ERC-733: TEE-EVM Co-processing

A proposed standard for confidential, scalable, and verifiable off-chain computation on Ethereum.

Why ERC-733?

TEE+EVM is one of the most promising and widely deployed architectures for bringing confidentiality, scalability, and verifiable off-chain computation to Ethereum. But despite growing adoption across agents, oracles, bridges, fintech, and private exchange infrastructure, no shared ERC standard exists. ERC-733 fills that gap with a framework for attestation, replication, interoperability, and security stages for TEE+EVM systems.

What the Spec Covers

Attestation Layer

Proves that trusted code is running inside an attested enclave and links deployment integrity to on-chain verification.

Replication Layer

Defines how secrets and application state can be securely replicated for scaling, crash recovery, and upgrades.

Interoperability Layer

Covers how enclaves interact with users, blockchains, peer enclaves, and Web2 services through secure interfaces.

Security Stages

Introduces a Stage 0–3 framework for evaluating the security posture and maturity of TEE+EVM systems.

Example Use Cases

Trustless Agents

AI agents with verifiable execution and trust-minimized coordination.

Private DEXs

High-speed exchange systems that preserve privacy while maintaining trustless guarantees.

Fintech

Compliant financial applications with confidentiality, auditability, and Web2 integrations.

Oracles

Off-chain data delivery with attestable integrity and secure access to external resources.

Bridges

Cross-chain systems strengthened by attested enclaves, replication, and additional defense depth.

DAO Governance

Private or complex governance workflows executed securely with on-chain accountability.

Security Stages

ERC-733 proposes a staged model for evaluating TEE+EVM systems, from early prototypes to architectures that minimize dependence on developers, operators, and eventually vendors.

  1. Stage 0

    Prototype / ruggable

  2. Stage 1

    Dev-proof

  3. Stage 2

    Decentralized TEE network

  4. Stage 3

    Trustless TEE

From incomplete trust chains to fully trust-minimized confidential computation.

Reference Implementations

View in Appendix F in the draft

Authors & Contact

Justin Zhang (@voidcenter, Sparsity),Andrew Miller (@amiller, Teleport)

For comments, contributions, or discussion:

contact@erc733.org