If you have any issues with Lit SDK, general questions about Lit Protocol, or feature requests with Lit, please post them here - Issues and Reports GitHub Repo.| developer.litprotocol.com
You can create a Lit Action Condition to grant access whenever a given Lit Action meets the conditions you set. Lit Actions are JS code that can be executed on the Lit Protocol network. You can use Lit Actions to create custom access control conditions.| developer.litprotocol.com
This page defines how to create access control conditions (referred to as evmContractConditions in the code) based on any smart contract call on an EVM (Ethereum) compatible network. You may pass any function ABI, and define the returnValueTest under which access should be granted.| developer.litprotocol.com
Lit Protocol supports boolean logic when checking conditions. Use an object with the "operator" property set to "and" or "or" to combine conditions.| developer.litprotocol.com
Lit extends its functionality across many blockchains, enabling the signing of data/transactions and setting up precise access control conditions using on-chain state.| developer.litprotocol.com
Save Data Encrypted with Lit Protocol to the Ceramic Network on ComposeDB| developer.litprotocol.com
Lit is launching three new networks, Datil-dev, Datil-test, and Datil, to improve performance and stability for production users compared to previous Lit networks like Cayenne, Manzano, and Habanero.| developer.litprotocol.com
Lit mainnets are designed for late-stage development and production deployment. If you are storing assets with real world value, it should be done on the mainnets and not the testnets. While mainnets may be deprecated in the future, assets will be transferable to new networks.| developer.litprotocol.com
Lit is an internet native security network for signing and encryption. With Lit, you can create and control keys and run code for virtually any application that can be made private, immutable, and / or autonomous.| developer.litprotocol.com
Session signatures work by having scoped capabilities be granted to session keys by an inner AuthSig. The capability object is a SIWE ReCap object.| developer.litprotocol.com
Like other decentralized networks, Lit has a certain amount of computation available for users that's metered to allow for a responsive network with nodes that are able to stay in-sync with one another.| developer.litprotocol.com
Lit Protocol is a decentralized key management network for programmable signing and encryption. The network empowers developers to create secure, decentralized applications that manage crypto assets, private data, and user authority seamlessly across platforms, with no single point of failure or centralized authority.| developer.litprotocol.com
Wrapped Keys are a secure and flexible key management solution provided by Lit Protocol. They offer a unique approach to handling private keys, combining the security of encryption with the programmability of Lit Actions to offer private key signing to a broader range of blockchain networks.| developer.litprotocol.com
This page defines some basic access control conditions (referred to as accessControlConditions in the code) based on standard contract types like ERC20, ERC721, and ERC1155 for EVM (Ethereum) chains. Also included are some conditions like wallet address ownership, proof of humanity, and POAP possession. You may set your conditions, and define the returnValueTest under which access should be granted.| developer.litprotocol.com
Please do not cache Session Signatures, and instead generate them on-demand.| developer.litprotocol.com
Ensure you have the following requirements in place:| developer.litprotocol.com
Programmable Key Pairs (PKPs) are ECDSA public/private key pairs created by the Lit network using Distributed Key Generation (DKG). Each Lit node holds a share of the private key, and more than two-thirds of these shares must be collected to execute a given action (i.e. signing a transaction).| developer.litprotocol.com
Authentication methods are ways of assigning Programmable Key Pairs (PKP) to a specific account resource. This requires individuals to authenticate before performing operations requiring a PKP. This is a powerful feature of the Lit network as it means users can sign up for a wallet the same way they sign up for other types of digital resources, thus lowering the barrier to accessing web3 enabled applications.| developer.litprotocol.com
Lit Actions are immutable JavaScript programs that run on a decentralized Lit network. They enable powerful, blockchain-agnostic applications with built-in cryptographic capabilities like signing and encryption.| developer.litprotocol.com
Breaking Changes & Important Updates| developer.litprotocol.com
Docusaurus blogging features are powered by the blog plugin.| Lit Protocol Blog
Blog posts support Docusaurus Markdown features, such as MDX.| Lit Protocol Blog
This is the summary of a very long blog post,| Lit Protocol Blog
Test networks are designed for early-stage application development. Storing assets with real world value on these networks is highly discouraged and minted PKPs may be deleted. All test networks may be deprecated in the future.| developer.litprotocol.com
With the release of Chronicle Yellowstone, Chronicle is going to be deprecated, and should no longer be used.| developer.litprotocol.com