The StableTrust SDK by Fairblock provides a robust interface for executing confidential transfers using homomorphic encryption and zero-knowledge proofs. This package enables developers to integrate confidentiality features directly into their applications, allowing for secure token deposits, private transfers, and withdrawals while maintaining the integrity and auditability of the underlying blockchain transactions.
For a comprehensive technical understanding of the architecture and cryptographic primitives, please refer to the following documentation:
- Technical Overview: Fairblock Confidential Transfers
- StableTrust Protocol: StableTrust Documentation
- Confidential Transactions: Transaction Mechanics
Before using this SDK, ensure you have the following installed:
- Node.js: Version 16.0 or higher
- npm or yarn: For package management
- ethers.js: Version 6.0 or higher (automatically installed as a dependency)
To install the package in your project, execute the following command:
npm install @fairblock/stabletrustOr with yarn:
yarn add @fairblock/stabletrustThe following contract addresses are available for confidential transfers on testnet networks. These are test deployments and should not be used with mainnet assets:
| Network(Testnet) | Chain ID | Contract Address |
|---|---|---|
| Stable | 2201 | 0xb0b461aFA69b715d842c7fAb602f50D4cef83fe5 |
| Arc | 1244 | 0xEa837218c7Ccd9eA1BCfB640e5c6aFE59952b4FA |
| Base | 84532 | 0x1a06530765e942a1D26B74d9558e9a1EdA615867 |
| Ethereum | 11155111 | 0xABEa3399873b80f528Ee76286087b45ed38Fbf97 |
| Arbitrum | 421614 | 0x2131De660C6be8b535E6f17E171bFf7143E9E9F4 |
| Tempo | 42431 | 0xF3525FF8F592883f8fA2d89EfBe85637955Df487 |
The SDK revolves around the ConfidentialTransferClient, which manages interactions with the confidential transfer contract and handles the necessary cryptographic operations.
Import and initialize the client with your network configuration.
import { ConfidentialTransferClient } from "@fairblock/stabletrust";
import { ethers } from "ethers";
// Configuration for Base Sepolia (uses SDK default StableTrust contract for chainId 84532)
const client = new ConfidentialTransferClient(
"https://sepolia.base.org",
84532,
);If you are using a custom deployment, you can still pass an explicit contract address:
const customClient = new ConfidentialTransferClient(
"https://sepolia.base.org",
"0xYourCustomStableTrustContract",
84532,
);For testnet networks listed above, use the following configurations:
// Stable testnet
const stableClient = new ConfidentialTransferClient(
"https://rpc.testnet.stable.xyz",
2201,
);
// Arc testnet
const arcClient = new ConfidentialTransferClient("https://rpc.arc.xyz", 1244);
// Tempo (Stablecoin chain with special fee handling)
const tempoClient = new ConfidentialTransferClient(
"https://tempo-rpc.example.com",
42431,
);Note on Tempo Chain: The Tempo network (chainId 42431) uses token-based fees instead of native currency. The SDK automatically handles fee payment using PathUSD when detected.
When interacting with the SDK for deposit, transfer, and withdraw operations, you should parse the token amount using the underlying token's decimals. When displaying the fetched balance, format it using the token's decimals.
- To deposit, transfer, or withdraw tokens, parse the amount using
ethers.parseUnits(amount, tokenDecimals). - To display a balance, format the raw amount using
ethers.formatUnits(balance.amount, tokenDecimals).
Recommended helpers (consistent with examples):
// Fetch or define your token's decimals (e.g., 6 for USDC)
const tokenDecimals = 6;
const amountToDeposit = ethers.parseUnits("0.1", tokenDecimals);
await client.confidentialDeposit(signer, tokenAddress, amountToDeposit);
const amountToTransfer = ethers.parseUnits("0.05", tokenDecimals);
await client.confidentialTransfer(
signer,
recipientAddress,
tokenAddress,
amountToTransfer,
);
const amountToWithdraw = ethers.parseUnits("0.02", tokenDecimals);
await client.withdraw(signer, tokenAddress, amountToWithdraw);
const balance = await client.getConfidentialBalance(
signer.address,
privateKey,
tokenAddress,
);
console.log("Balance:", ethers.formatUnits(balance.amount, tokenDecimals));The following methods are the primary entry points for interacting with the confidential system.
Fetches account core information from the contract.
- Parameters:
address(string): The account address.
- Returns: Contract account data (exists, finalized, pubkey, etc.).
Initializes or retrieves the cryptographic keys associated with an account. This step is required before performing any confidential operations. Automatically creates the account on-chain if it doesn't exist.
- Parameters:
signer(ethers.Signer): The ethers.js signer instance for the user.options(object, optional):waitForFinalization(boolean): Wait for account finalization. Default:truemaxAttempts(number): Maximum attempts to check finalization. Default:30
- Returns: An object containing the user's private and public keys for the confidential system.
Retrieves the decrypted available and pending balances for a specific token, plus the total.
- Parameters:
address(string): The account address.privateKey(string): The private key for decryption.tokenAddress(string): The token contract address.
- Returns: An object containing:
amount(bigint): The total (available + pending)available(object):{ amount, ciphertext }pending(object):{ amount, ciphertext }
Deposits a specified amount of ERC20 tokens into the confidential contract, converting them into a "pending" confidential balance.
- Parameters:
signer(ethers.Signer): The transaction signer.tokenAddress(string): The contract address of the ERC20 token.amount(bigint | string | number): The amount to deposit, parsed with token decimals.options(object, optional):waitForFinalization(boolean): Wait for deposit finalization. Default:true
- Returns: A transaction receipt.
Executes a confidential transfer of tokens from the sender to a recipient. The amount and nature of the transfer are encrypted.
- Parameters:
signer(ethers.Signer): The sender's signer.recipientAddress(string): The public address of the recipient.tokenAddress(string): The token contract address.amount(bigint | string | number): The amount to transfer, parsed with token decimals.options(object, optional):useOffchainVerify(boolean): Use offchain verification. Default:falsewaitForFinalization(boolean): Wait for transfer finalization. Default:true
- Returns: A transaction receipt.
Withdraws funds from the confidential "available" balance back to the public layer (ERC20 tokens).
- Parameters:
signer(ethers.Signer): The user's signer.tokenAddress(string): The token contract address.amount(bigint | string | number): The amount to withdraw, parsed with token decimals.options(object, optional):useOffchainVerify(boolean): Use offchain verification. Default:falsewaitForFinalization(boolean): Wait for withdrawal finalization. Default:true
- Returns: A transaction receipt.
For a complete implementation demonstrating the full lifecycle of a confidential transaction—from deposit to withdrawal—please refer to the examples/complete-flow.js file included in this repository.
Additional examples are available in the examples/ directory:
- complete-flow.js: Full workflow example covering all operations
- simple-snippets.js: Quick code snippets for common tasks
The SDK provides descriptive error messages for common issues. Here are some typical scenarios:
try {
await client.confidentialTransfer(
signer,
recipientAddress,
tokenAddress,
amount,
);
} catch (error) {
if (error.message.includes("Insufficient balance")) {
console.error("Transfer amount exceeds available balance");
} else if (error.message.includes("Proof generation failed")) {
console.error("Failed to generate transfer proof");
} else if (error.message.includes("Account finalization timeout")) {
console.error("Account setup is still processing");
} else {
console.error("Transfer failed:", error.message);
}
}| Issue | Cause | Solution |
|---|---|---|
| "Account does not exist" | Recipient hasn't initialized their confidential account | Recipient must call ensureAccount() first |
| "Insufficient balance" | Transfer amount exceeds available confidential balance | Deposit more tokens or reduce transfer amount |
| "Insufficient fee token balance" | Not enough PathUSD on Tempo chain for fees | Top up fee token balance before transferring |
| "Account finalization timeout" | Account creation is still processing | Wait a few minutes and retry the operation |
| "Proof generation failed" | Invalid inputs or cryptographic operation error | Verify all parameters and ensure sufficient balance |
The following are estimated execution times for standard operations within the confidential flow. Please note that these durations may vary based on network congestion and client hardware performance.
The following are estimated execution times for standard operations within the confidential flow. Please note that these durations may vary based on network congestion and client hardware performance.
| Operation | Avg Duration |
|---|---|
| Creation | 45s |
| Deposit | 63s |
| Transfer | 58s |
| Withdraw | 58s |
When using the StableTrust SDK, follow these best practices to ensure the security of your confidential transactions:
-
Private Key Management
- Never expose or log private keys or seed phrases
- Store private keys securely (e.g., hardware wallets, encrypted vaults)
- Derived keys are sensitive cryptographic material—handle with care
-
Signer Security
- Use secure signer implementations (e.g., hardware wallets, encrypted key stores)
- Avoid using signers with exposed private keys in production
- Keep your ethers.js provider and signer in sync with your security setup
-
Network Security
- Use HTTPS-only RPC endpoints
- Verify contract addresses before initialization to prevent man-in-the-middle attacks
- Consider using dedicated RPC providers for production environments
-
Account Initialization
- Always call
ensureAccount()before performing any confidential operations - Verify that recipient accounts exist before transferring funds
- Allow sufficient time for account finalization before proceeding with operations
- Always call
-
Balance Verification
- Check available balance before initiating transfers
- Be aware of transaction fees that may vary by network
- On Tempo chain, ensure sufficient PathUSD balance for fee payment
- Error Handling
- Implement comprehensive error handling for all SDK operations
- Log errors appropriately without exposing sensitive information
- Implement retry logic for transient failures (network timeouts, etc.)
- Website: https://app.stabletrust.io/
- Documentation: https://docs.fairblock.network/docs/confidential_transfers/confidential_transactions
- Twitter: https://twitter.com/0xfairblock
- GitHub: https://github.com/fairblock
This package is licensed under the Apache-2.0 License. See the LICENSE file in the repository for details.