Expand description
Legalis-Chain: Smart contract export for Legalis-RS.
This crate provides export functionality to convert deterministic legal statutes into smart contracts (WASM/Solidity).
Structs§
- Access
Tier - Access tier specification.
- Account
Abstraction Config - ERC-4337 Account Abstraction configuration.
- AclConfig
- Access control list (ACL) configuration.
- Adaptive
Parameter Config - Adaptive contract parameter configuration.
- AiManaged
Treasury Config - AI-managed treasury configuration.
- AiModel
Config - AI model configuration for on-chain integration.
- AiVuln
Detection Config - AI-assisted vulnerability detection configuration.
- Allocation
Constraint - Asset allocation constraint.
- Audit
Preparation Config - Audit preparation configuration.
- Audit
Trail Config - Audit trail configuration.
- Autonomous
Enforcement Config - Autonomous enforcement agent configuration.
- Avatar
Rights Config - Avatar identity and rights configuration.
- Batch
Operation Config - Batch operation configuration.
- Biodiversity
Offset Config - Biodiversity offset configuration.
- Biometric
Config - Biometric verification configuration.
- Bridge
Config - Cross-chain bridge configuration.
- Bundler
Config - Bundler-compatible entry point configuration (ERC-4337).
- Carbon
Credit Config - Carbon credit tokenization configuration.
- CiCd
Config - CI/CD pipeline configuration.
- Circuit
Breaker Config - Circuit breaker configuration for emergency shutdown.
- Circular
Economy Config - Circular economy tracking configuration.
- Compliance
Monitoring Config - Compliance monitoring configuration.
- Compliance
Rule - Compliance rule specification.
- Contract
Generator - Smart contract generator.
- Contract
Visualization Config - Contract visualization configuration.
- Cross
Chain Settlement Config - Cross-chain settlement configuration.
- DaoConfig
- DAO (Decentralized Autonomous Organization) configuration.
- DaoStatute
Governance Config - DAO-based statute governance configuration.
- Decentralized
Arbitration Config - Decentralized arbitration configuration.
- Delay
Tolerant Verification Config - Delay-tolerant verification configuration.
- Deployment
Config - Deployment configuration.
- Dispute
Resolution Config - Dispute resolution configuration.
- DnaIdentity
Config - DNA-based identity configuration.
- Enforcement
Rule - Enforcement rule specification.
- Enterprise
Identity Config - Enterprise identity management configuration.
- Environmental
Monitoring Config - Real-time environmental monitoring configuration.
- Fair
Launch Config - Fair launch mechanism configuration.
- Formal
Verification Config - Formal verification configuration.
- Gdpr
Compliance Config - GDPR compliance configuration.
- Generated
Contract - Generated smart contract.
- Genetic
Privacy Config - Genetic privacy configuration.
- Health
Data Config - Health data oracle configuration.
- Impermanent
Loss Mitigation Config - Impermanent loss mitigation configuration.
- Incident
Response Config - Incident response playbook configuration.
- Incremental
Compilation Config - Incremental compilation configuration.
- Intelligent
Audit Config - Intelligent contract auditing configuration.
- Intent
Composition - Intent composition for complex transactions.
- Intent
Condition - Intent condition specification.
- Intent
Config - Intent-based architecture configuration.
- Intent
Constraint - Intent constraint.
- Intent
Specification - Intent specification for legal outcomes.
- IoTSensor
Config - IoT sensor integration configuration.
- Jurisdiction
Adaptation Config - Jurisdiction-specific adaptation configuration.
- KycAml
Config - KYC/AML compliance configuration.
- Latency
Tolerant Consensus Config - Latency-tolerant consensus configuration for space-based contracts.
- Lattice
Crypto Config - Lattice-based cryptography configuration.
- Layer2
Config - Layer 2 optimization configuration.
- Lazy
Evaluation Config - Lazy evaluation configuration.
- Legal
Clause Optimization Config - Automated legal clause optimization configuration.
- Life
Event Trigger Config - Life event trigger configuration.
- Liquidation
Cascade Config - Liquidation cascade prevention configuration.
- MLRisk
Assessment Config - ML-based risk assessment configuration.
- Metaverse
Portability Config - Cross-metaverse asset portability configuration.
- MevProtection
Config - MEV protection configuration.
- Mica
Compliance Config - MiCA compliance configuration.
- Modern
Testing Config - Modern testing tools configuration.
- Modular
Account Config - Modular account configuration for composable smart accounts.
- Modular
Contract - Modular contract output with multiple files.
- Multi
Network Config - Multi-network deployment configuration.
- Multi
Planetary Jurisdiction Config - Multi-planetary jurisdiction configuration.
- Multisig
Config - Multisig wallet configuration.
- Multisig
Threshold Config - Multi-signature threshold configuration.
- Natural
Language Contract Config - Natural language contract generation configuration.
- Network
Config - Single network configuration.
- Paymaster
Config - ERC-4337 Paymaster configuration.
- Performance
Target - Performance target specification.
- Personal
Legal Agent Config - Personal legal agent configuration.
- Planetary
Jurisdiction - Planetary jurisdiction specification.
- Portable
Legal Status Config - Portable legal status configuration.
- Predictive
Compliance Config - Predictive compliance monitoring configuration.
- Private
Statute Config - Private statute execution configuration.
- QkdConfig
- Quantum key distribution configuration.
- Quantum
Resistant Config - Quantum-resistant pattern configuration.
- Quantum
Safe Hash Config - Quantum-safe hash configuration.
- Rbac
Config - RBAC (Role-Based Access Control) configuration.
- Recursive
Proof Config - Recursive proof configuration.
- Regulatory
Rule - Regulatory rule specification.
- Reputation
Access Control Config - Reputation-based access control configuration.
- Reputation
Metric - Reputation metric specification.
- Satellite
Data Source - Satellite data source types.
- Satellite
Oracle Config - Satellite-based oracle configuration.
- SecCompliance
Config - SEC compliance configuration.
- Security
Analysis - Security analysis result.
- Security
Analyzer - Security analyzer for smart contracts.
- Self
Executing Regulatory Config - Self-executing regulatory contract configuration.
- SlaEnforcement
Config - SLA (Service Level Agreement) enforcement configuration.
- Solver
Network Config - Solver network configuration.
- Solver
Preferences - Solver preferences.
- SsiConfig
- Self-sovereign identity configuration.
- Streaming
Output Config - Streaming output configuration.
- Supply
Chain Config - Supply chain verification configuration.
- Test
Suite Config - Test suite configuration.
- Threat
Modeling Config - Threat modeling configuration.
- Time
Dilated Temporal Config - Time-dilated temporal validity configuration.
- Time
Travel Debug Config - Time-travel debugging configuration.
- Token
Config - Token configuration for generation.
- Treasury
Config - Treasury management configuration.
- Twap
Config - Time-weighted average price (TWAP) oracle configuration.
- Vesting
Config - Vesting schedule configuration.
- Virtual
Governance Config - Virtual governance configuration.
- Virtual
Property Config - Virtual property rights configuration.
- Vulnerability
- Detected vulnerability.
- ZkCircuit
Config - Zero-knowledge circuit configuration.
- ZkProof
Config - Zero-knowledge proof configuration for privacy-preserving patterns.
Enums§
- Adaptation
Strategy - Adaptation strategy for contract parameters.
- AiModel
Type - AI model types.
- Arbitration
Type - Arbitration types for decentralized arbitration networks.
- Audit
Severity - Audit severity levels.
- Avatar
Right Type - Avatar rights types.
- Biometric
Type - Biometric verification types.
- Carbon
Credit Type - Carbon credit types for tokenization.
- Celestial
Body - Celestial bodies.
- Chain
Error - Errors during contract generation.
- Clause
Type - Legal clause types for optimization.
- Compliance
Mode - Compliance monitoring modes.
- Compliance
Rule Type - Compliance rule types.
- Compliance
Severity - Compliance severity levels.
- Conflict
Resolution Method - Conflict resolution methods for multi-planetary jurisdictions.
- Delay
Tolerant Method - Delay-tolerant verification methods.
- Enforcement
Action - Enforcement actions.
- Enforcement
Severity - Enforcement severity levels.
- Environmental
Metric - Environmental monitoring metrics.
- Execution
Order - Execution order for composed intents.
- Failure
Handling - Failure handling strategy.
- Flash
Loan Protection - Flash loan protection strategy.
- Genetic
Privacy Level - Genetic privacy protection levels.
- Health
Data Type - Health data types.
- Identity
Provider - Enterprise identity provider type.
- Inference
Mode - Inference mode for AI models.
- Intent
Condition Type - Intent condition types.
- Intent
Constraint Type - Intent constraint types.
- IoTSensor
Type - IoT sensor types for environmental monitoring.
- Jurisdiction
- Jurisdiction type for regulatory compliance.
- Lattice
Crypto Pattern - Lattice-based cryptography patterns.
- Layer2
Platform - Layer 2 platforms.
- Legal
Status Type - Legal status types for portable legal status contracts.
- Life
Event Type - Life event types for trigger contracts.
- Metaverse
Platform - Metaverse platforms for asset portability.
- MevProtection
Strategy - MEV protection strategy.
- NLPModel
- Natural language processing models for contract generation.
- Paymaster
Type - Paymaster implementation type.
- Pipeline
Type - CI/CD pipeline types.
- Proxy
Pattern - Proxy pattern type for upgradeable contracts.
- QkdProtocol
- Quantum key distribution protocols.
- Quantum
Resistant Pattern - Quantum-resistant cryptographic patterns.
- Quantum
Safe Hash - Quantum-safe hash functions.
- Regulatory
Framework - Regulatory framework type.
- Reputation
Calculation - Reputation calculation methods.
- Risk
Type - Risk assessment types.
- Satellite
Constellation - Satellite constellation types.
- Satellite
Data Type - Satellite data types.
- Severity
- Severity level.
- SsiStandard
- Self-sovereign identity standards.
- Target
Platform - Target platform for contract generation.
- Threat
Modeling Type - Threat modeling documentation type.
- Token
Standard - Token standard types.
- Treasury
Strategy - Treasury management strategies.
- Verification
Method - Verification methods for regulatory compliance.
- Verification
Priority - Verification priority levels.
- Virtual
Property Type - Virtual property types.
- Vulnerability
Type - Security vulnerability types.
- ZkProof
System - Zero-knowledge proof system types.
Type Aliases§
- Chain
Result - Result type for chain operations.