@version 1 condition triggered_by: transaction, on: set_secret_hash(_secret_hash, _secret_hash_signature, _end_time, _evm_pool), as: [ previous_public_key: ( # Transaction is not yet validated so we need to use previous address # to get the genesis address previous_address = Chain.get_previous_address() Chain.get_genesis_address(previous_address) == 0x00007038773E1FA4698176FC432F65EAF9B76758D1367AFCA5793CA653837135CA1E ) ] actions triggered_by: transaction, on: set_secret_hash(secret_hash, secret_hash_signature, end_time, evm_pool) do Contract.set_code """ @version 1 condition triggered_by: transaction, on: refund(secret, secret_signature), as: [ previous_public_key: ( previous_address = Chain.get_previous_address() Chain.get_genesis_address(previous_address) == 0x00007038773E1FA4698176FC432F65EAF9B76758D1367AFCA5793CA653837135CA1E ), timestamp: timestamp >= #{end_time} ] actions triggered_by: transaction, on: refund(secret, secret_signature) do Contract.set_type "transfer" # Send back the token to the user address Contract.add_token_transfer to: 0x00009D97E06EA7F60C3259CAF5A614ED134EE54159F6197B23642D8F81814442B70D, amount: 7.372e-5, token_address: 0x00002CEC79D588D5CDD24331968BEF0A9CFE8B1B03B8AEFC4454726DEF79AA10C125 Contract.set_code \""" @version 1 export fun info() do [ evm_pool: #{evm_pool}, ae_pool: 0x00007038773E1FA4698176FC432F65EAF9B76758D1367AFCA5793CA653837135CA1E, status: 2 # REFUNDED ] end export fun get_secret() do [ secret: 0x\#{secret}, secret_signature: [ r: 0x\#{secret_signature.r}, s: 0x\#{secret_signature.s}, v: \#{secret_signature.v} ] ] end \""" end condition triggered_by: transaction, on: reveal_secret(secret, secret_signature, _evm_contract), as: [ previous_public_key: ( # Transaction is not yet validated so we need to use previous address # to get the genesis address previous_address = Chain.get_previous_address() Chain.get_genesis_address(previous_address) == 0x00007038773E1FA4698176FC432F65EAF9B76758D1367AFCA5793CA653837135CA1E ), timestamp: transaction.timestamp < #{end_time}, content: Crypto.hash(String.to_hex(secret)) == 0x#{secret_hash} ] actions triggered_by: transaction, on: reveal_secret(secret, secret_signature, evm_contract) do Contract.set_type "transfer" Contract.add_token_transfer to: 0x00000000000000000000000000000000000000000000000000000000000000000000, amount: 7.372e-5, token_address: 0x00002CEC79D588D5CDD24331968BEF0A9CFE8B1B03B8AEFC4454726DEF79AA10C125 # Transfer fee is less than the minimum decimals Contract.set_code \""" @version 1 export fun info() do [ evm_contract: \#{evm_contract}, evm_pool: #{evm_pool}, ae_pool: 0x00007038773E1FA4698176FC432F65EAF9B76758D1367AFCA5793CA653837135CA1E, status: 1 # WITHDRAWN ] end export fun get_secret() do [ secret: 0x\#{secret}, secret_signature: [ r: 0x\#{secret_signature.r}, s: 0x\#{secret_signature.s}, v: \#{secret_signature.v} ] ] end \""" end export fun info() do [ evm_pool: #{evm_pool}, ae_pool: 0x00007038773E1FA4698176FC432F65EAF9B76758D1367AFCA5793CA653837135CA1E, status: 0 # PENDING ] end export fun get_htlc_data() do [ amount: 7.372e-5, end_time: #{end_time}, secret_hash: 0x#{secret_hash}, secret_hash_signature: [ r: 0x#{secret_hash_signature.r}, s: 0x#{secret_hash_signature.s}, v: #{secret_hash_signature.v} ] ] end """ end export fun info() do [ ae_pool: 0x00007038773E1FA4698176FC432F65EAF9B76758D1367AFCA5793CA653837135CA1E, status: 0 # PENDING ] end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
29060D9D36C1A0658CBE79115051EE47D72297FDDC092D6E5B54BF748C4ED3C8C8FBABEFFCD7C2BD354F6043A29B6755B82141BD84CFFB3B5C42C1D4
Authorized keys
- 000122A6CD9ED07E46835D6E88E5BD0BEE84C3F5E5DBF8E916AD9B2EC912C44AFEC2
Contract recipients (0)
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 0000D933...C925At 2025-04-02 12:42:28 UTCAmount 0.00000002 UCO
Previous public key
0001A093863A81E2CEEB77668156AB22C7C15A90AC3F77D47DA2163C2F58DD99A50A
Previous signature
448BE421AA54AF17C583697D06C222B19E694BCFE350B201B6943F7373F8E28575112013985AD1BC18682683A4C5B5366F769E5B30BF119A36559E1CA7DE530A
Origin signature
3045022100CF088855580F8ABE239ADF2978ACBC3EC3F8091279D9CECC39C11D41295633910220280EC720FC4C0D5BB68E7639401C51076A1A182420FCC9CD6B0FAC6BEC2400AA
Proof of work
010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6
Proof of integrity
0035792CB4B8569D059373D90C73AAE2D0592B9CC2354AE46061C8E2DA9CFE4E48
Coordinator signature
53F40FEE9275171451600AF27E6B9C5A111EF5C03F0084735B833C84BEDBD6CF93CCEA36B5F79CA8DB4DCFCB55ADCC2E2DB984397941D81DFBC0332FFB24BD0C
Validator #1 public key
000109B43DB3C5D2D70C2B435F48E71A00DD7BB43E108DEE12851675B65B0DFF3902
Validator #1 signature
55FD44D96F77C09F9BB51EAC7A18E62E815C2C89679D39424CE4F173EB8F1275ABBEBDA641D4255ECE603EC1BFFE9D7434AE9E06B095657B24AC2987C0A1C609
Validator #2 public key
0001959E3582B8A0A55C8B199B564D5B10C740A45E5EF6B782032C790C3AAF0BCC3E
Validator #2 signature
FBD0FA985ED1285427D35DA89A1F25BB73DF0E319222879FC994BF8F43EFF57E2332DE5226B397B3E3AB9245474963F312BCE489E601ACEB8710FB049B8A0004