# TKN Network Hackathon Bounties ## About TKN Network TKN is a decentralized token network similar to CoinGecko or CoinMarketCap, but with a unique focus on comprehensive multichain token data. Through our npm package `tkn`, we maintain detailed information about tokens across different blockchain networks, with special attention to their multichain addresses and ecosystem presence. ### Token Data Structure Each token in the TKN network contains two main categories of data: #### Public Token Values ```javascript [ "name", "symbol", "description", "url", "avatar", "notice", "twitter", "github", "farcaster", "farcasterChannel", "discord", "forum", "decimals", "dweb", "git", "governance", "snapshot", "tokenSupply", "circulatingSupply", "governanceContract", "version", "globalNamespace", "isChainWithChainID", "isChainWithCoinType" ] ``` #### Public Address Values ```javascript [ "tokenID", "chainID", "address", "nonEVMAddress", "coinTypeID", "deprecated" ] ``` These comprehensive data structures allow TKN to maintain accurate, cross-chain information about each token, making it a valuable resource for blockchain developers and users. ## Bounty 1: Solana Token Discovery Service **Prize Pool: $500 ($400 USDC + $100 TKN ) ** ### Overview Create a robust service that discovers and validates new tokens on the Solana blockchain, preparing them for submission to the TKN network. This service will help expand TKN's coverage of the Solana ecosystem. **Solana is chainId {"nonEVM": 501} for the TKN system** ### Technical Requirements #### Token Discovery - Implement a service that connects to Solana RPC nodes to scan for new token mints - Must be able to retrieve and validate SPL token metadata - Support parsing Metaplex metadata when available - Include rate limiting and error handling for RPC interactions - Implement proper logging and monitoring capabilities #### Data Validation - Validate discovered tokens against TKN's required fields: - Required Token Values: name, symbol, decimals - Optional Token Values: description, url, avatar, social links (twitter, github, discord, etc.) - Verify token activity and legitimacy metrics - Filter out spam tokens using appropriate heuristics - Implement proper error handling for malformed metadata #### Submission System - Create an automated submission pipeline to TKN - Implement the TKN npm package for submissions - Include retry logic and failure handling - Maintain a local database of processed tokens to avoid duplicates - Generate detailed submission reports ### Deliverables 1. Working token discovery service with documentation 2. Source code with clear comments and README 3. Configuration files for different network environments 4. Unit tests covering core functionality 5. Documentation of token validation criteria 6. Deployment instructions and requirements 7. Sample output logs and submission reports ### Evaluation Criteria - Code quality and organization - Robustness of token discovery mechanism - Effectiveness of spam filtering - Proper error handling and logging - Documentation quality - Test coverage ## Bounty 2: Token List Monitoring System **Prize Pool: $500 ($400 USDC + $100 TKN ) ** ### Overview Develop a automated system to monitor and process various on-chain token lists across multiple networks, identifying new tokens while avoiding duplicate submissions to the TKN network. ### Technical Requirements #### List Monitoring - Create a configurable cron job system for different time intervals - Support multiple token list formats and sources - Implement efficient differential analysis to identify new tokens - Include checkpoint system for tracking processed data #### Data Processing - Parse and validate token data against TKN's schema: - Process all PublicTokenValues fields - Handle PublicAddressValues appropriately - Support multi-chain address mapping - Implement proper data normalization - Handle chain-specific address formats - Maintain data consistency across different token lists #### Storage and State Management - Design efficient storage system for processed token data - Implement robust deduplication logic - Create backup and recovery mechanisms - Support horizontal scaling ### Deliverables 1. Working cron job implementation with documentation 2. Source code with comprehensive comments 3. Database schema and migration scripts 4. Configuration templates for different token lists 5. Testing suite with coverage reports 6. Monitoring and alerting setup 7. Performance optimization documentation 8. Deployment and maintenance guide ### Evaluation Criteria - System reliability and uptime - Processing efficiency - Data accuracy and validation - Error handling and recovery - Monitoring and logging quality - Code maintainability - Documentation completeness ### Additional Notes for Both Bounties - All submissions must be open source - Code should follow industry best practices - Additional points for projects containerized for easy deployment - Include comprehensive API documentation where applicable - Submissions must properly handle all TKN data fields - Special attention should be paid to cross-chain address mapping and validation