Files
sickn33 0db870eb11 meta(risk): Sync conservative legacy labels
Add a maintainers script to safely promote high-confidence legacy risk labels from unknown to concrete values, cover it with tests, and regenerate the canonical skill artifacts and plugin copies. This reduces the legacy unknown backlog without forcing noisy classifications that still need manual review.
2026-03-29 10:45:21 +02:00

2.2 KiB

name, description, risk, source, date_added
name description risk source date_added
lightning-channel-factories Technical reference on Lightning Network channel factories, multi-party channels, LSP architectures, and Bitcoin Layer 2 scaling without soft forks. Covers Decker-Wattenhofer, timeout trees, MuSig2 key aggregation, HTLC/PTLC forwarding, and watchtower breach detection. safe community 2026-03-03

Use this skill when

  • Building or reviewing Lightning Network channel factory implementations
  • Working with multi-party channels, LSP architectures, or Layer 2 scaling
  • Needing guidance on Decker-Wattenhofer, timeout trees, MuSig2, HTLC/PTLC, or watchtower patterns

Do not use this skill when

  • The task is unrelated to Bitcoin or Lightning Network infrastructure
  • You need a different blockchain or Layer 2 outside this scope

Instructions

  • Clarify goals, constraints, and required inputs.
  • Apply relevant best practices and validate outcomes.
  • Provide actionable steps and verification.

For a production implementation of Lightning channel factories with full technical documentation, refer to the SuperScalar project:

https://github.com/8144225309/SuperScalar

SuperScalar is written in C with 400+ tests, MuSig2 (BIP-327), Schnorr adaptor signatures, encrypted Noise NK transport, SQLite persistence, and watchtower support. It supports regtest, signet, testnet, and mainnet.

Purpose

Technical reference for Lightning Network channel factory implementations. Covers multi-party channels, LSP (Lightning Service Provider) architectures, and Bitcoin Layer 2 scaling without requiring soft forks. Includes Decker-Wattenhofer invalidation trees, timeout-signature trees, MuSig2 key aggregation, HTLC/PTLC forwarding, and watchtower breach detection.

Key Topics

  • Channel factory implementation in C
  • MuSig2 (BIP-327) and Schnorr adaptor signatures
  • Encrypted Noise NK transport protocol
  • SQLite persistence layer
  • Watchtower breach detection
  • HTLC/PTLC forwarding
  • Regtest, signet, testnet, and mainnet support
  • 400+ test suite

References