis's liquidity. This delivers on the vision of fluid interoperability across heterogeneous networks.

    Cross Chain Validation

    When utilizing Cosmoswap's outpost architecture, transaction validation occurs across both chains:

    • Trades executed on the Landslide outpost on Avalanche are validated by Avalanche validators, not Osmosis validators.

    • However, the IBC packet transfers enabling asset flows between Osmosis and Landslide are validated on both sides:

      • Osmosis validators validate escrowing, transferring, and releasing assets on the Osmosis chain side.

      • Avalanche validators validate unwrapping assets and confirming token releases on Landslide.

    • The core liquidity pools reside on Osmosis. Osmosis validators govern deposit and withdrawal transactions for these pools.

    • Landslide contains router contracts that direct trades to the Osmosis pools while handling the user-facing Avalanche side.

    • This separation of duties retains security while maximizing performance. Osmosis secures the central pools while Avalanche validators handle end-user trades.

    In summary, Osmosis validators secure core pool liquidity and IBC transactions while Avalanche/Landslide validators govern swap execution and finality on the user front-end. This hybrid validation approach powers decentralized cross-chain swaps.

    Cosmoswap

    A more detailed view

    official documentation.

    Landslide

    An overview of the Landslide Network

    Landslide tip: This product is currently being developed! If you report issues, we will note them and include you in our incentivized testnet.

    Overview

    Landslide brings seamless interchain connectivity between Avalanche and the interchain ecosystem through IBC.

    Landslide is a game-changing IBC connection to Avalanche, enabling seamless interoperability between Avalanche, Cosmos, and other IBC-enabled chains. It ushers in a new era of cross-chain DeFi operations, scalability, and streamlined user experience by enabling any CosmWasm-based dapp to run natively on the Avalanche network. Through Landslide, we're fostering a more interconnected, robust blockchain ecosystem, enhancing liquidity, diversifying applications and assets, and attracting a broader user base to web3.

    An Inter-Blockchain Communication (IBC) bridge to Avalanche represents a significant development in the blockchain space, offering various benefits.

    Firstly, the IBC protocol allows for seamless interoperability between different blockchains. In the context of Avalanche, an IBC bridge means that Avalanche can securely and efficiently interact with Cosmos and any other IBC-enabled chains ( being the most recent), facilitating asset and data transfer between these networks. This opens up a new world of possibilities, such as cross-chain DeFi operations, where a user on one network can utilize financial products on another network, enhancing overall accessibility and utility.

    Secondly, this expansion of IBC to Avalanche, a non-Cosmos chain, is a crucial step towards a more interconnected and interoperable blockchain ecosystem. As more non-Cosmos chains adopt IBC, the possibilities for cross-chain interactions expand exponentially. This broadening network effect can lead to higher liquidity, increased diversity of applications and assets, and enhanced robustness of the ecosystem as a whole.

    Thirdly, Avalanche has gained a lot of traction due to its high throughput and low fees. By building a bridge to Avalanche, Cosmos-based dApps can leverage these advantages, offering their users a better experience.

    Finally, from a user perspective, this means that users can access more diverse dApps and services without needing to manage multiple wallets or navigate different networks. This streamlines the user experience, potentially attracting more users to the blockchain ecosystem.

    The Landslide Network is a new Avalanche Subnet that enables any CosmWasm-based dapp to run natively on the Avalanche network. This means that dApps previously restricted to other networks like Osmosis, WYND, and Helix can now be accessed by a new pool of users on Avalanche. This document aims to provide an overview of the Landslide Network, its goals, and features.

    Goals

    The Landslide Network aims to address some of the challenges existing blockchain networks face, such as slow transaction finality, scalability issues, and limited interoperability. The following are the main goals of the Landslide Network:

    1. Connect natively to IBC: The Landslide Network enables native transfers of all IBC-connected tokens, allowing for seamless asset transfers between the Landslide Network and other IBC-enabled chains.

    2. Decrease transaction finality: The Landslide Network aims to reduce the finality time of transactions on Tendermint from 7-22 seconds to under 1 second, making it one of the fastest networks in the blockchain ecosystem.

    3. Take advantage of trading opportunities: With faster finality times, the Landslide Network can take advantage of trading opportunities that arise in fast-paced environments, making it an attractive platform for high-frequency traders.

    Landslide is building a Cosmos IBC enabled subnet for Avalanche. This will allow Native IBC integration within the @avalancheavax ecosystem. What does this mean for?

    1. Under 1 second finality for bridged/forked assets into the Landslide L1.

    2. Compatibility between assets of any built with Tendermint/ Cosmos SDK assets. ( , , , )

    3. Aggregated liquidity

    —

    Quick links

    Get Started

    We've put together some helpful guides for you to get setup with our product quickly and easily.

    API endpoints

    🔌 Landslide Network Testnet Endpoints

    The following endpoints are available for connecting to the Landslide Network testnet:

    RPC Endpoint

    The RPC (Remote Procedure Call) endpoint allows for direct interaction with the blockchain through JSON-RPC calls. Use this for submitting transactions, querying chain state, and other blockchain interactions.

    What is CometBFT?

    Some background on Tendermint

    CometBFT Explained

    CometBFT consensus is a Byzantine fault-tolerant consensus algorithm used in distributed systems, particularly in blockchain networks. It is used in various blockchain projects, including Cosmos, Binance Chain, and Injective.

    In CometBFT consensus, formerly called Tendermint, nodes in the network reach an agreement on the order and content of transactions in the blockchain. The consensus algorithm ensures that all nodes agree on the current state of the blockchain, and that new transactions are added in a consistent and secure manner.

    CometBFT consensus works by using a round-based voting process. Each round has a leader node that proposes a block of transactions to the network. The other nodes in the network then vote on whether to accept the proposed block. If enough nodes vote to accept the block, it is added to the blockchain.

    CometBFT consensus uses a deterministic finality mechanism, which means that once a block is added to the blockchain, it is considered final and cannot be changed. This makes CometBFT consensus highly secure, as it resists attacks that try to modify or manipulate the blockchain.

    However, the deterministic nature of CometBFT consensus can also make it slower than other consensus algorithms, as it requires every node in the network to confirm each transaction before it can be added to the blockchain. This can lead to longer confirmation times and slower transaction throughput than probabilistic consensus algorithms like Avalanche consensus. CometBFT consensus is a widely used consensus algorithm in blockchain networks that prioritizes security and determinism. However, its deterministic finality mechanism can make it slower than other consensus algorithms in certain circumstances.

    100% compatibility with Cosmos SDK: The Landslide Network is designed to be highly compatible with the native Cosmos-based SDK, enabling developers to easily port their existing dApps to the Landslide Network.

  • Collaboration between Avalanche, Cosmos, and other IBC-enabled chains: The Landslide Network aims to create closer collaboration between the three ecosystems of Avalanche, Cosmos, and other IBC-enabled chains, creating a stronger, more interconnected blockchain ecosystem.

  • Polkadot
    IBC-enabled
    @cosmos
    $OSMO
    $LUNA
    $RUNE
    $JUNO
    Emperor Osmo
    💡What is CometBFT?
    ✨Features
    🛠️Getting set up
    🔺Landslide & CometBFT
    ⚛️Connecting Existing Cosmos dApps to Avalanche

    Chain integrators guide

    • Lower than version 0.50

    • Higher than version 0.50

    Features

    Landslide Network features

    Features

    The Landslide Network offers several features that make it an attractive platform for developers and users alike. These include:

    1. High throughput and scalability: The Landslide Network is designed to handle high throughput and scalability, making it ideal for developing games, AMMs, and other dapps that require fast finality times.

    2. Native support for IBC: The Landslide Network natively supports IBC, enabling seamless transfer of assets between the Landslide Network and other IBC-enabled chains.

    3. Interoperability with Cosmos-based SDK: The Landslide Network is 100% compatible with the native Cosmos-based SDK, making it easy for developers to port their existing dApps to the Landslide Network.

    4. Airdrop tokens to Avalanche and Cosmos users: The Landslide Network will conduct an airdrop of tokens to users on Avalanche and Cosmos, providing an incentive for users to join the Landslide Network and participate in its ecosystem.

    gRPC Endpoint

    The gRPC endpoint provides high-performance, bi-directional streaming capabilities. Ideal for applications requiring efficient data streaming and complex service definitions.

    REST API Endpoint

    The REST API endpoint offers a RESTful interface for blockchain interactions. Perfect for web applications and clients that prefer standard HTTP methods.

    Usage Examples

    RPC Connection (JavaScript)

    REST API Query (cURL)

    gRPC Connection (Python)

    ⚠️ Note

    These endpoints are for the testnet environment and should not be used for production applications. Network performance and availability may vary as this is a test network.

    https://cometrpc.testnet.landslide.network
    https://grpc.testnet.landslide.network
    https://api.testnet.landslide.network
    const provider = new JsonRpcProvider("https://cometrpc.testnet.landslide.network");
    curl https://api.testnet.landslide.network/cosmos/bank/v1beta1/balances/{address}
    import grpc
    channel = grpc.insecure_channel('grpc.testnet.landslide.network:443')

    How to setup Slide SDK locally

    Slide SDK (currently known as LandslideVM, changing shortly) is a powerful toolkit for building and deploying CosmWasm applications on the Avalanche network.

    Dependencies

    1. Go Installation

    • Download and install Go version go1.22 or later from the

    • Go Version Compatability Note

      IMPORTANT: This project has been tested and confirmed to work with Go 1.22.7. If you encounter build issues, especially related to WebAssembly (WASM) compilation, please ensure you are using a compatible Go version.

      Recommended Go Version

    2. AvalancheGo Installation

    AvalancheGo is the official Go implementation of an Avalanche node. Follow these steps to install it:

    a. Clone repository:

    This command clones the Slide SDK repository and navigates into the newly created directory.

    b. Download and install AvalancheGo:

    Run the following command from inside the landslidevm repository to download AvalancheGo:

    This command:

    • Sets up environment variables for the installation paths.

    • Runs a script that downloads and installs a compatible version of AvalancheGo.

    • The installed AvalancheGo will be located in /tmp/e2e-test-landslide/avalanchego.

    Run a CosmWasm Application

    1. Build CosmWasm Plugin

    CosmWasm is a smart contracting platform built for the Cosmos ecosystem. We need to build a plugin to enable CosmWasm support in Avalanche.

    Run this command from the landslidevm directory:

    This script:

    • Compiles the CosmWasm plugin.

    • Places the compiled plugin in the AvalancheGo plugins directory.

    • The long string in the path is a unique identifier for the plugin.

    2. Run a Wasm L1

    Now we'll set up and run a Wasm L1 (Layer 1) on an Avalanche node using the Landslide Runner.

    This clones the Landslide Runner repository and navigates into it.

    a. Clone repository:

    b. Start the Avalanche node with Landslide L1:

    This command:

    • Builds and configures the Landslide L1.

    • Starts an Avalanche node with the Landslide L1 deployed.

    • You should see logs indicating that the node is running and syncing with the network.

    Expected Outputs

    When you run make run-wasm, you should expect to see output similar to the following:

    1. Network Creation:

      • The system will create a network with 5 nodes.

      • You'll see log entries for each node being added, with details like node name, directory, and ports.

    2. Health Check:

    Key Information to Note:

    • Subnet ID: e.g., "2c1CbR7FGYdeFPB4WaeWphHZrChLH7TQ92FRW6U4mCWTnaxVsB"

    • Blockchain-ID: e.g., "WKQC4prgnS66BYgQw8ZBdjgYtPhKaRmDEqB5iXKG55Wj13gHu"

    • RPC URLs: e.g., "http://127.0.0.1:9750/ext/bc/WKQC4prgnS66BYgQw8ZBdjgYtPhKaRmDEqB5iXKG55Wj13gHu/rpc"

    • gRPC URLs: e.g., "http://127.0.0.1:9090"

    If you see this output, your Landslide network is up and running successfully. You can interact with your network using the provided RPC and gRPC URLs. Remember that you can stop the network by pressing CTRL + C.

    Next Steps

    Congratulations! You now have a running Avalanche node with Landslide L1 and CosmWasm support. You can start developing and deploying CosmWasm smart contracts on this infrastructure.

    To interact with your node or deploy contracts, you'll need to use appropriate tools and APIs. Refer to the Avalanche and CosmWasm documentation for more information on interacting with the network and writing smart contracts.

    Troubleshooting

    If you encounter issues:

    • Ensure all dependencies are correctly installed, and versions are compatible.

    • Check that you have the necessary permissions to execute scripts and create directories.

    • Review console output for error messages.

    • Consult our FAQ or community forums for common issues and solutions.

    For further assistance, reach out to our support team or community channels.

    Run Landslide Locally

    This guide will walk you through setting up a local Landslide network, deploying CosmWasm contracts, and connecting your wallet to interact with the local network.

    • How to set up a network locally

      • Setting up your development environment

      • Starting a local Landslide network

      • Preparing your CosmWasm contract

      • Uploading and instantiating contracts on Landslide

      • Configuring your wallet for local development

      • Interacting with your deployed contracts

    Avalanche Warp Messaging

    Overview

    Landslide Core comes with built-in support for Avalanche Warp Messaging (AWM). AWM allows any Avalanche Subnet to quickly send arbitrary messages to another Subnet, without relying on a trusted relayer or bridge. This is made possible by utilizing the validators of the sending Subnet. The messages are delivered in just a few seconds, or even less. You can find more information about AWM and how it functions on this page.

    Lower than v0.50

    Integrating the Avalanche Light-Client Module in Your Cosmos SDK Application

    Enhance your Cosmos SDK application by integrating the light-clients/14-avalanche module. Follow this step-by-step guide to easily import and register the Avalanche light-client in your project.

    1. Import the Avalanche Light-Client Module

    First, ensure you import the Avalanche (ava) module into your Cosmos SDK application. Typically, this is done in the app.go file, where your application's modules are defined.

    2. Register the Avalanche Module in the Module Manager

    Next, add the ava module to your application’s ModuleManager. Locate the section where you initialize the ModuleManager and include the Avalanche light-client:


    By following these steps, you'll successfully integrate the Avalanche light-client module into your Cosmos SDK application, enabling enhanced interoperability with Avalanche-based chains.

    IBC Relayer AVAX L1 Proof

    How IBC gets the state proof from AVAX mainnet

    The sequence diagram describes an Inter-Blockchain Communication (IBC) relayer retrieving Avalanche L1 proof.

    The process involves multiple participants: the relayer, L1 Node 1 through Node N, and L1 Validator 1 through Validator N.

    The relayer first queries proof by key from L1 Node 1. Node 1 attempts to get the payload by key, and if the signature is already in its internal cache, it retrieves it. If the signature is not cached, it makes a call through the Virtual Machine (VM) context to Validator 1 to sign the payload. After Validator 1 returns the signature, Node 1 forwards it back to the relayer.

    A similar process occurs with L1 Node 2 and its corresponding Validator. However, in this case, it's noted that the signature is not cached and needs to be signed by the Validator through the VM context.

    The process repeats for all remaining nodes (represented as Node N) and their corresponding Validators (Validator N).

    After collecting all signatures from the different L1 Nodes, the relayer then composes these signatures from Node 1, up to Node N.

    Getting set up

    How to set up Landslide Core

    Installation

    1. Ensure that you have Go installed on your computer. You can download and install the latest version of Go from the official website at .

    IBC Go

    How IBC-go interacts with the Avalanche IBC light client

    See original

    The IBC-go library is a Go implementation of the IBC protocol and provides a set of interfaces and functions to handle the different components of the IBC protocol. To interact with the IBC light client for Avalanche, you can use the IBC-go library to implement the necessary functionality to receive and send packets over the IBC protocol.

    Here are the general steps for using IBC-go to interact with the IBC light client for Avalanche:

    1. Install and configure the IBC-go library. You can follow the installation instructions provided in the Github repository to set up the library and configure it for your specific use case.

    Roadmap

    A regularly updated roadmap.

    Completed
    Current Sprint
    Q4

    Landslide EVM

    A Primer on Landslide as it relates to Ethereum dApps.

    Bridging Ethereum apps to Avalanche

    This flowchart illustrates the interoperability of applications running on different blockchain networks - Cosmos, Polkadot, and Ethereum - through the use of Landslide technology on the Avalanche network.

    Starting from the left, we have three subgraphs representing the Cosmos, Polkadot, and Ethereum networks. Each network runs a specific application: Osmosis on Cosmos, DOT on Polkadot, and Synthetix on Ethereum.

    These applications interact with their respective IBC light clients. For Cosmos, it's the Landslide SDK IBC light client; for Polkadot, it's the ; and for Ethereum, it's the Landslide EVM IBC light client. These light clients are responsible for maintaining a connection and facilitating communication between the networks.

    All three light clients then connect to the IBC bridge, which serves as the main hub for transferring state between the source and target chains. The IBC bridge then connects to three more IBC light clients, which are responsible for transferring the source chain's state to the Avalanche network.

    Finally, the state is transferred to the Avalanche network, where it's run natively inside an Avalanche subnet. This is represented by three subgraphs under Avalanche: Landslide running Synthetix, Landslide2 running OSMO, and Landslide3 running DOT. The transition between these subgraphs is facilitated by Avalanche Warp Messaging, indicating the flow of transactions within the Avalanche network.

    ABCI Calls

    ABCI Calls

    The ABCI (Application Blockchain Interface) calls in the Landslide Core repository provide the interface for Cosmos-based dApps to interact with the Avalanche network. Developers can plug their existing Cosmos dApps into the Landslide Core by implementing the necessary ABCI calls. The repository includes example ABCI applications such as the KVStoreApplication and the PersistentKVStoreApplication, which can be used as placeholders for Cosmos SDK-based applications.

    How to Connect Existing Cosmos dApps to Avalanche

    To connect existing Cosmos dApps to Avalanche using the Landslide Core repository, developers need to implement the necessary ABCI calls in their application. This includes implementing the InitChain, BeginBlock, DeliverTx, CheckTx, and EndBlock ABCI calls, which enable the dApp to interact with the Avalanche network. Once the ABCI calls are implemented, the dApp can be compiled using the Landslide SDK and deployed to the Avalanche network.

    The ABCI calls in the Landslide Core repository provide the interface for Cosmos-based dApps to interact with the Avalanche network.

    • InitChain: This ABCI call is used to initialize the application state. It is called once when the application is first started or when a new chain is created. This is where the initial genesis state of the application is set.

    • BeginBlock: This ABCI call is called at the beginning of each block. It provides information about the current block and allows the application to update its state based on the contents of the block.

    • DeliverTx: This ABCI call is called when a new transaction is delivered to the application. It is used to validate the transaction and update the application state if the transaction is valid.

    • CheckTx: This ABCI call is called when a new transaction is received by the node. It is used to validate the transaction before it is included in a block.

    • EndBlock: This ABCI call is called at the end of each block. It provides information about the current block and allows the application to update its state based on the contents of the block.

    To connect an existing Cosmos dApp to Avalanche using Landslide Core, developers need to implement these ABCI calls in their application. This is done by creating a new ABCI application that implements the necessary functions for each of the ABCI calls. These functions will define how the application interacts with the Avalanche network.

    Once the ABCI application is implemented, it can be compiled using the Landslide SDK and deployed to the Avalanche network. The Landslide SDK is a fork of the Cosmos SDK that is 99% compatible with the existing Cosmos SDK, with the exception of the consensus algorithm. The Landslide SDK includes all the necessary libraries and modules needed to build and deploy the ABCI application to the Avalanche network.

    In summary, by implementing the necessary ABCI calls, developers can connect their existing Cosmos dApps to the Avalanche network using Landslide Core. This allows them to take advantage of the benefits of the Avalanche network, including faster finality times and IBC compatibility.

    How to deploy a CosmWasm contract
    Connect wallet to local network
    Create an instance of the IBC light client for Landslide. You can use the Landslide-specific implementation of the IBC light client to connect to the AVAX subnet and receive and send packets over the IBC protocol.
  • Implement the necessary functions to handle incoming packets from other chains. These functions should validate and verify the packets and then trigger the appropriate action within the Landslide network based on the contents of the packet.

  • Implement the necessary functions to send packets to other chains. These functions should prepare the packet data and send it through the IBC light client to the appropriate destination chain.

  • Set up the relayer to relay packets between different chains. The relayer is responsible for forwarding packets between different chains and ensuring that the packets are received in the correct order.

  • Here are some specific functions and interfaces in the IBC-go library that can be used to interact with the Avalanche IBC light client:

    • IBCClient: This interface defines the basic functionality for an IBC client, including sending and receiving packets, creating and updating connections, and handling events.

    • ConnState: This interface defines the possible states of a connection and provides functions for updating the connection state.

    • ChannelState: This interface defines the possible states of a channel and provides functions for updating the channel state.

    • Packet: This struct represents a packet of data that is sent over the IBC protocol. It contains information such as the source and destination chains, sequence number, and packet data.

    • IBCReceiver: This interface defines the necessary functions for handling incoming packets from other chains. These functions should validate and verify the packet and trigger the appropriate action within the Landslide network.

    • IBCSender: This interface defines the necessary functions for sending packets to other chains. These functions should prepare the packet data and send it through the IBC light client to the appropriate destination chain.

    By using these functions and interfaces from the IBC-go library, the Avalanche IBC light client for Landslide implements the necessary functionality to send and receive packets over the IBC protocol.

    documentation here.
    import (
      // other imports...
      ava "github.com/cosmos/ibc-go/v8/modules/light-clients/14-avalanche"
    )
    app.ModuleManager = module.NewManager(
      // other modules...
      ava.AppModuleBasic{},
    )
    Clone the LandslideCore repository to your local machine by running the following command:
  • Once you have cloned the repository, navigate to the root directory of the repository in your terminal.

  • Build the LandslideCore binary by running the following command:

    make build

    This will create the landslide binary in the build directory.

  • Optionally, you can install the LandslideCore binary system-wide by running the following command:

    make install

    This will copy the landslide binary to /usr/local/bin, making it accessible from anywhere on your system.

  • If you encounter any issues during the installation process, please refer to the documentation or open an issue on the LandslideCore repository for assistance.

    https://golang.org/dl/
    git clone https://github.com/ConsiderItDone/LandslideCore.git
    Go 1.22.7

    Known Issues

    • Versions of Go 1.23 and above may encounter WASM compilation errors, particularly with certain dependencies.

    Troubleshooting Steps

    If you encounter build issues:

    1. Check your current Go version:

    2. If you're not using Go 1.22.7, consider downgrading:

      • On macOS with Homebrew:

      • Add to your PATH:

    3. After changing Go versions:

      • Clean your Go module cache:

      • Update your modules:

    4. Retry your build process.

    Additional Notes

    • If you need to manage multiple Go versions across different projects, consider using a Go version manager like gvm.

    • Always refer to the project's go.mod file for the most up-to-date Go version and dependency requirements.

    If you continue to experience issues after following these steps, please contact the development team or open an issue in the project repository.

    The system will wait for all nodes to report as healthy.

  • Subnet Creation:

    • A new subnet will be created (you'll see a subnet ID).

    • The nodes will be added as subnet validators.

  • Blockchain Creation:

    • A new blockchain for Landslide (referred to as "landslidevm") will be created.

    • You'll see a blockchain ID generated.

  • Node Restart:

    • The nodes will be restarted to track the new subnet.

  • Plugin Reload:

    • The system will reload plugin binaries.

  • Custom Chain Creation:

    • The Landslide blockchain will be created on the subnet.

  • Health Check for Custom Chains:

    • The system will wait for the custom chain (Landslide) to report as healthy on all nodes.

    • You'll see log entries checking for log files on each node.

  • Final Setup:

    • The system will register blockchain aliases.

    • A final health check will be performed.

  • RPC URLs:

    • The system will output RPC and gRPC URLs for each node. These are crucial for interacting with your Landslide network.

  • Network Running:

    • You'll see a message: "Network will run until you CTRL + C to exit..."

  • official Go website
    .
    Slide SDK
    landslide-runner

    Cosmoswap/Osmosis integration

    Run local private Avalanche network

    Andromeda Integration

    Slide SDK

    IBC Light Client testnet

    Osmosis testnet

    Avalanche VM

    IBC Light Client audit

    Archway testnet

    API

    This flowchart demonstrates how disparate applications on Cosmos, Polkadot, and Ethereum can be run natively inside an Avalanche subnet, as long as state is transferred safely between IBC light clients running on the source and target chain and transitioned through the IBC bridge.

    Landslide IBC EVM Bridge
    Composable DOT IBC light client

    What is Avalanche Consensus?

    Some background on Snow and Avalanche Consensus. Watch this video for a full explanation.

    Avalanche Consensus

    Watch this video for a full explanation with animations.

    Landslide replaced Tendermint consensus with Avalanche consensus and runs on an Avalanche subnet. Landslide enables users to:

    • run the Tendermint ABCI on an Avalanche subnet

    • run any Cosmos-based dApp on an Avalanche subnet

    • send assets and message across IBC to/from Avalanche to any other IBC-enabled blockchain

    Overview

    Avalanche consensus is a novel consensus algorithm designed for distributed ledger technology that aims to achieve high throughput, low latency, and high scalability. It is unique in that it uses a new consensus paradigm called the Avalanche family of protocols, which rely on a new approach to network sampling, voting, and confirmation.

    In Avalanche consensus, nodes can propose transactions and vote on them. Unlike traditional consensus algorithms like Proof of Work or Proof of Stake, in which nodes vote on a single block, in Avalanche consensus, nodes vote on multiple transactions at the same time. This allows Avalanche to achieve high throughput, as it can process multiple transactions in parallel.

    The Avalanche family of protocols is also designed to handle network partitions gracefully. In traditional consensus algorithms, a network partition can cause forks in the blockchain, which can be difficult to resolve. In Avalanche, network partitions are resolved automatically by having nodes vote on transactions independently in each partition. When the network partitions are resolved, the protocol ensures that only one transaction is accepted for each transaction ID.

    Avalanche consensus is also able to achieve low latency, as transactions can be confirmed within seconds of being proposed. This is achieved through a process called sub-sampling, in which nodes sample only a small portion of the network to determine whether a transaction is valid. If a transaction is deemed valid by this small group of nodes, it is then broadcast to the rest of the network for confirmation. This allows for fast confirmation times while still maintaining the security of the system.

    Sub sampling

    In Avalanche consensus, the network subsampling algorithm is designed to be meta-stable, which means that it is able to maintain consensus even in the presence of temporary failures or inconsistencies in the network. This is important because it allows the protocol to continue to operate correctly even if a small subset of nodes fail or behave maliciously.

    The network subsampling algorithm in Avalanche works by randomly selecting a subset of nodes from the network to participate in a transaction vote. Each selected node then votes on the transaction, and if enough nodes vote in favor of the transaction, it is considered confirmed and added to the blockchain.

    In order for the network subsampling algorithm to be meta-stable, it is designed to be resilient to a variety of network failures and inconsistencies. For example, if a node fails to respond to a vote request, the algorithm is designed to select a replacement node to vote in its place. Similarly, if there are inconsistencies in the votes received from the selected nodes, the algorithm is designed to use a fallback mechanism to resolve the inconsistency and ensure consensus.

    The meta-stability of the network subsampling algorithm is important because it ensures that the consensus protocol can continue to operate correctly even in the face of temporary network failures or inconsistencies. This makes Avalanche consensus more robust and reliable than traditional consensus algorithms, which may be vulnerable to these types of failures.

    Overall, the meta-stability of the network subsampling algorithm is a key feature of Avalanche consensus that helps to ensure the security and reliability of the protocol.

    Faster Finality

    Time to finality is faster on Avalanche consensus compared to Tendermint consensus due to the probabilistic nature of the Avalanche consensus algorithm. In probabilistic consensus, transactions are not required to be confirmed by every node in the network, but rather by a statistically significant subset of nodes. This allows transactions to be confirmed more quickly, as they do not have to wait for every node in the network to confirm them.

    In contrast, Tendermint consensus is a deterministic consensus algorithm in which every node in the network must confirm each transaction before it can be added to the blockchain. This can lead to longer confirmation times, as the confirmation process can be bottlenecked by slow or faulty nodes.

    The probabilistic nature of Avalanche consensus allows it to achieve faster time to finality by using a process called sub-sampling. In this process, a small subset of nodes is selected to confirm each transaction, and if the transaction is confirmed by this subset, it is then broadcast to the rest of the network for confirmation. This allows transactions to be confirmed much more quickly than in deterministic consensus algorithms like Tendermint.

    Additionally, the sub-sampling process in Avalanche consensus is designed to be meta-stable, which means that it is able to maintain consensus even in the presence of temporary failures or inconsistencies in the network. This further improves the speed and efficiency of the confirmation process.

    Overall, the probabilistic nature of Avalanche consensus, combined with its sub-sampling process and meta-stability, allows it to achieve faster time to finality than deterministic consensus algorithms like Tendermint.

    Video overview

    Got 2 minutes? Check out a video overview of Dr. Emin Gün Sirer explaining Avalanche consensus:

    Interchain Staking

    How Landslide accepts ATOM in addition to AVAX for validators.

    *Please Note: this is a working document and is intended to change over time.

    Background

    Original Source where Sunny from Osmosis and Emin Gün Sirer from Ava Labs discuss this proposal.

    1. Integration of Cross-Chain Validation (CCV) from Cosmos through IBC:

    This will involve understanding the CCV protocol in depth and implementing it within the Landslide Network. This will allow the network to borrow security from more established chains, thus increasing the cost of attacking the network.

    Here is a detailed for the Cross-Chain Validation (CCV) protocol in the Cosmos Inter-Blockchain Communication (IBC) ecosystem. Here's a summary of the key concepts and operations:

    1. Security Model:

    The CCV protocol is designed for chains that use a proof of stake mechanism. It relies on validators who bond (lock, stake) tokens to validate blocks. The amount of tokens bonded determines a validator's voting power. Misbehaving validators can be punished by slashing their bonded tokens. The security of consumer chains is based on the tokens validators bonded on the provider chain.

    1. Motivation:

    CCV is a building block that enables shared security models. It allows chains to borrow security from more established chains, thus increasing the cost of attacking their networks. It also enables hub minimalism, keeping a hub in the Cosmos network as simple as possible to decrease the attack surface.

    1. Definition:

    The document introduces new terms such as Provider Chain (the blockchain that provides security), Consumer Chain (the blockchain that consumes security), and Validator Set Change (VSC - a change in the validator set of the provider chain that must be reflected in the validator sets of the consumer chains).

    1. Channel Initialization:

    The CCV protocol differentiates between chains that start directly as consumer chains and existing chains that transition to consumer chains. In both cases, consumer chains are created through governance proposals.

    1. Validator Set Update:

    This operation updates the validator sets of all the consumer chains based on the information obtained from the provider chain. It also enables the timely completion of unbonding operations.

    1. Consumer Initiated Slashing:

    (this will not be implemented on AVAX)

    This operation enables the provider chain to slash and jail bonded validators that misbehave while validating on the consumer chain.

    1. Reward Distribution:

    This operation enables the distribution of block production rewards and transaction fees from the consumer chains to the validators on the provider chain.

    2. Customization of Avalanche Subnets:

    Currently, the subnets are a subset of the current p-chain validator list. This can be changed as long as the new validators are renting the required minimum AVAX amount from other providers in the network. The customization of subnets will allow for greater flexibility and control over the network's operations.

    3. Collaboration with GoGoPool:

    is reducing the 2000 AVAX requirement via a liquidity bootstrapping method, essentially AVAX lending plus staking 100 AVAX worth of GoGoPool tokens (GGP). Collaborating with GoGoPool can provide a way to lower the barrier to entry for new validators, thus increasing the security and decentralization of the network.

    4. Integration of Interchain Security on Cosmos:

    This will look a lot like interchain security on Cosmos. This will involve implementing the security model of Cosmos within the Landslide Network, allowing for shared security models and increased network security.

    5. Creation of a Subnet that Uses ATOM in Addition to Staking AVAX:

    This will involve creating a subnet that is also a zone that uses ATOM in addition to staking AVAX. This will allow for the integration of IBC and Warp together, providing greater flexibility and control over the network's operations.

    This roadmap is ambitious and requires a deep understanding of blockchain technology, particularly the Cosmos IBC and Avalanche's infrastructure. However, it is a feasible plan that could greatly enhance the security and functionality of the Landslide Network.

    Connecting Existing Cosmos dApps to Avalanche

    READ THIS: While you can connect any Cosmos-dApp, it will NOT communicate over IBC until the Landslide AVAX Light Client is released in 3-5 months. Stay tuned.

    Overview

    By implementing the necessary ABCI calls, developers can connect their existing Cosmos dApps to the Avalanche network using Landslide Core. This allows them to take advantage of the benefits of the Avalanche network, including faster finality times and IBC compatibility.

    go version
    brew install [email protected]
    brew unlink go
    brew link [email protected]
    echo 'export PATH="/usr/local/opt/[email protected]/bin:$PATH"' >> ~/.zshrc
    source ~/.zshrc
    git clone https://github.com/LandslideNetwork/landslidevm.git && cd landslidevm
    BASEDIR=/tmp/e2e-test-landslide AVALANCHEGO_BUILD_PATH=/tmp/e2e-test-landslide/avalanchego ./scripts/install_avalanchego_release.sh
    ./scripts/build_wasm.sh /tmp/e2e-test-landslide/avalanchego/plugins/pjSL9ksard4YE96omaiTkGL5H6XX2W5VEo3ZgWC9S2P6gzs9A
    cd .. && git clone https://github.com/ConsiderItDone/landslide-runner.git && cd landslide-runner
    make run-wasm
    specification
    GoGoPool
    Landslide EVM

    Benefits

    One of the most significant advantages that Avalanche brings to the table is faster finality times. The Avalanche consensus protocol enables blazing fast transaction confirmations, typically in the range of sub-second to a few seconds. This is a substantial improvement compared to native Tendermint, where users often have to wait 3-8 seconds to achieve transaction finality.

    For Cosmos dApps, faster finality times translate into a multitude of benefits:

    1. Improved user experience: Users can execute trades swiftly and enjoy seamless interaction with Avalanche. This will not only attract more users but also encourage existing ones to engage more frequently, ultimately driving up our user retention and growth.

    2. Increased liquidity: With faster finality times, Landslide can process more transactions per second, leading to higher trading volumes. This increased liquidity will help create a more robust market and improve price discovery, benefitting all Cosmos users.

    3. Reduced risk of liquidations: Faster finality times minimize the risk of cascading liquidations due to market volatility, as users can adjust their positions more promptly. This will help protect our users' assets and boost their confidence in our platform.

    4. Enhanced arbitrage opportunities: Quicker transaction times enable efficient cross-chain arbitrage, allowing traders to take advantage of price discrepancies across different platforms. This will attract sophisticated traders and lead to a more mature ecosystem.

    Deploying an outpost on Avalanche is a strategic move that can greatly benefit any Cosmos dApp by capitalizing on the faster finality times. This will not only improve the user experience but also contribute to the overall growth and success of Cosmos.

    Sharing Liquidity: Outposts

    A Landslide outpost: The term "outpost" refers to a specialized deployment of the existing CosmWasm software stack, such as White Whale, on another blockchain network. The purpose of establishing an outpost is to use the already existing software stack and just change the consensus algorithm to expand the dApp's reach, functionality, and interoperability by tapping into the unique features and advantages of the target blockchain network.

    Avalanche Warp Messaging (AWM) allows any Avalanche Subnet to quickly send arbitrary messages to another Subnet, without relying on a trusted relayer or bridge. This is made possible by utilizing the validators of the sending Subnet. The messages are delivered in just a few seconds, or even less. AWM enables liquidity sharing between subnets and the P-chain.

    Problem: If a Cosmos dApp like White Whale wants to deploy on Avalanche, it is currently impossible because it cannot deploy its software stack it can only wrap its tokens and send them over a bridge like Axelar.

    Solution: White Whale has to deploy its software stack onto Landslide, just like it would to native Cosmos. Here are the steps for that to take place:

    1. IBC Integration: White Whale will first integrate the IBC protocol into its existing CosmWasm software stack on the native Cosmos network. IBC enables communication between heterogeneous blockchain networks, allowing users to securely and efficiently transfer assets and data between IBC-enabled chains. (This is usually completed for most Cosmos chains.)

    2. Landslide SDK and Landslide Core Integration: To facilitate seamless communication between White Whale's CosmWasm stack and Avalanche, White Whale has to integrate the Landslide SDK and Landslide Core into their software stack, just as if they are re-deploying their app stack to a Cosmos chain. These components will serve as a White Whale outpost, its stack operating on a different consensus algorithm.

    3. IBC Connection Establishment: Once the IBC integration and Landslide SDK and Core integration are complete, White Whale will establish a secure IBC connection between the native Cosmos network and Avalanche. This connection will allow for the transfer of assets and data between the two networks, enabling White Whale to operate on both platforms.

    4. CosmWasm Contract Deployment on Avalanche: With the IBC connection established and Landslide SDK and Core in place, White Whale will deploy its CosmWasm contracts on Landslide. These contracts will interact with the Landslide SDK and Core to ensure smooth communication and interoperability between White Whale's services on both Cosmos and Avalanche.

    5. Testing and Auditing: Before launching the White Whale outpost on Avalanche, White Whale will conduct rigorous testing and auditing to ensure the security and reliability of the newly deployed CosmWasm contracts and the Landslide SDK and Core. This process will help identify and address any potential vulnerabilities or issues that may arise during the deployment.

    6. Launch and User Onboarding: Once testing and auditing are complete, White Whale will officially launch its outpost on Avalanche. This will involve marketing campaigns, user education, and support to ensure that our existing and new users can easily navigate and take advantage of the new outpost and its benefits.

    Case Study: Osmosis

    This diagram shows the process of transferring packets between Osmosis and Landslide using the IBC protocol.

    1. First, Osmosis creates the packet data and sends it to the IBC module.

    2. The IBC module sends the packet to the relayer.

    3. The relayer relays the packet to the destination chain, which in this case is Landslide on the AVAX subnet.

    4. Landslide receives the packet and sends an acknowledgement back to the IBC module.

    5. The IBC module sends the acknowledgement to the relayer.

    6. The relayer relays the acknowledgement back to the source chain, which is Osmosis.

    7. Osmosis receives the acknowledgement from the IBC module.

    go clean -modcache
    go mod tidy

    Relayer Operator Guide

    Relayer

    In IBC, blockchains do not directly pass messages to each other over the network. This is where relayer comes in. A relayer process monitors for updates on opens paths between sets of IBC enabled chains. The relayer submits these updates in the form of specific message types to the counterparty chain. Clients are then used to track and verify the consensus state. In addition to relaying packets, this relayer can open paths across chains, thus creating clients, connections and channels. Additional information on how IBC works can be found .

    Table Of Contents


    Basic Usage - Relaying Packets Across Chains

    The -h (help) flag tailing any rly command will be your best friend. USE THIS IN YOUR RELAYING JOURNEY.


    1. Clone, checkout and install the latest release (). needs to be installed and a proper Go environment needs to be configured

    2. Initialize the relayer's configuration directory/file.

      Default config file location: ~/.relayer/config/config.yaml By default, transactions will be relayed with a memo of rly(VERSION) e.g. rly(v2.5.2). To customize the memo for all relaying, use the --memo flag when initializing the configuration.


    How to deploy a CosmWasm contract

    After setting up your Landslide local network, follow these steps to deploy and interact with smart contracts.

    Important Note on Terminal Usage

    Before proceeding, it's crucial to understand the correct setup:

    1. Keep your original terminal window running the Landslide network (make run-wasm command) open and active. This terminal maintains your local network.

    2. Open a new terminal window to execute the following commands. This separation allows you to interact with the network without interrupting its operation.

    This two-terminal approach provides several benefits:

    • Keeps the network running uninterrupted

    • Allows easy reference to network logs while executing commands

    • Prevents accidental network stoppage

    • Facilitates easier troubleshooting

    Now, in your new terminal window, proceed with the following steps:

    1. Build and Install Wasmd

    is the CLI tool for interacting with CosmWasm contracts.

    a. Clone the Wasmd repository:

    b. Checkout the most stable version (replace v0.53.0 if needed):

    c. Install Wasmd:

    d. Verify the installation:

    or

    2. Import Private Key

    When running a local testnet, as opposed to connecting to a live testnet or mainnet, you need to use a pre-configured account that has been allocated tokens in the genesis state. This differs from a live network, where you would typically create a new account and obtain tokens through a faucet or a transfer.

    In a local testnet environment:

    • The network is initialized with a set of pre-defined accounts.

    • These accounts are already funded with tokens in the genesis block.

    • One of these accounts is designated for testing and development purposes.

    To interact with the network, you'll need to import this specific testnet private key:

    When prompted, enter the following bip39 mnemonic (seed phrase):

    This mnemonic corresponds to a pre-funded account in your local testnet. By importing this key, you're gaining access to an account that already has tokens, allowing you to perform transactions, deploy contracts, and interact with the network without acquiring tokens first.

    Important Notes:

    • This specific key should only be used for local testing purposes.

    • Never use this key on a public testnet or mainnet, as the private key is publicly known.

    • In a production environment, you would generate your own secure keys and properly manage them.

    Understanding this process helps clarify the difference between working with a local testnet and interacting with a live network, where account creation and token acquisition would be handled differently.

    3. Deploy Smart Contract

    Now, you're ready to deploy a smart contract to your Landslide network.

    a. Upload an example contract (in this case, hackatom.wasm):

    Important:

    • Replace [REPLACE_WITH_YOUR_RPC_URL] with the RPC URL provided in your Landslide network output. This is visible in the first terminal where you started your Landslide node. It should look something like http://127.0.0.1:9750/ext/bc/....

    • At this point, you'll be prompted to confirm the transaction. Review the details carefully and enter 'y' to confirm and proceed with signing and broadcasting, or 'N' to cancel the transaction.

    After executing the command to upload the smart contract, you should see an output similar to this:

    Great! Your smart contract has been successfully uploaded to the Landslide network. Here's what you need to know:

    1. The code: 0 indicates that the transaction was successful.

    2. The most important piece of information is the txhash. Yours will look different, but in this case, it's: F15A7FB824FA83D58E556224FE2D5BD59A4FC7FB8E50400D5B0649E78D873D53

    Next Steps: You'll need this transaction hash for the next step, which is to fetch the code_id of your uploaded contract. The code_id is crucial for future interactions with your contract.

    Proceed to the next step in the documentation, where you'll query this transaction to get the code_id. Make sure to replace the placeholder transaction hash with the one you received in your output.

    If you encountered any errors or didn't receive a similar output, double-check that you've correctly replaced the RPC URL in the command and that your Landslide network is running properly.

    b. Fetch the code ID using the transaction hash from the previous output:

    After executing the command to query the transaction, you should see an output similar to this:

    Here's what to look for in this output:

    1. Check that the code field is 0, which indicates the transaction was successful.

    2. Look for the events array in the output. Find the event with "type": "store_code".

    3. Within the store_code event, there are attributes. Find the attribute with

    This code_id is crucial for future interactions with your contract, such as instantiation or execution. Make note of it for use in subsequent steps.

    6. Query Code ID Metadata

    After uploading your smart contract, you can retrieve its metadata using the code ID. Run the following command:

    Replace <CODE_ID> with the code ID you obtained in the previous step, and [REPLACE_WITH_YOUR_RPC_URL] with your Landslide network's RPC URL.

    Example output:

    This output provides important information about your uploaded smart contract:

    • code_id: Confirms the ID of your uploaded contract.

    • creator: The address that uploaded the contract.

    • data_hash: A unique hash of the contract's bytecode.

    This information is useful for verifying the contract's details and understanding its deployment permissions. The data_hash can be used to ensure the integrity of the uploaded contract.

    Next Steps

    With your contract deployed, you can now interact with it using Wasmd commands. Consider exploring:

    • Instantiating your contract

    • Querying contract state

    • Executing contract functions

    Remember to always use the correct node URL and chain ID in your commands, as provided by your Landslide network setup (visible in the first terminal).

    Troubleshooting

    • If commands fail, double-check your node URL and chain ID from the first terminal.

    • Ensure your private key has sufficient funds for gas fees.

    • Verify that your Landslide network is still running and healthy in the first terminal.

    For more advanced usage or specific contract interactions, refer to the CosmWasm documentation and your contract's specific interface.

    Run Landslide local network following

    "key": "code_id"
    .
  • The value associated with this code_id is the unique identifier assigned to your uploaded smart contract. In this example, the code_id is 1.

  • instantiate_permission: Indicates who can instantiate this contract. In this case, "Everybody" means anyone can create an instance of this contract.
    Wasmd
    the previous steps
    git clone https://github.com/CosmWasm/wasmd.git && cd wasmd
    git checkout v0.53.0
    make install
    wasmd version
    ~/go/bin/wasmd version
    ~/go/bin/wasmd keys add privatekey --recover
    tip yard art tape orchard universe angle flame wave gadget raven coyote crater ethics able evoke luxury predict leopard delay peanut embody blast soap
    ~/go/bin/wasmd tx wasm store "./x/wasm/keeper/testdata/hackatom.wasm" \
     --from privatekey \
     --gas=auto --gas-adjustment=1.15 \
     --node "REPLACE_WITH_YOUR_RPC_URL" \
     --chain-id=landslide-test
    Copycode: 0
    codespace: ""
    data: ""
    events: []
    gas_used: "0"
    gas_wanted: "0"
    height: "0"
    info: ""
    logs: []
    raw_log: ""
    timestamp: ""
    tx: null
    txhash: F15A7FB824FA83D58E556224FE2D5BD59A4FC7FB8E50400D5B0649E78D873D53
    ~/go/bin/wasmd q tx YOUR_TRANSACTION_HASH \
     --node "REPLACE_WITH_YOUR_RPC_URL" \
     -o json
    {
      "height": "2",
      "txhash": "F15A7FB824FA83D58E556224FE2D5BD59A4FC7FB8E50400D5B0649E78D873D53",
      "codespace": "",
      "code": 0,
      "data": "124E0A262F636F736D7761736D2E7761736D2E76312E4D736753746F7265436F6465526573706F6E73651224080112203F4CD47C39C57FE1733FB41ED176EEBD9D5C67BAF5DF8A1EEDA1455E758F8514",
      "raw_log": "",
      "logs": [],
      "info": "",
      "gas_wanted": "1463549",
      "gas_used": "1274349",
      "tx": {
        // ... (tx details)
      },
      "timestamp": "2024-09-06T12:13:32Z",
      "events": [
        // ... (other events)
        {
          "type": "store_code",
          "attributes": [
            {
              "key": "code_checksum",
              "value": "3f4cd47c39c57fe1733fb41ed176eebd9d5c67baf5df8a1eeda1455e758f8514",
              "index": true
            },
            {
              "key": "code_id",
              "value": "1",
              "index": true
            },
            {
              "key": "msg_index",
              "value": "0",
              "index": true
            }
          ]
        }
      ]
    }
    ~/go/bin/wasmd q wasm code-info 1 \
      --node "[REPLACE_WITH_YOUR_RPC_URL]" \
      -o json
    {
      "code_id": "1",
      "creator": "wasm1kng6sqkm0mjuh09cwz6u86f75lmeflj9h0fqhr",
      "data_hash": "3F4CD47C39C57FE1733FB41ED176EEBD9D5C67BAF5DF8A1EEDA1455E758F8514",
      "instantiate_permission": {
        "permission": "Everybody",
        "addresses": []
      }
    }
    Features
  • Relayer Terminology

  • Recommended Pruning Settings

  • Custom memos will have rly(VERSION) appended. For example, a memo of My custom memo running on relayer version v2.5.2 would result in a transaction memo of My custom memo | rly(v2.5.2). The --memo flag is also available for other rly commands also that involve sending transactions such as rly tx link and rly start. It can be passed there to override the config.yaml value if desired. To omit the memo entirely, including the default value of rly(VERSION), use - for the memo.
  • Configure the chains you want to relay between. In our example, we will configure the relayer to operate on the canonical path between the Cosmos Hub and Osmosis. The rly chains add command fetches chain meta-data from the chain-registry and adds it to your config file.

    Adding chains from the chain-registry randomly selects an RPC address from the registry entry. If you are running your own node, manually go into the config and adjust the rpc-addr setting.

    NOTE: rly chains add will check the liveliness of the available RPC endpoints for that chain in the chain-registry. It is possible that the command will fail if none of these RPC endpoints are available. In this case, you will want to manually add the chain config. To add the chain config files manually, example config files have been included here

    Slide config example

  • Import OR create new keys for the relayer to use when signing and relaying transactions.

    key-name is an identifier of your choosing. If you need to generate a new private key you can use the add subcommand.

    If you already have a private key and want to restore it from your mnemonic you can use the restore subcommand.

  • Use the key-name created above.

    This step is necessary if you chose a key-name other than "default"

  • Ensure the keys associated with the configured chains are funded.

    Your configured addresses will need to contain some of the respective native tokens for paying relayer fees.

    You can query the balance of each configured key by running:

  • Configure path meta-data in config file. We have the chain meta-data configured, now we need path meta-data. For more info on path terminology visit here.

    NOTE: Thinking of chains in the config as "source" and "destination" can be confusing. Be aware that most path are bi-directional.

    rly paths fetch will check for IBC path meta data from the chain-registry and add these paths to your config file.

    NOTE: Don't see the path metadata for paths you want to relay on? Please open a PR to add this metadata to the GitHub repo!

  • Configure the channel filter.

    By default, the relayer will relay packets over all channels on a given connection. Each path has a src-channel-filter which you can utilize to specify which channels you would like to relay on. The rule can be one of three values:

    • allowlist which tells the relayer to relay on ONLY the channels in channel-list

    • denylist which tells the relayer to relay on all channels BESIDES the channels in channel-list

    • empty value, which is the default setting, and tells the relayer to relay on all channels

    Since we are only worried about the canonical channel between the Cosmos Hub and Landslide our filter settings would look like the following. Example:

    Because two channels between chains are tightly coupled, there is no need to specify the dst channels. If you only know the "dst" channel-ID you can query the "src" channel-ID by running: rly q channel <dst_chain_name> <dst_channel_id> <port> | jq '.channel.counterparty.channel_id'

  • Finally, we start the relayer on the desired path. The relayer will periodically update the clients and listen for IBC messages to relay.

    When running multiple instances of rly start, you will need to use the --debug-addr flag and provide an address:port. You can also pass an empty string '' to turn off this feature or pass localhost:0 to randomly select a port.


    [TROUBLESHOOTING]

  • here
    Basic Usage - Relaying Across Chains
    Create Path Across Chains
    Advanced Usage
    Troubleshooting
    releases page
    Go
    Create Path Across Chains -->

    Building with Andromeda

    Slide SDK Documentation: Installing and Configuring Andromeda

    Prerequisites

    • Slide SDK and landslide-runner are already installed and set up.

    • You have obtained a Blockchain ID from the landslide-runner.

    Installing and Configuring Andromeda

    1. Deploy Andromeda to Local Network

    First, we need to deploy Andromeda to your local Landslide network:

    1. Navigate to the landslide-runner directory (installed earlier):

    2. Run the following command to deploy Andromeda:

      Replace <blockchain-ID> with the actual Blockchain ID you received from the landslide-runner.

      For example:

    3. Wait for the deployment process to complete. This may take a few minutes.

    Understanding Your Andromeda Deployment

    Let's break down what happened when you ran that ./andr.sh command.

    What the Command Does

    The ./andr.sh command sets up Andromeda on your local Landslide network. It deploys several smart contracts that make up the Andromeda system.

    What Happened

    The Good Stuff:

    • The script connected to your Landslide network successfully. Yay!

    • It deployed several important contracts:

      • Andromeda Kernel (the brain of the system)

      • VFS (Virtual File System, for managing data)

    What This Means for You

    1. Your Andromeda system is mostly set up. 🎉

    Next Steps

    1. Try using the Andromeda CLI to interact with your newly deployed contracts. This will help you confirm what's working.

    2. It might be helpful to check the current state of your network before running the deployment script. There could be existing contracts or transactions that are affecting the process.

    3. If you continue to encounter issues, it may be worth discussing with more experienced team members or consulting the Andromeda documentation for troubleshooting steps.

    Pro Tip

    As you work more with blockchain systems like Andromeda, you'll encounter various errors and edge cases. Each one is an opportunity to deepen your understanding of how these systems work under the hood.

    2. Install Andromeda CLI

    After deploying Andromeda to your local network, install the Andromeda CLI globally:

    3. Configure Andromeda CLI

    Now, configure the Andromeda CLI to connect to your local Landslide network:

    1. Create the configuration directory (if it doesn't exist):

    2. Create and open the configuration file in a text editor:

    3. Copy and paste the following JSON content into the file:

    4. Replace <BLOCKCHAIN_ID> in the chainUrl

    4. Verify the Installation and Configuration

    To verify that Andromeda is correctly installed and configured:

    1. Start the Andromeda CLI:

    2. In the CLI, switch to the Landslide network:

    3. If successful, you should now be connected to your local Landslide network.

    Andromeda CLI Output Explanation

    When you run the command chain use landslide-test in the Andromeda CLI, you should expect to see output similar to the following:

    Understanding the Output

    1. Successful Steps:

      • The CLI successfully loads the configurations.

      • It confirms that the config is loaded.

      • It attempts to connect to the client (your local Landslide network).

    What This Means

    • The configuration for your landslide-test network is correct and recognized by the CLI.

    • The CLI can connect to your local Landslide network.

    • Some expected contracts or data aren't available yet, which is normal at this stage.

    • You can proceed with the next steps in setting up your Andromeda environment.

    Next Steps

    After seeing this output, you can continue with the next steps in the setup process, such as adding a wallet or deploying contracts. The error message does not prevent you from proceeding with these tasks.

    If you encounter different errors or issues, please consult with your team lead or refer to the troubleshooting section of the Andromeda documentation.

    Adding a Wallet to Andromeda CLI

    After successfully connecting to the landslide-test network, the next step is to add a wallet. This wallet will be used for transactions and interactions with smart contracts on your local Landslide network.

    Adding a Wallet Using Recovery

    1. In the Andromeda CLI, enter the following command:

    2. You will be prompted to enter a password. Choose a secure password and remember it, as you'll need it for future interactions with this wallet.

    3. After entering the password, you'll be asked to input a mnemonic phrase. For this setup, use *this specific private key*, as we loaded it with testnet tokens. Enter this mnemonic:

    4. Enter the mnemonic phrase exactly as shown above when prompted.

    Expected Output

    After entering the mnemonic, you should see output similar to the following:

    Understanding the Output

    • The error message is similar to what you saw when connecting to the network. This is normal at this stage of the setup.

    • Despite the error, the wallet should be successfully added to your Andromeda CLI configuration.

    Verifying Wallet Addition

    To confirm that the wallet was added successfully:

    1. Exit the Andromeda CLI:

    2. Restart the Andromeda CLI:

    3. Once back in the CLI, you should see a prompt indicating you're using the test wallet:

    4. You can now switch to the landslide-test network again:

    Next Steps

    With your wallet set up, you're now ready to interact with your local Landslide network using the Andromeda CLI. The next steps typically involve deploying contracts or interacting with existing ones on your network.

    Remember, the mnemonic phrase is crucial for accessing your wallet. In a real-world scenario, you should never share your mnemonic phrase. This test mnemonic is for local development purposes only.

    If you encounter any issues during this process that differ from what's described here, please consult with your team lead or refer to the troubleshooting section of the Andromeda documentation.

    Basic Andromeda CLI Operations

    Now that you've set up Andromeda, here are some basic operations you can perform:

    1. Check Balance

    To check the balance of an address, follow these steps:

    1. In the Andromeda CLI, type the following command and hit Enter:

    2. You will be prompted to enter the denom (denomination) of the token. For our current setup, we are using "stake". So, type:

      and hit Enter.

    3. Next, you'll be prompted to enter the address. Use this address:

      and hit Enter.

    2. Transfer Funds

    To transfer funds to another address:

    Set Keys in Kernel

    You can set various keys in the kernel. Here are examples for economics, vfs, and adodb keys:

    Query Kernel

    To query the kernel for set keys:

    Interacting with Smart Contracts

    Get ADO Info

    To get information about a deployed contract:

    CW20 Token Operations

    Mint Tokens

    Transfer Tokens

    Check Token Balance

    VFS Operations

    To interact with the VFS (Virtual File System):

    Economics Operations

    To interact with the economics contract:

    CW20-Exchange Operations

    To check current sales on the CW20-Exchange:

    Conclusion

    This guide covers the basics of setting up and using the Slide SDK with Andromeda CLI. As you become more familiar with these operations, you'll be able to build more complex interactions and applications on the Landslide network.

    Remember to always refer to the most up-to-date documentation and seek help from more experienced developers when dealing with advanced topics or issues.

    IBC Light Client

    A short primer on IBC

    Here is a primer on the key aspects of the Inter-blockchain Communication (IBC) protocol:

    What is IBC?

    • Standard protocol for blockchain networks to communicate

    • Allows transfer of data and value between heterogeneous chains

    • Developed by Cosmos but blockchain agnostic

    Components

    • Light clients verify state proofs from other chains

    • Allow verifying transactions without running a full node

    • Establishes a verified link between two chain's clients

    • Enables creation of channels

    • Unidirectional data pipes between chains

    • Facilitate asynchronous, ordered packet passing

    • Forward packets between chains along opened channels

    • Can be nodes or external processes

    • Asset tracking maintains fungibility across zones

    • Escrow, transfer and mint/burn allows cross-chain atomicity

    Applications

    • Token transfers (liquidity, arbitrage)

    • Atomic swaps

    • Cross-chain smart contracts

    • Decentralized bridges

    Benefits

    • Interoperability between blockchain networks

    • Expanded liquidity and composability

    • Trust minimization between counterparties

    • Censorship resistance via decoupling

    What is IBC?

    protocol is a standard communication protocol that enables blockchain networks to interoperate with each other. It allows different blockchain networks to communicate and transfer value in a secure manner, creating a truly decentralized and interconnected ecosystem. For the Cosmos ecosystem, IBC is a critical component that enables Cosmos chains to connect and interact with each other, enabling new use cases and expanding the reach of the ecosystem. With IBC, Cosmos chains can seamlessly transfer assets, data, and logic across different chains, opening up new possibilities for decentralized applications and enabling greater network effects.

    Additionally, IBC is not limited to only Cosmos chains. With the emergence of multi-chain ecosystems such as Polkadot and Ethereum 2.0, the ability to communicate and transfer value between different chains will become increasingly important for users. IBC provides a standardized protocol for cross-chain communication, allowing for interoperability between chains regardless of their underlying technology or consensus mechanism. This opens up a wide range of possibilities for users, such as accessing decentralized applications and assets on different chains or taking advantage of unique features and capabilities of different ecosystems.

    Clients

    This shows:

    • Chains establish IBC connection handshake

    • Each chain sends header and commit proofs to the other

    • The receiving chain verifies the proof using the IBC client

    • This allows each chain to verify proofs from the other without running a full node

    So the IBC clients allow trustlessly verifying proofs and packet data to facilitate cross-chain interoperation without the overhead of running full nodes.

    Connection Handshake

    Explanation:

    • The connection handshake allows two chains to establish a secure, verified link between their respective IBC clients.

    • Chain A's client creates a connection handshake packet to start the process. This contains data like Chain A's client ID, desired connection version and parameters, proofs, and signatures.

    • Chain A relays this packet to Chain B via an IBC relayer.

    So the two-way handshake allows the clients to verify each other's proofs and signatures to establish trust required for further cross-chain interactions like creating channels.

    Channels

    Explanation:

    • IBC channels are unidirectional data pipelines allowing asynchronous cross-chain communication.

    • Chain A endpoint module sends an IBC data packet destined for Chain B.

    • Relayer picks up and forwards the packet to Chain B.

    • Chain B receives the packet on its endpoint module and processes it.

    So in summary, IBC channels provide ordered, unidirectional data flow between chains facilitated by relayers. This allows modular cross-chain communication.

    Relayers

    Explanation:

    • IBC relayers forward packets between blockchains along opened IBC channels.

    • Chain A sends an IBC packet destined to Chain B to a relayer.

    • The relayer stores the packet temporarily until it can be forwarded.

    • The relayer then forwards the packet to Chain B along the channel.

    So in summary, relayers provide the key role of forwarding IBC packets and acknowledgements between blockchains to facilitate cross-chain communication.

    Transferring Value

    Explanation:

    • IBC enables cross-chain atomic token transfers between chains.

    • On Chain A, the sender escrows tokens into the IBC module. This locks the tokens.

    • Chain A relays a packet to Chain B to transfer the escrowed tokens.

    • Chain B verifies the packet data then mints new tokens to the receiver.

    So IBC enables atomic cross-chain token transfers while tracking assets across zones to maintain fungibility.

    $ rly chains add cosmoshub slide
    $ rly chains add --url https://raw.githubusercontent.com/cosmos/relayer/main/docs/example-configs/cosmoshub-4.json cosmoshub
    global:
     api-listen-addr: :5183
     timeout: 10s
     memo: ""
     light-cache-size: 20
     log-level: ""
     ics20-memo-limit: 0
     max-receiver-size: 0
    chains:
     slide:
         type: avalanche
         value:
             rpc-addr: http://127.0.0.1:9650/ext/bc/2qdf414xEdWsmjSK1Q59Gautq6fERXbXm4jJnJkZ6MfFBB6PaH/rpc
             base-rpc-addr: http://127.0.0.1:9650
             subnet-id: 2c1CbR7FGYdeFPB4WaeWphHZrChLH7TQ92FRW6U4mCWTnaxVsB
             blockchain-id: 2qdf414xEdWsmjSK1Q59Gautq6fERXbXm4jJnJkZ6MfFBB6PaH
             chain-id: "slide"
             network-id: 1337
             timeout: 10s
             contract-address: 0x0300000000000000000000000000000000000002
             transferrer-address: 0x17aB05351fC94a1a67Bf3f56DdbB941aE6c63E25
             key-directory: ~.relayer/keys/avalanche-slide
             key: testkey
             keyring-backend: test
             extra-codecs: []
             min-loop-duration: 0s
    ibcgo:
         type: cosmos
         value:
             key-directory: ~/.relayer/keys/ibcgo
             key: testkey
             chain-id: ibcgo
             rpc-addr: http://localhost:26657
             account-prefix: cosmos
             keyring-backend: test
             dynamic-gas-price: false
             gas-adjustment: 1.5
             gas-prices: 0.025stake
             min-gas-amount: 0
             max-gas-amount: 0
             debug: true
             timeout: 10s
             block-timeout: ""
             output-format: json
             sign-mode: direct
             extra-codecs: []
             coin-type: null
             signing-algorithm: ""
             broadcast-mode: batch
             min-loop-duration: 0s
             extension-options: []
             feegrants: null
    paths:
     demo:
         src:
             chain-id: slide
         dst:
             chain-id: ibcgo
         src-channel-filter:
             rule: ""
             channel-list: []
     demo2:
         src:
             chain-id: ibcgo
         dst:
             chain-id: slide
         src-channel-filter:
             rule: ""
             channel-list: []
    $ rly keys add ibcgo [key-name]
    $ rly keys add slide [key-name]
    $ rly keys restore ibcgo [key-name] "mnemonic words here"
    $ rly keys restore slide [key-name] "mnemonic words here"
    $ rly keys use ibcgo [key-name]
    $ rly keys use slide [key-name]
    $ rly q balance ibcgo
    $ rly q balance slide
    $ rly paths fetch
    $ rly paths list
    $ rly start [path]
    # Optionally you can omit the `path` argument to start all configured paths
    $ rly start
    $ git clone https://github.com/ConsiderItDone/relayer.git
    $ cd relayer && git checkout main
    $ make install
    $ rly config init
    $ rly config init --memo "My custom memo"

    ADODB (Andromeda Digitial Object Database; another data management component)

  • CW20 (a token contract)

  • CW20 Exchange (for trading those tokens)

  • field with your actual Landslide blockchain ID (the same one used in step 1).
  • Save the file and exit the text editor (in nano, press Ctrl+X, then Y, then Enter).

  • Expected Error:

    • You will see an error message starting with "Error: Query failed with (6):..."

    • This error is expected and not a cause for concern at this stage of setup.

    • The error occurs because the CLI is trying to query certain contracts (like the kernel or VFS) that aren't fully set up yet on your local network.

  • Prompt Change:

    • Despite the error, you should notice that your prompt changes to test@landslide-test>.

    • This indicates that you have successfully switched to the landslide-test network.

  • You may see an error message after adding the wallet. This is expected and not a cause for concern.

    The CLI will display the balance of the specified address in the "stake" denomination.
    hubslide:
       src:
           chain-id: ibcgo
           client-id: 07-tendermint-259
           connection-id: connection-257
       dst:
           chain-id: slide
           client-id: 14-avalanche-1
           connection-id: connection-1
       src-channel-filter:
               rule: allowlist
               channel-list: [channel-141]
    cd path/to/landslide-runner
    ./andr.sh <blockchain-ID>
    ./andr.sh M5Rj4ySM3g3ZREBJDJgaRCQxbqQutF1MXcHcniZEVZRKm9TPG
    npm install -g @andromedaprotocol/cli
    mkdir -p ~/.andr-cli
    nano ~/.andr-cli/chainConfigs.json
    [
      {
        "chainName": "landslide",
        "chainId": "landslide-test",
        "chainUrl": "http://127.0.0.1:9754/ext/bc/<BLOCKCHAIN_ID>/rpc",
        "chainType": "testnet",
        "registryAddress": "",
        "addressPrefix": "wasm",
        "defaultFee": "0.5stake",
        "name": "landslide",
        "blockExplorerAddressPages": [],
        "blockExplorerTxPages": [],
        "kernelAddress": "wasm14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9s0phg4d"
      }
    ]
    andr
    chain use landslide
    ? test@landslide-test> chain use landslide-test
    - Loading configs...
    — Loading config...
    Config loaded!
    – Connecting client...Error: Query failed with (6): type: cosmwasm_std::addresses::Addr; key: [00, 10, 6B, 65, 72, 6E, 65, 6C, 5F, 61, 64, 64, 72, 65, 73, 73, 65, 73, 76, 66, 73] not found: query wasm contract failed: unknown request
    [... stack trace ...]
    wallet add test --recover
    tip yard art tape orchard universe angle flame wave gadget raven coyote crater ethics able evoke luxury predict leopard delay peanut embody blast soap
    ? Enter password for wallet test: ********
    ? Enter mnemonic: ****************************************************************************************
    Error: Query failed with (6): type: cosmwasm_std::addresses::Addr; key: [00, 10, 6B, 65, 72, 6E, 65, 6C, 5F, 61, 64, 64, 72, 65, 73, 73, 65, 73, 76, 66, 73] not found: query wasm contract failed: unknown request
    [... stack trace ...]
    exit
    andr
    ? test@<DISCONNECTED>>
    chain use landslide-test
    Copybank balance
    Copystake
    Copywasm1kng6sqkm0mjuh09cwz6u86f75lmeflj9h0fqhr
    transfer wasm1c4w4jxdkvj3ygdycdkjy98jve6w0d7257eqfx9 10stake
    kernel set-key economics wasm1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrqr5j2ht
    kernel set-key vfs wasm17p9rzwnnfxcjp32un9ug7yhhzgtkhvl9jfksztgw5uh69wac2pgsm0v070
    kernel set-key adodb wasm1ghd753shjuwexxywmgs4xz7x2q732vcnkm6h2pyv9s6ah3hylvrq8epk7w
    kernel query
    ado info wasm1eyfccmjm6732k7wp4p6gdjwhxjwsvje44j0hfx8nkgrm8fs7vqfsuw7sel
    execute wasm1eyfccmjm6732k7wp4p6gdjwhxjwsvje44j0hfx8nkgrm8fs7vqfsuw7sel '{"mint":{"recipient":"wasm1c4w4jxdkvj3ygdycdkjy98jve6w0d7257eqfx9","amount":"1000"}}'
    execute wasm1eyfccmjm6732k7wp4p6gdjwhxjwsvje44j0hfx8nkgrm8fs7vqfsuw7sel '{"transfer":{"recipient":"wasm1kng6sqkm0mjuh09cwz6u86f75lmeflj9h0fqhr","amount":"500"}}'
    query wasm1eyfccmjm6732k7wp4p6gdjwhxjwsvje44j0hfx8nkgrm8fs7vqfsuw7sel '{"balance":{"address":"wasm1c4w4jxdkvj3ygdycdkjy98jve6w0d7257eqfx9"}}'
    execute wasm17p9rzwnnfxcjp32un9ug7yhhzgtkhvl9jfksztgw5uh69wac2pgsm0v070 '{"get_possible_vfs_path":{"address":"wasm1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrqr5j2ht"}}'
    execute wasm1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrqr5j2ht '{"get_funds":{}}'
    query wasm1pvrwmjuusn9wh34j7y520g8gumuy9xtl3gvprlljfdpwju3x7ucsfg5rpz '{"sale":{"asset":{"cw20":"wasm1eyfccmjm6732k7wp4p6gdjwhxjwsvje44j0hfx8nkgrm8fs7vqfsuw7sel"}}}'

    Oracle interoperation

    When sending IBC packets, the destination chain can use its light client to verify packet proofs from the source chain

    Chain B's client verifies the handshake packet - the signatures match Chain A's client, the proof can be validated, and the parameters are acceptable.
  • Chain B stores details like Chain A's client ID and consensus state to retain connection information.

  • Chain B constructs its own handshake packet to respond to Chain A, containing symmetric proofs and details.

  • Chain B relays its handshake response packet back to Chain A.

  • Chain A verifies Chain B's handshake response, stores the connection info, and sends a confirmation to complete the handshake.

  • This establishes an authenticated, verified link between both clients.

  • Now the chains can construct channels over this connection to pass application data.

  • Chain B sends back an acknowledgement to Chain A to confirm receipt.

  • Relayer forwards this acknowledgement back to Chain A.

  • Chain A receives confirmation that the packet was processed on Chain B.

  • Channels have ordering guarantees so packets are processed in order.

  • Multiple channels can exist between chains for different applications.

  • Channels are separate data pipes allowing modular communication between chains.

  • Chain B sends back an acknowledgement that is picked up by the relayer.

  • The relayer completes the loop by relaying the acknowledgement back to Chain A.

  • Relayers can be blockchain nodes or external validator processes dedicated to packet relaying.

  • There can be multiple relayers to prevent single points of failure.

  • Chain B confirms successful minting back to Chain A.

  • Finally, Chain A releases the tokens from escrow by burning them.

  • The escrow mechanism ensures the tokens are not double-spent across zones.

  • Minting/burning allows transfer of fungible value while maintaining total supply.

  • Clients
    Connection Handshake
    Channels
    Relayers
    Transferring Value
    The Inter-Blockchain Communication (IBC)

    FAQ

    A learning resource 📕

    How are the validator sets authenticated?

    The validator sets in Avalanche are authenticated using a threshold of signatures from a randomly chosen subset of validators. A block is verified when two-thirds of these selected validators have signed it. To obtain a specific validator set and its associated proof for the C-Chain, the information stored in the block header, you can use the API provided in the official AVAX docs. The IBC integration between the Avalanche network and a different chain, like Cosmos, uses a Landslide VM that tracks validator set changes from the Avalanche P-chain.

    The VM is responsible for processing the incoming validator set changes from the Avalanche P-chain and updating the validator set of the connected subnet accordingly. This would enable the subnet to stay synchronized with the latest validator set of the Avalanche network and ensure secure and consistent transactions.

    Additionally, we include a client certificate or acceptance proof, such as a BLS signature, for the parent block in the child block. This ensures that the child block is only accepted if the parent block is accepted, creating a trust chain that maintains the transaction history's integrity.

    The overall idea is that chains use a VM on Landslide (CosmWasm, EVM, XCM) to connect the Avalanche network and a different chain, track the validator set changes, and ensure secure and consistent transactions between the two chains.

    How is a Cosmos dApp more decentralized on Avax than it is on native Cosmos?

    Check the docs. 🤯

    See the original Cosmos whitepaper . "Unlike Bitcoin or other proof-of-work blockchains, a Tendermint blockchain gets slower with more validators due to the increased communication complexity. Fortunately, we can support enough validators to make for a robust globally distributed blockchain with very fast transaction confirmation times, and, as bandwidth, storage, and parallel compute capacity increases, we will be able to support more validators in the future.

    On genesis day, the maximum number of validators will be set to 100, and this number will increase at a rate of 13% for 10 years, and settle at 300 validators."

    See the Avalanche whitepaper .

    "A core feature of the Snow family is its ability to scale without incurring fundamental tradeoffs. Snow protocols can scale to tens of thousands or millions of nodes, without delegation to subsets of validators. These protocols enjoy the best-in-class system decentralization, allowing every node to fully validate. First-hand continuous participation has deep implications for the security of the system. In almost every proof-of-stake protocol that attempts to scale to a large participant set, the typical mode of operation is to enable scaling by delegating validation to a subcommittee. Naturally, this implies that the security of the system is now precisely as high as the corruption cost of the subcommittee. Subcommittees are furthermore subject to cartel formation."

    How is it possible to migrate liquidity from a Cosmos dApp to Avalanche?

    Check out this guide which explains how Cosmos dApps deploy Landslide outposts to Avalanche. Each Cosmos dApp has to effectively deploy its entire software stack to the Avalanhe network via a subnet. Avalanche X and C chains do not allow for custom VMs; they can only be connected via subnet communication.

    1. A connection to a Cosmos dApp is only secured by IBC light client verification.

    If a Cosmos dApp is deployed to Landslide Network, does it have a more decentralized validator set?

    YES. 🤯

    There can be more decentralization of validators on Avalanche, as there is no hard cap on the number of validators as there is with Tendermint. , which can scale infinitely, and all of these validators can validate on the Landslide subnet. This means that an existing Cosmos zone can have an unlimited number of validators on the Landslide subnet, which can increase the decentralization of the network. The Avalanche consensus protocol is probabilistic, as described in the , operates differently from other consensus mechanisms like those used in Ethereum (Nakamoto) or Cosmos (Tendermint). Here are some key points that help answer your questions:

    1.) Uncapped Validator Set: Avalanche consensus operates through repeated sub-sampled voting. When a node is determining whether a transaction should be accepted, it asks a small, random subset of validator nodes for their preference. This process is repeated until the validators queried reply with the same answer for a sufficient number of consecutive rounds. This approach allows the validator set in Avalanche to expand infinitely, as the consensus process does not require communication with all validators, only a small, randomly chosen subset.

    Do all Rust contracts of a Cosmos dApp need to be redeployed onto the Landslide subnet in order to benefit from decreased time to finality and transactions per second?

    Yes, in order to take advantage of the higher transactions per second and faster finality provided by the Landslide network, the existing Rust contracts of a Cosmos dApp would need to be redeployed onto the Landslide subnet using the Landslide SDK.

    The is 100% compatible with the Cosmos SDK, with a few minor changes made to support Avalanche consensus and remove the Tendermint consensus and slashing modules. Therefore, the process of deploying contracts onto the Landslide network should be relatively straightforward for dApps that are already built using the Cosmos SDK.

    What happens if an Avalanche validator signs two different blocks at the same height?

    Currently, nothing happens. In Avalanche, block signing only occurs during the block proposal process, not during the validation process. Therefore, double-signing is not treated as an attack.

    Don't validators still have to sign a vote for the block during the consensus process?

    No, validators do not sign a vote for the block during the consensus process in Avalanche.

    Do you need an oracle to access the P-chain in avalanche?

    No. It is possible to access the P-chain in Avalanche via IBC without the need for an oracle. IBC is a protocol that enables interchain communication between different blockchains, and it does not require oracles to function.

    Additionally - you don't need IBC either. You can directly get the state you need by querying the P-chain.

    How do I access Avalanche Warp Messaging (AWM)?

    You can only access AVAX via the P-chain if and only if you have an IBC light client on AVAX and on the source chain side. This requires the corresponding VMs to run natively on both chains. is funding open source IBC light client work on all chains, not just AVAX.

    How do you get from the current Landslide Core to a working system and the properties of the system?

    To get from the current Landslide Core to a working system, developers need to implement the necessary ABCI calls in their application, including InitChain, BeginBlock, DeliverTx, CheckTx, and EndBlock ABCI calls. Once implemented, the dApp can be compiled using the LandslideSDK and deployed to the Avalanche network.

    LandslideCore is an implementation of the Tendermint Core that has been extended to include support for the Avalanche network. It provides the core functionality for creating and managing blockchain applications on the Avalanche network.

    Doesn't Cosmos already have very fast finality?

    It depends on the chain. Take Injective for example, is the block explorer. Notice that while there are blocks that are 1 second apart, their validator set is 60. is 21 times larger at 1264.

    The speed of finality in Cosmos chains can vary depending on the chain's configuration and the number of validators in its network. Some Cosmos chains may achieve fast finality times of a few seconds, while others may have longer finality times. However, Avalanche's consensus mechanism is designed to achieve sub-second finality times even with a large number of validators. This is achieved through its use of probabilistic consensus and its network subsampling algorithm, which allows for a high degree of scalability without compromising security.

    Where is the Avalanche consensus implemented?

    The consensus algorithm implemented in the reactor.go file of the LandslideCore repository is the Avalanche consensus algorithm. This implementation includes the following key components:

    1. Sampling: A network subsampling algorithm is used to gather opinions from a random subset of the validator set.

    Do you need to have consensus certificates?

    How does Tendermint increase latency as you scale the validator set?

    Tendermint consensus protocol requires validators to communicate with each other to come to an agreement on the next block. As the number of validators increases, the number of communication channels also increases, which can lead to increased network latency. This can result in a longer time for blocks to be propagated and finality to be achieved. In other words, as the validator set grows, the network may experience delays in block creation and confirmation. This is a known issue with Tendermint consensus, and is why other consensus protocols, like Avalanche, have been developed to address this scalability challenge.

    How does Avalanche ensure token fungibility across subnets?

    Token fungibility is VM specific, but the current recommendation is to treat tokens on different subnets as not fungible, just like in Cosmos. The Cosmos team is implementing path unwinding to improve token fungibility, as discussed .

    The first standard for token fungibility on Avalanche is likely to be based on the messaging format introduced into Subnet EVM, which is agnostic to token logic, and the Teleporter contract format that specifies fungibility. Ava Labs is currently working on this internally, and there are no official developer documents available yet.

    If a token is minted on Subnet A and sent to Subnet B, and then wants to be sent to Subnet C, it will generally be forwarded through Subnet A.

    How does the IBC light client send packet data?

    Please refer to the official , and check out a detailed diagram of the AVAX IBC light client .

    Packet data in IBC refers to the messages that are sent between two independent chains over the IBC protocol. The packet data contains information on the transaction or asset transfer, such as the sender, recipient, amount, and any additional metadata.

    To build an IBC light client for AVAX, you would need to create a light client that can verify and validate packet data from other chains. The light client must be able to confirm that the packet data received is valid and that it has not been tampered with during transmission.

    In the context of the IBC protocol, a light client is a simplified version of a full node that can verify the headers of blocks from another chain. Light clients can use a cryptographic proof to verify that the block headers are valid without having to download and store the entire blockchain.

    What is the method for obtaining a specific validator set and its associated proof for the C-Chain, especially when this information is stored in the block header?"

    Use this API to get the validator set:

    How does the Avalanche light client handle the selection and updating of its validator set in comparison to Ethereum's Altair light client, which updates its 512-member validator set every 256 epochs?

    In Avalanche, a partial validator set is randomly chosen from the entire pool of available validators to sign blocks. The Avalanche Light Client operates by setting a certain threshold—often a two-thirds majority—of these selected validators whose signatures are required to verify a block. Unlike Ethereum's Altair light client, which updates its validator set every 256 epochs (approximately every 27 hours), the Avalanche Light Client follows its own unique schedule and methodology for updating and validating its validator set.

    How does the Landslide token accrue value?

    The only security assumption that IBC has is that the target and the source chain are valid. Unlike major bridges like LayerZero, ChainLink, or Wormhole, there are no assumptions that the bridge is valid, because there are no externally verified bridge validators on IBC; there are only relayers relaying packets between chains. Landslide tokens create value by (1) securing a subnet, and (2) processing volume to/from Avalanche over IBC.

    What's the user experience like? Do you need to hold Landslide tokens in order to swap assets?

    Landslide tokens are abstracted away from the users via Burnt’s . The aim is to optimize the tokens so that users do not need to hold SLIDE tokens to swap between Cosmos/AVAX assets; the token is abstracted away from the user..

    The Cosmos dApp (including its VM) will be redeployed on its original VM with a new Avalanche consensus algoritm.

    2.) Fast Finality: Avalanche consensus provides sub-second, immutable finality, ensuring that transactions are quickly confirmed and irreversible. This is achieved without needing to limit the number of validators, as the consensus process is not dependent on the size of the validator set.

    3.) Security Guarantees: Avalanche consensus is designed to resist various attacks, including Sybil attacks, distributed denial-of-service (DDoS) attacks, and collusion attacks. Its probabilistic nature (rather than the deterministic nature of all Tendermint chains) ensures that the consensus outcome converges to the desired state, even when the network is under attack.

    4.) Proven Scalability: The scalability of the Avalanche consensus protocol is not just theoretical. The protocol has been implemented and tested live in the Avalanche network, demonstrating its ability to handle a large number of validators (currently 1,238) without compromising on performance or security.

    One important aspect of expanding the Landslide ecosystem is the development of an open source IBC light client, which is being funded by the Interchain Foundation. This light client will allow Avalanche to communicate with other blockchain networks that also support IBC, enabling cross-chain communication and interoperability.

    LandslideCore and LandslideSDK are important components in the development of this IBC light client, as they provide the necessary tools and infrastructure for building and deploying dApps on the Avalanche network. With the help of LandslideCore and LandslideSDK, developers can create and manage dApps that communicate with other blockchain networks through IBC, expanding the capabilities and reach of the Avalanche network.

    Metastability: The algorithm is designed to be meta-stable, meaning that it can tolerate temporary partitions or forks in the network without compromising safety.

  • Binary consensus: Each validator in the subsample independently chooses between two binary values (e.g., 0 or 1) and broadcasts their decision to the rest of the subsample.

  • Repeated subsampling: If the subsample reaches consensus, the decision is propagated up to a larger subsample until the full validator set reaches agreement.

  • Overall, the Avalanche consensus algorithm is designed to be scalable, secure, and fast, with finality times on the order of seconds rather than minutes or multiple seconds.

    The IBC documentation provides a detailed overview of how light clients can be used to verify packet data from other chains. It describes the different components of an IBC light client, including the header, proof, and verification algorithm.

    Landslide's IBC light client for AVAX verifies and validates packet data from other chains using the existing open source IBC light client specification and appropriate cryptographic algorithms.

    here
    here
    here
    Avalanche currently has 1,238 validators
    Avalanche documentation
    Landslide SDK
    Interchain Foundation
    here
    Check this repo.
    here
    IBC documentation here
    here
    https://docs.avax.network/reference/avalanchego/p-chain/api#platformgetvalidatorsat
    generalized abstraction layer

    RPC

    This file defines the JSON-RPC spec of CometBFT vs Landslide SDK. This is meant to be implemented by all clients.

    Routes

    ✅

    ✅

    ✅

    ✅

    NetInfo

    ✅

    ❌

    Info Routes


    Health

    Node heartbeat

    Parameters

    None

    Request

    JSONRPC

    Response

    Status

    Get CometBFT status including node info, pubkey, latest block hash, app hash, block height and time.

    Parameters

    None

    Request

    JSONRPC

    Response

    Blockchain

    Get block headers. Returned in descending order. May be limited in quantity.

    Parameters

    • minHeight (integer): The lowest block to be returned in the response

    • maxHeight (integer): The highest block to be returned in the response

    Request

    JSONRPC

    Response

    Block

    Get block at a specified height.

    Parameters

    • height (integer): height of the requested block. If no height is specified the latest block will be used.

    Request

    JSONRPC

    Response

    BlockByHash

    Parameters

    • hash (string): Hash of the block to query for.

    Request

    JSONRPC

    Response

    BlockResults

    Parameters

    • height (integer): Height of the block which contains the results. If no height is specified, the latest block height will be used

    Request

    JSONRPC

    Response

    Commit

    Parameters

    • height (integer): Height of the block the requested commit pertains to. If no height is set the latest commit will be returned.

    Request

    JSONRPC

    Response

    Validators

    Parameters

    • height (integer): Block height at which the validators were present on. If no height is set the latest commit will be returned.

    • page (integer):

    • per_page (integer):

    Request

    JSONRPC

    Response

    Genesis

    Get Genesis of the chain. If the response is large, this operation will return an error: use genesis_chunked instead.

    Request

    JSONRPC

    Response

    GenesisChunked

    Get the genesis document in a chunks to support easily transferring larger documents.

    Parameters

    • chunk (integer): the index number of the chunk that you wish to fetch. These IDs are 0 indexed.

    Request

    JSONRPC

    Response

    ConsensusParams

    Get the consensus parameters.

    Parameters

    • height (integer): Block height at which the consensus params would like to be fetched for.

    Request

    JSONRPC

    Response

    UnconfirmedTxs

    Get a list of unconfirmed transactions.

    Parameters

    • limit (integer) The amount of txs to respond with.

    Request

    JSONRPC

    Response

    NumUnconfirmedTxs

    Get data about unconfirmed transactions.

    Parameters

    None

    Request

    JSONRPC

    Response

    Tx

    Parameters

    • hash (string): The hash of the transaction

    • prove (bool): If the response should include proof the transaction was included in a block.

    Request

    JSONRPC

    Response

    TxSearch

    Searches for transactions based on a query condition. Returns matching transactions along with their details.

    Parameters

    • query (string): The query condition for searching transactions (e.g., "tx.height=1").

    • prove (boolean): Indicates whether to include proof data for each transaction.

    • page (string): The page number for paginated results.

    Request

    JSONRPC

    Response

    BlockSearch

    Searches for blocks based on a query condition. Returns matching blocks along with their details.

    Parameters

    • query (string): The query condition for searching blocks (e.g., "block.height > 1").

    • page (string): The page number for paginated results.

    • per_page (string): The number of blocks to show per page.

    Request

    JSONRPC

    Response

    Transaction Routes


    BroadCastTxSync

    Returns with the response from CheckTx. Does not wait for DeliverTx result.

    Parameters

    • tx (string): The transaction encoded

    Request

    JSONRPC

    Response

    BroadCastTxAsync

    Returns right away, with no response. Does not wait for CheckTx nor DeliverTx results.

    Parameters

    • tx (string): The transaction encoded

    Request

    JSONRPC

    Response

    CheckTx

    Checks the transaction without executing it.

    Parameters

    • tx (string): String of the encoded transaction

    Request

    JSONRPC

    Response

    ABCI Routes


    ABCIInfo

    Get some info about the application.

    Parameters

    None

    Request

    JSONRPC

    Response

    ABCIQuery

    Query the application for some information.

    Parameters

    • path (string): A request path for the application to interpret analogously to a in e.g. routing.

    • data (string): Request parameters for the application to interpret analogously to a , expressed as hexadecimal-serialized bytes (convert WasmApp to hex is 5761736d417070).

    • height (integer)

    Request

    JSONRPC

    Response

  • per_page (string): The number of transactions to show per page.

  • order_by (string): Specifies the sort order ("asc" or "desc").

  • order_by (string): Specifies the sort order ("asc" or "desc").

    : The block height against which to query.
  • prove (bool): Return Merkle proof with response if possible.

  • Blockchain

    ✅

    ✅

    Block

    ✅

    ✅

    BlockByHash

    ✅

    ✅

    BlockResults

    ✅

    ✅

    Commit

    ✅

    ✅

    Validators

    ✅

    ✅

    Genesis

    ✅

    ✅

    GenesisChunked

    ✅

    ✅

    ConsensusParams

    ✅

    ✅

    UnconfirmedTxs

    ✅

    ✅

    NumUnconfirmedTxs

    ✅

    ✅

    Tx

    ✅

    ✅

    TxSearch

    ❌

    ✅

    BlockSearch

    ❌

    ✅

    BroadCastTxSync

    ✅

    ✅

    BroadCastTxAsync

    ✅

    ✅

    ABCIInfo

    ✅

    ✅

    ABCIQuery

    ✅

    ✅

    BroadcastEvidence

    ✅

    ❌

    URI path component
    URI query component
    CometBFT
    Landslide SDK
    Health
    Status
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"health\"}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {}
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"status\"}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "node_info": {
          "protocol_version": {
            "p2p": "8",
            "block": "11",
            "app": "0"
          },
          "id": "cb912d5ed8d2cdc31ba42aad6ec37bd640fdce62",
          "listen_addr": "/ext/bc/2rUgWwRguT2uAzPFTZSz2XrJiVZhif5Yv6NKGupFj89CJTEfQu/rpc",
          "network": "landslide-test",
          "version": "0.38.9",
          "channels": "",
          "moniker": "cb912d5ed8d2cdc31ba42aad6ec37bd640fdce62",
          "other": {
            "tx_index": "",
            "rpc_address": ""
          }
        },
        "sync_info": {
          "latest_block_hash": "775DD3BBA679E6B6467CCCA2E67E7498BE5F2F60219EEEFE34EF40C28D5EA5CC",
          "latest_app_hash": "A3C8A1E113E269D723F33A0483ADCEB3EE25D2EC23690BB2E4574367F0EF6417",
          "latest_block_height": "39",
          "latest_block_time": "2024-09-20T14:37:47.720065252Z",
          "earliest_block_hash": "44F0AC57A9A6FA4647A5F6CEA962D081DA9AD1CC8C871BE9725716F34CA08FAC",
          "earliest_app_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
          "earliest_block_height": "1",
          "earliest_block_time": "2024-06-11T19:47:02.588140664Z",
          "catching_up": false
        },
        "validator_info": {
          "address": "29CFC6376255A78451EEB4B129ED8EACFFA2FEEF",
          "pub_key": {
            "type": "tendermint/PubKeySecp256k1",
            "value": "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
          },
          "voting_power": "0"
        }
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"blockchain\",\"params\":{\"minHeight\":\"1\", \"maxHeight\":\"2\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "last_height": "67",
        "block_metas": [
          {
            "block_id": {
              "hash": "565633D9EF2063810FEDC5716CFFDED1879F334D051BEC8DCE9BBBD99F9DA478",
              "parts": {
                "total": 1,
                "hash": "974BADDC7392A1DE56C3C586730C37371AF76B2F95BF155AF730B71C757A5ED6"
              }
            },
            "block_size": "913",
            "header": {
              "version": {
                "block": "11"
              },
              "chain_id": "landslide-test",
              "height": "2",
              "time": "2024-08-29T13:03:49.002664646Z",
              "last_block_id": {
                "hash": "44F0AC57A9A6FA4647A5F6CEA962D081DA9AD1CC8C871BE9725716F34CA08FAC",
                "parts": {
                  "total": 1,
                  "hash": "4001074D14084CC16C61F106675C45DB62732F0A8B5CFBEBD866AB283122C72F"
                }
              },
              "last_commit_hash": "0165478ECE0A31DF2A5F8CF42DA468B42FEB1929404D28E05F587C82B8B69249",
              "data_hash": "1969C3306F08030618232225F8B445BD32046E7C297EE2DDA10DC2747EB3F7AC",
              "validators_hash": "B797D57B0083DA5EE04C7966CB8F3FA7F75B5767B1F5FCABABB53B0765738981",
              "next_validators_hash": "B797D57B0083DA5EE04C7966CB8F3FA7F75B5767B1F5FCABABB53B0765738981",
              "consensus_hash": "048091BC7DDC283F77BFBF91D73C44DA58C3DF8A9CBC867405D8B7F3DAADA22F",
              "app_hash": "63C7D00C46CAA24D0F8745F90CBBC4F573CB77FD1D5F9B80A50AFBEFD83386CB",
              "last_results_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
              "evidence_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
              "proposer_address": "0000000000000000000000000000000000000000"
            },
            "num_txs": "1"
          },
          {
            "block_id": {
              "hash": "44F0AC57A9A6FA4647A5F6CEA962D081DA9AD1CC8C871BE9725716F34CA08FAC",
              "parts": {
                "total": 1,
                "hash": "4001074D14084CC16C61F106675C45DB62732F0A8B5CFBEBD866AB283122C72F"
              }
            },
            "block_size": "347",
            "header": {
              "version": {
                "block": "11"
              },
              "chain_id": "landslide-test",
              "height": "1",
              "time": "2024-06-11T19:47:02.588140664Z",
              "last_block_id": {
                "hash": "",
                "parts": {
                  "total": 0,
                  "hash": ""
                }
              },
              "last_commit_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
              "data_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
              "validators_hash": "B797D57B0083DA5EE04C7966CB8F3FA7F75B5767B1F5FCABABB53B0765738981",
              "next_validators_hash": "B797D57B0083DA5EE04C7966CB8F3FA7F75B5767B1F5FCABABB53B0765738981",
              "consensus_hash": "048091BC7DDC283F77BFBF91D73C44DA58C3DF8A9CBC867405D8B7F3DAADA22F",
              "app_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
              "last_results_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
              "evidence_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
              "proposer_address": "0000000000000000000000000000000000000000"
            },
            "num_txs": "0"
          }
        ]
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"block\",\"params\":{\"height\":\"1\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "block_id": {
          "hash": "44F0AC57A9A6FA4647A5F6CEA962D081DA9AD1CC8C871BE9725716F34CA08FAC",
          "parts": {
            "total": 1,
            "hash": "4001074D14084CC16C61F106675C45DB62732F0A8B5CFBEBD866AB283122C72F"
          }
        },
        "block": {
          "header": {
            "version": {
              "block": "11"
            },
            "chain_id": "landslide-test",
            "height": "1",
            "time": "2024-06-11T19:47:02.588140664Z",
            "last_block_id": {
              "hash": "",
              "parts": {
                "total": 0,
                "hash": ""
              }
            },
            "last_commit_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "data_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "validators_hash": "B797D57B0083DA5EE04C7966CB8F3FA7F75B5767B1F5FCABABB53B0765738981",
            "next_validators_hash": "B797D57B0083DA5EE04C7966CB8F3FA7F75B5767B1F5FCABABB53B0765738981",
            "consensus_hash": "048091BC7DDC283F77BFBF91D73C44DA58C3DF8A9CBC867405D8B7F3DAADA22F",
            "app_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "last_results_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "evidence_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "proposer_address": "0000000000000000000000000000000000000000"
          },
          "data": {
            "txs": []
          },
          "evidence": {
            "evidence": []
          },
          "last_commit": {
            "height": "0",
            "round": 0,
            "block_id": {
              "hash": "",
              "parts": {
                "total": 0,
                "hash": ""
              }
            },
            "signatures": []
          }
        }
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"block_by_hash\",\"params\":{\"hash\":\"44F0AC57A9A6FA4647A5F6CEA962D081DA9AD1CC8C871BE9725716F34CA08FAC\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "block_id": {
          "hash": "",
          "parts": {
            "total": 0,
            "hash": ""
          }
        },
        "block": null
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"block_results\",\"params\":{\"height\":\"1\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": null
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"commit\",\"params\":{\"height\":\"1\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "signed_header": {
          "header": {
            "version": {
              "block": "11"
            },
            "chain_id": "landslide-test",
            "height": "1",
            "time": "2024-06-11T19:47:02.588140664Z",
            "last_block_id": {
              "hash": "",
              "parts": {
                "total": 0,
                "hash": ""
              }
            },
            "last_commit_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "data_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "validators_hash": "B797D57B0083DA5EE04C7966CB8F3FA7F75B5767B1F5FCABABB53B0765738981",
            "next_validators_hash": "B797D57B0083DA5EE04C7966CB8F3FA7F75B5767B1F5FCABABB53B0765738981",
            "consensus_hash": "048091BC7DDC283F77BFBF91D73C44DA58C3DF8A9CBC867405D8B7F3DAADA22F",
            "app_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "last_results_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "evidence_hash": "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
            "proposer_address": "0000000000000000000000000000000000000000"
          },
          "commit": {
            "height": "1",
            "round": 0,
            "block_id": {
              "hash": "44F0AC57A9A6FA4647A5F6CEA962D081DA9AD1CC8C871BE9725716F34CA08FAC",
              "parts": {
                "total": 1,
                "hash": "4001074D14084CC16C61F106675C45DB62732F0A8B5CFBEBD866AB283122C72F"
              }
            },
            "signatures": [
              {
                "block_id_flag": 3,
                "validator_address": "CB3E8C3DF2B14CBB3538043B49C39DFBEF4B0F80",
                "timestamp": "2024-08-29T13:03:49.002664646Z",
                "signature": "SWJPZyHs3GpGxGf3UG1iBJAoc9Sd2b6vBKU1n16iRPk22ZcFEMSdCwoCq9uh7t2/Lvk66byOW0P05/2Q0+2aRA=="
              }
            ]
          }
        },
        "canonical": true
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"validators\",\"params\":{\"height\":\"1\", \"page\":\"1\", \"per_page\":\"20\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "block_height": "1",
        "validators": [
          {
            "address": "CB3E8C3DF2B14CBB3538043B49C39DFBEF4B0F80",
            "pub_key": {
              "type": "tendermint/PubKeyEd25519",
              "value": "yD+2h7vYYmrU1AA+7sMTv1UjKE8T7hVhgMqr9Ez/HA8="
            },
            "voting_power": "250",
            "proposer_priority": "0"
          }
        ],
        "count": "1",
        "total": "1"
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"genesis\"}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "genesis": {
          "genesis_time": "2024-06-11T19:47:02.588140664Z",
          "chain_id": "landslide-test",
          "initial_height": "1",
          "consensus_params": {
            "block": {
              "max_bytes": "22020096",
              "max_gas": "-1"
            },
            "evidence": {
              "max_age_num_blocks": "100000",
              "max_age_duration": "172800000000000",
              "max_bytes": "1048576"
            },
            "validator": {
              "pub_key_types": [
                "ed25519"
              ]
            },
            "version": {
              "app": "0"
            },
            "abci": {
              "vote_extensions_enable_height": "0"
            }
          },
          "app_hash": "",
          "app_state": {
            "07-tendermint": null,
            "auth": {
              "params": {
                "max_memo_characters": "256",
                "tx_sig_limit": "7",
                "tx_size_cost_per_byte": "10",
                "sig_verify_cost_ed25519": "590",
                "sig_verify_cost_secp256k1": "1000"
              },
              "accounts": [
                {
                  "@type": "/cosmos.auth.v1beta1.BaseAccount",
                  "address": "wasm1vcw0he5l9mu54zawg3h440p83ex70ccmme53ac",
                  "pub_key": null,
                  "account_number": "0",
                  "sequence": "0"
                },
                {
                  "@type": "/cosmos.auth.v1beta1.BaseAccount",
                  "address": "wasm1kng6sqkm0mjuh09cwz6u86f75lmeflj9h0fqhr",
                  "pub_key": null,
                  "account_number": "1",
                  "sequence": "0"
                },
                {
                  "@type": "/cosmos.auth.v1beta1.BaseAccount",
                  "address": "wasm1c4w4jxdkvj3ygdycdkjy98jve6w0d7257eqfx9",
                  "pub_key": null,
                  "account_number": "2",
                  "sequence": "0"
                }
              ]
            },
            "authz": {
              "authorization": []
            },
            "bank": {
              "params": {
                "send_enabled": [],
                "default_send_enabled": true
              },
              "balances": [
                {
                  "address": "wasm1vcw0he5l9mu54zawg3h440p83ex70ccmme53ac",
                  "coins": [
                    {
                      "denom": "stake",
                      "amount": "1000000000"
                    }
                  ]
                },
                {
                  "address": "wasm1kng6sqkm0mjuh09cwz6u86f75lmeflj9h0fqhr",
                  "coins": [
                    {
                      "denom": "stake",
                      "amount": "1000000000"
                    }
                  ]
                }
              ],
              "supply": [
                {
                  "denom": "stake",
                  "amount": "2000000000"
                }
              ],
              "denom_metadata": [],
              "send_enabled": []
            },
            "capability": {
              "index": "1",
              "owners": []
            },
            "circuit": {
              "account_permissions": [],
              "disabled_type_urls": []
            },
            "consensus": null,
            "crisis": {
              "constant_fee": {
                "denom": "stake",
                "amount": "1000"
              }
            },
            "distribution": {
              "params": {
                "community_tax": "0.020000000000000000",
                "base_proposer_reward": "0.000000000000000000",
                "bonus_proposer_reward": "0.000000000000000000",
                "withdraw_addr_enabled": true
              },
              "fee_pool": {
                "community_pool": []
              },
              "delegator_withdraw_infos": [],
              "previous_proposer": "",
              "outstanding_rewards": [],
              "validator_accumulated_commissions": [],
              "validator_historical_rewards": [],
              "validator_current_rewards": [],
              "delegator_starting_infos": [],
              "validator_slash_events": []
            },
            "evidence": {
              "evidence": []
            },
            "feegrant": {
              "allowances": []
            },
            "feeibc": {
              "identified_fees": [],
              "fee_enabled_channels": [],
              "registered_payees": [],
              "registered_counterparty_payees": [],
              "forward_relayers": []
            },
            "genutil": {
              "gen_txs": [
                {
                  "body": {
                    "messages": [
                      {
                        "@type": "/cosmos.staking.v1beta1.MsgCreateValidator",
                        "description": {
                          "moniker": "node1",
                          "identity": "",
                          "website": "",
                          "security_contact": "",
                          "details": ""
                        },
                        "commission": {
                          "rate": "0.100000000000000000",
                          "max_rate": "0.200000000000000000",
                          "max_change_rate": "0.010000000000000000"
                        },
                        "min_self_delegation": "1",
                        "delegator_address": "",
                        "validator_address": "wasmvaloper1vcw0he5l9mu54zawg3h440p83ex70ccmw9pdnz",
                        "pubkey": {
                          "@type": "/cosmos.crypto.ed25519.PubKey",
                          "key": "yD+2h7vYYmrU1AA+7sMTv1UjKE8T7hVhgMqr9Ez/HA8="
                        },
                        "value": {
                          "denom": "stake",
                          "amount": "250000000"
                        }
                      }
                    ],
                    "memo": "[email protected]:26656",
                    "timeout_height": "0",
                    "extension_options": [],
                    "non_critical_extension_options": []
                  },
                  "auth_info": {
                    "signer_infos": [
                      {
                        "public_key": {
                          "@type": "/cosmos.crypto.secp256k1.PubKey",
                          "key": "AhFggXG8fW08HKDacLjhUV28l6qQQz67ZAuoHGDlwCx4"
                        },
                        "mode_info": {
                          "single": {
                            "mode": "SIGN_MODE_DIRECT"
                          }
                        },
                        "sequence": "0"
                      }
                    ],
                    "fee": {
                      "amount": [],
                      "gas_limit": "200000",
                      "payer": "",
                      "granter": ""
                    },
                    "tip": null
                  },
                  "signatures": [
                    "elAiSB50eI2jd8Oi/GRePGKiaA4YQ5v2mUmZoTyl1fYPuFG/PDvrQfO8puQjgQ7tAshWVUxWIQt9VDgRhxOrww=="
                  ]
                }
              ]
            },
            "gov": {
              "starting_proposal_id": "1",
              "deposits": [],
              "votes": [],
              "proposals": [],
              "deposit_params": null,
              "voting_params": null,
              "tally_params": null,
              "params": {
                "min_deposit": [
                  {
                    "denom": "stake",
                    "amount": "10000000"
                  }
                ],
                "max_deposit_period": "172800s",
                "voting_period": "172800s",
                "quorum": "0.334000000000000000",
                "threshold": "0.500000000000000000",
                "veto_threshold": "0.334000000000000000",
                "min_initial_deposit_ratio": "0.000000000000000000",
                "proposal_cancel_ratio": "0.500000000000000000",
                "proposal_cancel_dest": "",
                "expedited_voting_period": "86400s",
                "expedited_threshold": "0.667000000000000000",
                "expedited_min_deposit": [
                  {
                    "denom": "stake",
                    "amount": "50000000"
                  }
                ],
                "burn_vote_quorum": false,
                "burn_proposal_deposit_prevote": false,
                "burn_vote_veto": true,
                "min_deposit_ratio": "0.010000000000000000"
              },
              "constitution": ""
            },
            "group": {
              "group_seq": "0",
              "groups": [],
              "group_members": [],
              "group_policy_seq": "0",
              "group_policies": [],
              "proposal_seq": "0",
              "proposals": [],
              "votes": []
            },
            "ibc": {
              "client_genesis": {
                "clients": [],
                "clients_consensus": [],
                "clients_metadata": [],
                "params": {
                  "allowed_clients": [
                    "06-solomachine",
                    "07-tendermint",
                    "09-localhost"
                  ]
                },
                "create_localhost": false,
                "next_client_sequence": "0"
              },
              "connection_genesis": {
                "connections": [],
                "client_connection_paths": [],
                "next_connection_sequence": "0",
                "params": {
                  "max_expected_time_per_block": "30000000000"
                }
              },
              "channel_genesis": {
                "channels": [],
                "acknowledgements": [],
                "commitments": [],
                "receipts": [],
                "send_sequences": [],
                "recv_sequences": [],
                "ack_sequences": [],
                "next_channel_sequence": "0"
              }
            },
            "interchainaccounts": {
              "controller_genesis_state": {
                "active_channels": [],
                "interchain_accounts": [],
                "ports": [],
                "params": {
                  "controller_enabled": true
                }
              },
              "host_genesis_state": {
                "active_channels": [],
                "interchain_accounts": [],
                "port": "icahost",
                "params": {
                  "host_enabled": true,
                  "allow_messages": [
                    "*"
                  ]
                }
              }
            },
            "mint": {
              "minter": {
                "inflation": "0.130000000000000000",
                "annual_provisions": "0.000000000000000000"
              },
              "params": {
                "mint_denom": "stake",
                "inflation_rate_change": "0.130000000000000000",
                "inflation_max": "0.200000000000000000",
                "inflation_min": "0.070000000000000000",
                "goal_bonded": "0.670000000000000000",
                "blocks_per_year": "6311520"
              }
            },
            "nft": {
              "classes": [],
              "entries": []
            },
            "params": null,
            "slashing": {
              "params": {
                "signed_blocks_window": "100",
                "min_signed_per_window": "0.500000000000000000",
                "downtime_jail_duration": "600s",
                "slash_fraction_double_sign": "0.050000000000000000",
                "slash_fraction_downtime": "0.010000000000000000"
              },
              "signing_infos": [],
              "missed_blocks": []
            },
            "staking": {
              "params": {
                "unbonding_time": "1814400s",
                "max_validators": 100,
                "max_entries": 7,
                "historical_entries": 10000,
                "bond_denom": "stake",
                "min_commission_rate": "0.000000000000000000"
              },
              "last_total_power": "0",
              "last_validator_powers": [],
              "validators": [],
              "delegations": [],
              "unbonding_delegations": [],
              "redelegations": [],
              "exported": false
            },
            "transfer": {
              "port_id": "transfer",
              "denom_traces": [],
              "params": {
                "send_enabled": true,
                "receive_enabled": true
              },
              "total_escrowed": []
            },
            "upgrade": {},
            "vesting": {},
            "wasm": {
              "params": {
                "code_upload_access": {
                  "permission": "Everybody",
                  "addresses": []
                },
                "instantiate_default_permission": "Everybody"
              },
              "codes": [],
              "contracts": [],
              "sequences": []
            }
          }
        }
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"genesis_chunked\",\"params\":{\"chunk\":\"0\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "chunk": "0",
        "total": "1",
        "data": "{
  "app_name": "wasmd",
  "app_version": "0.50.0",
  "genesis_time": "2024-06-11T19:47:02.588140664Z",
  "chain_id": "landslide-test",
  "initial_height": "0",
  "app_hash": null,
  "app_state": {
    "07-tendermint": null,
    "auth": {
      "params": {
        "max_memo_characters": "256",
        "tx_sig_limit": "7",
        "tx_size_cost_per_byte": "10",
        "sig_verify_cost_ed25519": "590",
        "sig_verify_cost_secp256k1": "1000"
      },
      "accounts": [
        {
          "@type": "/cosmos.auth.v1beta1.BaseAccount",
          "address": "wasm1vcw0he5l9mu54zawg3h440p83ex70ccmme53ac",
          "pub_key": null,
          "account_number": "0",
          "sequence": "0"
        },
        {
          "@type": "/cosmos.auth.v1beta1.BaseAccount",
          "address": "wasm1kng6sqkm0mjuh09cwz6u86f75lmeflj9h0fqhr",
          "pub_key": null,
          "account_number": "1",
          "sequence": "0"
        },
        {
          "@type": "/cosmos.auth.v1beta1.BaseAccount",
          "address": "wasm1c4w4jxdkvj3ygdycdkjy98jve6w0d7257eqfx9",
          "pub_key": null,
          "account_number": "2",
          "sequence": "0"
        }
      ]
    },
    "authz": {
      "authorization": []
    },
    "bank": {
      "params": {
        "send_enabled": [],
        "default_send_enabled": true
      },
      "balances": [
        {
          "address": "wasm1vcw0he5l9mu54zawg3h440p83ex70ccmme53ac",
          "coins": [
            {
              "denom": "stake",
              "amount": "1000000000"
            }
          ]
        },
        {
          "address": "wasm1kng6sqkm0mjuh09cwz6u86f75lmeflj9h0fqhr",
          "coins": [
            {
              "denom": "stake",
              "amount": "1000000000"
            }
          ]
        }
      ],
      "supply": [
        {
          "denom": "stake",
          "amount": "2000000000"
        }
      ],
      "denom_metadata": [],
      "send_enabled": []
    },
    "capability": {
      "index": "1",
      "owners": []
    },
    "circuit": {
      "account_permissions": [],
      "disabled_type_urls": []
    },
    "consensus": null,
    "crisis": {
      "constant_fee": {
        "denom": "stake",
        "amount": "1000"
      }
    },
    "distribution": {
      "params": {
        "community_tax": "0.020000000000000000",
        "base_proposer_reward": "0.000000000000000000",
        "bonus_proposer_reward": "0.000000000000000000",
        "withdraw_addr_enabled": true
      },
      "fee_pool": {
        "community_pool": []
      },
      "delegator_withdraw_infos": [],
      "previous_proposer": "",
      "outstanding_rewards": [],
      "validator_accumulated_commissions": [],
      "validator_historical_rewards": [],
      "validator_current_rewards": [],
      "delegator_starting_infos": [],
      "validator_slash_events": []
    },
    "evidence": {
      "evidence": []
    },
    "feegrant": {
      "allowances": []
    },
    "feeibc": {
      "identified_fees": [],
      "fee_enabled_channels": [],
      "registered_payees": [],
      "registered_counterparty_payees": [],
      "forward_relayers": []
    },
    "genutil": {
      "gen_txs": [
        {
          "body": {
            "messages": [
              {
                "@type": "/cosmos.staking.v1beta1.MsgCreateValidator",
                "description": {
                  "moniker": "node1",
                  "identity": "",
                  "website": "",
                  "security_contact": "",
                  "details": ""
                },
                "commission": {
                  "rate": "0.100000000000000000",
                  "max_rate": "0.200000000000000000",
                  "max_change_rate": "0.010000000000000000"
                },
                "min_self_delegation": "1",
                "delegator_address": "",
                "validator_address": "wasmvaloper1vcw0he5l9mu54zawg3h440p83ex70ccmw9pdnz",
                "pubkey": {
                  "@type": "/cosmos.crypto.ed25519.PubKey",
                  "key": "yD+2h7vYYmrU1AA+7sMTv1UjKE8T7hVhgMqr9Ez/HA8="
                },
                "value": {
                  "denom": "stake",
                  "amount": "250000000"
                }
              }
            ],
            "memo": "195cbe2ac4a3f2e051d6cc58096a55172d930d3e@192.168.50.251:26656",
            "timeout_height": "0",
            "extension_options": [],
            "non_critical_extension_options": []
          },
          "auth_info": {
            "signer_infos": [
              {
                "public_key": {
                  "@type": "/cosmos.crypto.secp256k1.PubKey",
                  "key": "AhFggXG8fW08HKDacLjhUV28l6qQQz67ZAuoHGDlwCx4"
                },
                "mode_info": {
                  "single": {
                    "mode": "SIGN_MODE_DIRECT"
                  }
                },
                "sequence": "0"
              }
            ],
            "fee": {
              "amount": [],
              "gas_limit": "200000",
              "payer": "",
              "granter": ""
            },
            "tip": null
          },
          "signatures": [
            "elAiSB50eI2jd8Oi/GRePGKiaA4YQ5v2mUmZoTyl1fYPuFG/PDvrQfO8puQjgQ7tAshWVUxWIQt9VDgRhxOrww=="
          ]
        }
      ]
    },
    "gov": {
      "starting_proposal_id": "1",
      "deposits": [],
      "votes": [],
      "proposals": [],
      "deposit_params": null,
      "voting_params": null,
      "tally_params": null,
      "params": {
        "min_deposit": [
          {
            "denom": "stake",
            "amount": "10000000"
          }
        ],
        "max_deposit_period": "172800s",
        "voting_period": "172800s",
        "quorum": "0.334000000000000000",
        "threshold": "0.500000000000000000",
        "veto_threshold": "0.334000000000000000",
        "min_initial_deposit_ratio": "0.000000000000000000",
        "proposal_cancel_ratio": "0.500000000000000000",
        "proposal_cancel_dest": "",
        "expedited_voting_period": "86400s",
        "expedited_threshold": "0.667000000000000000",
        "expedited_min_deposit": [
          {
            "denom": "stake",
            "amount": "50000000"
          }
        ],
        "burn_vote_quorum": false,
        "burn_proposal_deposit_prevote": false,
        "burn_vote_veto": true,
        "min_deposit_ratio": "0.010000000000000000"
      },
      "constitution": ""
    },
    "group": {
      "group_seq": "0",
      "groups": [],
      "group_members": [],
      "group_policy_seq": "0",
      "group_policies": [],
      "proposal_seq": "0",
      "proposals": [],
      "votes": []
    },
    "ibc": {
      "client_genesis": {
        "clients": [],
        "clients_consensus": [],
        "clients_metadata": [],
        "params": {
          "allowed_clients": [
            "06-solomachine",
            "07-tendermint",
            "09-localhost"
          ]
        },
        "create_localhost": false,
        "next_client_sequence": "0"
      },
      "connection_genesis": {
        "connections": [],
        "client_connection_paths": [],
        "next_connection_sequence": "0",
        "params": {
          "max_expected_time_per_block": "30000000000"
        }
      },
      "channel_genesis": {
        "channels": [],
        "acknowledgements": [],
        "commitments": [],
        "receipts": [],
        "send_sequences": [],
        "recv_sequences": [],
        "ack_sequences": [],
        "next_channel_sequence": "0"
      }
    },
    "interchainaccounts": {
      "controller_genesis_state": {
        "active_channels": [],
        "interchain_accounts": [],
        "ports": [],
        "params": {
          "controller_enabled": true
        }
      },
      "host_genesis_state": {
        "active_channels": [],
        "interchain_accounts": [],
        "port": "icahost",
        "params": {
          "host_enabled": true,
          "allow_messages": [
            "*"
          ]
        }
      }
    },
    "mint": {
      "minter": {
        "inflation": "0.130000000000000000",
        "annual_provisions": "0.000000000000000000"
      },
      "params": {
        "mint_denom": "stake",
        "inflation_rate_change": "0.130000000000000000",
        "inflation_max": "0.200000000000000000",
        "inflation_min": "0.070000000000000000",
        "goal_bonded": "0.670000000000000000",
        "blocks_per_year": "6311520"
      }
    },
    "nft": {
      "classes": [],
      "entries": []
    },
    "params": null,
    "slashing": {
      "params": {
        "signed_blocks_window": "100",
        "min_signed_per_window": "0.500000000000000000",
        "downtime_jail_duration": "600s",
        "slash_fraction_double_sign": "0.050000000000000000",
        "slash_fraction_downtime": "0.010000000000000000"
      },
      "signing_infos": [],
      "missed_blocks": []
    },
    "staking": {
      "params": {
        "unbonding_time": "1814400s",
        "max_validators": 100,
        "max_entries": 7,
        "historical_entries": 10000,
        "bond_denom": "stake",
        "min_commission_rate": "0.000000000000000000"
      },
      "last_total_power": "0",
      "last_validator_powers": [],
      "validators": [],
      "delegations": [],
      "unbonding_delegations": [],
      "redelegations": [],
      "exported": false
    },
    "transfer": {
      "port_id": "transfer",
      "denom_traces": [],
      "params": {
        "send_enabled": true,
        "receive_enabled": true
      },
      "total_escrowed": []
    },
    "upgrade": {},
    "vesting": {},
    "wasm": {
      "params": {
        "code_upload_access": {
          "permission": "Everybody",
          "addresses": []
        },
        "instantiate_default_permission": "Everybody"
      },
      "codes": [],
      "contracts": [],
      "sequences": []
    }
  },
  "consensus": {
    "params": {
      "block": {
        "max_bytes": "22020096",
        "max_gas": "-1"
      },
      "evidence": {
        "max_age_num_blocks": "100000",
        "max_age_duration": "172800000000000",
        "max_bytes": "1048576"
      },
      "validator": {
        "pub_key_types": [
          "ed25519"
        ]
      },
      "version": {
        "app": "0"
      },
      "abci": {
        "vote_extensions_enable_height": "0"
      }
    }
  }
}"
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"consensus_params\",\"params\":{\"height\":\"0\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "block_height": "67",
        "consensus_params": {
          "block": {
            "max_bytes": "22020096",
            "max_gas": "-1"
          },
          "evidence": {
            "max_age_num_blocks": "100000",
            "max_age_duration": "172800000000000",
            "max_bytes": "1048576"
          },
          "validator": {
            "pub_key_types": [
              "ed25519"
            ]
          },
          "version": {
            "app": "0"
          },
          "abci": {
            "vote_extensions_enable_height": "0"
          }
        }
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d '{"jsonrpc":"2.0","id":1,"method":"unconfirmed_txs","params":{"limit":"20"}}'
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "n_txs": "0",
        "total": "0",
        "total_bytes": "0",
        "txs": []
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"num_unconfirmed_txs\"}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "n_txs": "0",
        "total": "0",
        "total_bytes": "0",
        "txs": null
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"num_unconfirmed_txs\"}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "n_txs": "0",
        "total": "0",
        "total_bytes": "0",
        "txs": null
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"tx_search\",\"params\":{\"query\":\"tx.height=1\",\"prove\":true,\"page\":\"1\",\"per_page\":\"30\",\"order_by\":\"asc\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "txs": [],
        "total_count": "0"
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"block_search\",\"params\":{\"query\":\"block.height > 1\",\"page\":\"1\",\"per_page\":\"20\",\"order_by\":\"desc\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "blocks": [],
        "total_count": "0"
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"broadcast_tx_sync\",\"params\":{\"tx\":\"a/null/c\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "code": 2,
        "data": "",
        "log": "expected 2 wire type, got 3: tx parse error",
        "codespace": "sdk",
        "hash": "8C4547C2D0B04641DB22F4F5B10B64A1A8181AD514352795022B9EFC86A67056"
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"broadcast_tx_async\",\"params\":{\"tx\":\"a/null/c\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "code": 0,
        "data": "",
        "log": "",
        "codespace": "",
        "hash": "8C4547C2D0B04641DB22F4F5B10B64A1A8181AD514352795022B9EFC86A67056"
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"check_tx\",\"params\":{\"tx\":\"a/null/c\"}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "code": 2,
        "data": null,
        "log": "expected 2 wire type, got 3: tx parse error",
        "info": "",
        "gas_wanted": "0",
        "gas_used": "1174",
        "events": [],
        "codespace": "sdk"
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"abci_info\"}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "response": {
          "data": "WasmApp",
          "last_block_height": "67",
          "last_block_app_hash": "S6enjHgkIVQb/2Avml61hJNuqPNO0we3IpFZ9RbaB+Y="
        }
      }
    }
    curl -X POST https://cometrpc.testnet.landslide.network -d "{\"jsonrpc\":\"2.0\",\"id\":1,\"method\":\"abci_query\",\"params\":{\"path\":\"/key\", \"data\":\"5761736d417070\", \"height\":\"1\", \"prove\":true}}"
    {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "response": {
          "code": 6,
          "log": "unknown query path: unknown request",
          "info": "",
          "index": "0",
          "key": null,
          "value": null,
          "proofOps": null,
          "height": "0",
          "codespace": "sdk"
        }
      }
    }
    The current validator set

    Slide SDK

    Seargent Slide, sliding for duty.

    Landslide is a revolutionary IBC-enabled Avalanche L1 that bridges the gap between Avalanche and the interchain ecosystem. It allows any IBC-enabled chain to run natively on the Avalanche network, focusing on CosmWasm-based dApps to run natively on the Avalanche network, opening up new possibilities for cross-chain interactions and development.

    Key Features

    1. Native IBC Connectivity: Seamlessly transfer assets between Landslide and other IBC-enabled chains.

    2. Sub-Second Finality: Achieve transaction finality in under 1 second, significantly faster than traditional CometBFT-based chains.

    3. Cosmos SDK Compatibility: Easily port existing Cosmos-based dApps to Landslide with 100% SDK compatibility.

    4. Cross-Chain DeFi: Enable sophisticated DeFi operations across multiple blockchain networks.

    5. Avalanche Performance: Leverage Avalanche's high throughput and low fees for improved user experience.

    Why Landslide?

    Landslide creates interoperability between the Avalanche and Cosmos ecosystems, fostering a more interconnected and robust blockchain landscape. Developers can utilize Avalanche's performance while maintaining access to the rich Cosmos ecosystem. Users benefit from increased liquidity, a more comprehensive range of applications, and a streamlined experience across multiple networks.

    Getting Started

    To begin your journey with Landslide, explore the following sections:

    • Connecting to Landslide Wasm Testnet

    • Running Landslide Wasm Application Locally

    • Deploying Smart Contracts on Landslide

    Join us in shaping the future of interoperable blockchain technology with Landslide!