Automate your funds with encrypted, conditional policies executed by Chainlink CRE workflows
Kondor turns your ENS subdomain into a programmable wallet. Configure token-specific policies through a visual flow builder — swap on Uniswap, lend on AAVE, forward to a wallet, or route privately through Railgun, with conditional branches. Policies are encrypted client-side and executed on-chain by Chainlink CRE. The app also uses a ENS custom resolver to implement the stealth addresses technology: each time your ENS subdomain is resolved, it generates a new address that is unlinked to the previous one. Each of these stealth addresses converge on Railgun or Monerium to avoid degrading your privacy by aggregation and relationships
The core hack is end-to-end encrypted policies living in ENS text records and stealth addresses resolutions. In the browser, the user signs a deterministic message with their Privy embedded wallet (silent signing), we SHA-256 the sig into an x25519 key, do ECDH with the CRE's public key, HKDF it down to a 16-byte AES-128 key, and write the ciphertext into a kondor-policy ENS text record alongside the plaintext destination wallet. Only the CRE can decrypt it.
When tokens arrive to one of the generated stealth addresses, an HTTP-triggered CRE workflow decrypts the policy, fetches prices, evaluates the condition tree, asks our server for Uniswap EIP-5792 batch-swap calldata, simulates via eth_call, and writes a signed report to KondorRegistry onchain. The registry CREATE2-deploys a SimpleAccount per-user stealth address (predicted from hashedOwner + salt) and executes the batch. A second event-triggered workflow listens for ReportProcessed logs, Multicall3s balanceOf across touched tokens to hand off the amount to the user's Railgun wallet.
Partners:
Other technologies:

