This file provides guidance for AI assistants working with the Lux node codebase.
Lux blockchain node implementation - a high-performance, multi-chain blockchain platform written in Go. Features multiple consensus engines (Chain, DAG, PQ), EVM compatibility, and a multi-chain architecture with specialized capabilities.
Key Context:
- Fork of Avalanche with Lux-specific enhancements
- Network ID: 96369 (Lux Mainnet), 96368 (Testnet), 96370 (Devnet)
- Go Version: 1.26.1+
- Database: ZapDB (primary, default)
# Build node binary
./scripts/run_task.sh build
# Output: ./build/luxd
# Build specific components
go build -o luxd ./app# Run all tests
go test ./... -count=1
# Run specific package
go test ./vms/platformvm/state -count=1
# With race detection
go test -race ./...# Generate mocks
go generate ./...
# Regenerate protobuf
./scripts/run_task.sh generate-protobuf# Mainnet
./build/luxd
# Testnet
./build/luxd --network-id=testnet
# Local network
lux network start| Chain | Purpose | VM |
|---|---|---|
| P-Chain | Staking, validators, L1 validators | PlatformVM |
| X-Chain | UTXO-based asset exchange | ExchangeVM (AVM) |
| C-Chain | EVM smart contracts | EVM |
| D-Chain | DEX (order book, perpetuals) | DexVM |
| T-Chain | Threshold FHE operations | ThresholdVM |
| Q-Chain | Post-quantum cryptography | Ringtail signatures |
Located in /consensus/ (separate package via go.mod replace):
- Chain Engine: Linear blockchain consensus
- DAG Engine: Directed acyclic graph for parallel processing
- PQ Engine: Post-quantum consensus
Located in /vms/:
- platformvm: Staking, validation, network management
- avm/exchangevm: Asset transfers, UTXO model
- dexvm: DEX with order book, perpetuals, AMM
- thresholdvm: Threshold FHE for confidential computing
- proposervm: Block proposer wrapper VM
p2p.Sender (from github.com/luxfi/p2p):
type Sender interface {
SendRequest(ctx context.Context, nodeIDs set.Set[ids.NodeID], requestID uint32, request []byte) error
SendResponse(ctx context.Context, nodeID ids.NodeID, requestID uint32, response []byte) error
SendError(ctx context.Context, nodeID ids.NodeID, requestID uint32, errorCode int32, errorMessage string) error
SendGossip(ctx context.Context, config SendConfig, msg []byte) error
}Keychain Interfaces (from github.com/luxfi/keychain):
type Signer interface {
SignHash([]byte) ([]byte, error)
Sign([]byte) ([]byte, error)
Address() ids.ShortID
}
type Keychain interface {
Get(addr ids.ShortID) (Signer, bool)
Addresses() set.Set[ids.ShortID]
}- ✅
github.com/luxfi/node - ✅
github.com/luxfi/geth(NOT go-ethereum) - ✅
github.com/luxfi/consensus - ✅
github.com/luxfi/keychain - ✅
github.com/luxfi/ledger - ✅
github.com/luxfi/lattice(FHE) - ❌
github.com/ava-labs/* - ❌
github.com/ethereum/go-ethereum
Avoid conflicts with consensus packages:
import (
platformblock "github.com/luxfi/node/vms/platformvm/block"
consensusblock "github.com/luxfi/consensus/engine/chain"
)LUX uses 6 decimals (microLUX base unit) on P-Chain/X-Chain:
| Unit | Value |
|---|---|
| µLUX (MicroLux) | 1 (base) |
| mLUX (MilliLux) | 1,000 |
| LUX | 1,000,000 |
| TLUX (TeraLux) | 10^18 |
Supply Cap: 2 trillion LUX (2 × 10^18 µLUX)
C-Chain uses standard EVM 18 decimals (Wei).
See utils/units/lux.go for constants.
github.com/luxfi/genesis (JSON config) → github.com/luxfi/node/genesis/builder (type conversion)
- Genesis package has no node dependencies
- Builder package handles type conversions (string → ids.NodeID, uint64 → time.Duration)
These require CGO for full functionality (graceful fallback when disabled):
consensus/quasar- GPU NTT accelerationvms/thresholdvm/fhe- GPU FHE operationsx/blockdb- zstd compression
Located in vms/thresholdvm/fhe/:
- Uses
github.com/luxfi/lattice/multipartyfor DKG - Lattice-based cryptography only (no fallbacks)
- Threshold decryption via Warp messaging
Precompile Addresses:
| Precompile | Address |
|---|---|
| Fheos | 0x0200000000000000000000000000000000000080 |
| ACL | 0x0200000000000000000000000000000000000081 |
| InputVerifier | 0x0200000000000000000000000000000000000082 |
| Gateway | 0x0200000000000000000000000000000000000083 |
ZAP is the default high-performance binary wire protocol for VM<->Node communication. gRPC support is available via build tag for testing/compatibility.
Build Tags:
go build # ZAP only (default, production)
go build -tags=grpc # gRPC support (for testing/compatibility)Key Packages:
github.com/luxfi/api/zap- Core wire protocol and message typesgithub.com/luxfi/vm/rpc/sender- p2p.Sender over ZAP/gRPCvms/rpcchainvm/sender/- Node-side sender implementationvms/platformvm/warp/zwarp/- ZAP-based warp signing client/server
Wire Protocol Format:
[4 bytes: length][1 byte: message type][payload...]
Performance Benefits:
- Zero-copy serialization (buffer pooling via sync.Pool)
- ~5-10x faster serialization than protobuf
- ~2-3x lower latency (no HTTP/2 overhead)
- ~30-50% CPU reduction on hot paths
Sender Usage:
// ZAP transport (default)
s := sender.ZAP(zapConn)
// gRPC transport (requires -tags=grpc build)
s := sender.GRPC(senderpb.NewSenderClient(grpcConn))Warp over ZAP:
The zwarp package implements warp signing via ZAP:
// Client implements warp.Signer over ZAP
client := zwarp.NewClient(zapConn)
sig, err := client.Sign(unsignedMsg)
// BatchSign for HFT optimization
sigs, errs := client.BatchSign(messages)The node supports RNS as an alternative transport layer alongside TCP/IP, enabling mesh networking, LoRa connectivity, and offline-first validator operation.
Specification: LP-9701
The net/endpoints package supports three addressing modes:
// IP address
endpoint := endpoints.NewIPEndpoint(netip.MustParseAddrPort("203.0.113.50:9631"))
// Hostname (DNS resolved)
endpoint, _ := endpoints.NewHostnameEndpoint("validator.example.com", 9631)
// RNS destination (mesh/LoRa)
endpoint, _ := endpoints.NewRNSEndpointFromHex("rns://a5f72c3d4e5f60718293a4b5c6d7e8f9")| File | Purpose |
|---|---|
net/endpoints/endpoint.go |
Unified endpoint abstraction (IP, hostname, RNS) |
network/dialer/rns_transport.go |
RNS transport implementation |
network/dialer/rns_identity.go |
Classical identity (Ed25519 + X25519) |
network/dialer/rns_identity_pq.go |
Hybrid PQ identity (+ ML-DSA + ML-KEM) |
network/dialer/rns_link.go |
Encrypted link protocol with PQ support |
network/dialer/rns_announce.go |
Destination discovery and announcements |
# ~/.lux/config.yaml
rns:
enabled: true
configPath: ~/.lux/reticulum
announceInterval: 5m
interfaces:
- AutoInterface
- TCPClientInterface
linkTimeout: 30s
postQuantum: true # Enable hybrid PQ mode
requirePostQuantum: false # Allow classical-only peersRNS transport supports hybrid post-quantum cryptography combining classical algorithms with NIST-standardized post-quantum primitives (TLS 1.3-like approach).
| Purpose | Classical | Post-Quantum | Security |
|---|---|---|---|
| Identity Signing | Ed25519 | ML-DSA-65 | NIST Level 3 |
| Key Exchange | X25519 | ML-KEM-768 | NIST Level 3 |
| Session Encryption | AES-256-GCM | - | 256-bit |
| Key Derivation | HKDF-SHA256 | - | - |
- Ephemeral Keys: Fresh X25519 + ML-KEM keypairs generated per session
- Key Destruction: Ephemeral private keys zeroed after handshake
- Hybrid Derivation:
combined_secret = X25519_shared || ML_KEM_shared - Defense-in-Depth: Secure if either algorithm remains unbroken
| Component | Classical | Hybrid | Delta |
|---|---|---|---|
| Public Identity | 64 bytes | ~3.2 KB | +3.1 KB |
| Signature | 64 bytes | ~2.5 KB | +2.4 KB |
| Key Exchange | 64 bytes | ~1.2 KB | +1.1 KB |
| Handshake Total | ~256 bytes | ~7.5 KB | +7.2 KB |
- Capability Exchange: Handshake advertises PQ support
- Graceful Fallback: Falls back to classical if peer lacks PQ
- Mixed Networks: PQ and classical validators coexist
- Policy Enforcement:
requirePostQuantum: truerejects classical peers
# Run hybrid PQ tests
go test -v -run "TestHybrid" ./node/network/dialer/... -count=1
# Key tests:
# - TestHybridIdentity_SignVerify (ML-DSA-65 signatures)
# - TestHybridIdentity_Encapsulate_Decapsulate (ML-KEM-768)
# - TestHybridRNSLink_Handshake (full hybrid handshake)
# - TestHybridRNSLink_ForwardSecrecy (ephemeral key destruction)
# - TestHybridToClassical_Fallback (backward compatibility)Node's rpcchainvm implements p2p.Sender (from github.com/luxfi/p2p) for cross-chain messaging.
The sender package is a gRPC implementation of p2p.Sender.
Nodes don't automatically track chains. Use:
--track-chains=<ChainID>Or create config: ~/.lux/runs/.../node*/chainConfigs/<ChainID>.json
Mainnet genesis requires Cancun fork config:
"blobSchedule": {
"cancun": {
"max": 6,
"target": 3,
"baseFeeUpdateFraction": 3338477
}
}CLI creates new directories on restart. Use snapshots:
lux network save --snapshot-name <name>
lux network start --snapshot-name <name>For importing pre-merge blocks, Shanghai must be active based on ShanghaiTime, not merge status.
Problem: "db contains invalid genesis hash" error when restarting nodes.
Cause: Genesis bytes are rebuilt from JSON config on each start. Due to non-deterministic JSON serialization (map iteration order), the rebuilt bytes differ from the original, causing hash mismatch.
Solution: Genesis bytes are now cached to genesis.bytes file in the node's data directory. On subsequent restarts, the cached bytes are used directly. This happens automatically when using --genesis-file.
Problem: "failed to parse config: unknown codec version" for T-Chain (ThresholdVM) or Z-Chain (ZKVM) in dev mode.
Cause: Two issues:
- Genesis builder passes JSON config (
{"version":1,"message":"..."}) to VMs that expect binary codec format - Dev mode's automining config injection converts all chain configs to JSON, breaking binary-codec VMs
Solution:
genesis/builder/builder.go: T-Chain and Z-Chain use[]byte(config.TChainGenesis)(empty bytes for defaults) instead ofgetGenesis()which returns JSONchains/manager.go:injectAutominingConfigonly injects forEVMID, skipping binary-codec VMs
Alternative: Use --genesis-raw-bytes flag to pass base64-encoded pre-built genesis bytes directly.
| Item | Path |
|---|---|
| luxd binary | ~/.lux/bin/luxd/luxdv*/luxd |
| VM plugins | ~/.lux/plugins/<VMID> |
| Network runs | ~/.lux/runs/local_network/network_* |
| Snapshots | ~/.lux/snapshots/ |
| Chain configs | ~/.lux/chain-configs/<BlockchainID>/ |
- Build node:
cd ~/work/lux/node && go build -o /tmp/luxd ./main - Install:
cp /tmp/luxd ~/.lux/bin/luxd/luxdv1.21.0/luxd - Build EVM:
cd ~/work/lux/evm && go build -o ~/.lux/plugins/<VMID> ./plugin - Start:
lux network start --mainnet
| Repo | Purpose |
|---|---|
~/work/lux/consensus |
Consensus engines (Chain, DAG, PQ) |
~/work/lux/geth |
C-Chain EVM implementation |
~/work/lux/evm |
EVM plugin |
~/work/lux/genesis |
Genesis configurations |
~/work/lux/cli |
Management CLI |
~/work/lux/netrunner |
Network testing |
~/work/lux/dex |
DEX implementation |
~/work/lux/standard |
Solidity contracts (including FHE) |
~/work/lux/lattice |
Lattice cryptography |
- Memory exhaustion protection (IP tracker limits, bloom filter caps)
- BLS signature CGO/pure-Go consistency
- Replay attack prevention with timestamp validation
- Safe math in DEX operations
Problem: New validator node stays at P-chain height 0 even after connecting to testnet peers. Blocks received via Put/PushQuery are silently discarded.
Root Cause: HandleIncomingBlock returns "not found" when the block's parent isn't in the local state. isMissingContextError didn't recognize "not found" as a missing-context condition, so requestContext (GetAncestors) was never called.
Fix in chains/manager.go, isMissingContextError:
// Added "not found" pattern:
strings.Contains(errStr, "not found") // parent block not in local stateEffect: Now when a block arrives whose parent is unknown, the handler sends GetAncestors to the peer, receives the full ancestor chain, and processes blocks in order, advancing the P-chain height.
Note: The network layer (network.go:sequencerID) already correctly maps native chain IDs (P, C, X, etc.) to PrimaryNetworkID for validator set lookups — no separate gossip fix needed.
When CGO disabled, these use CPU fallbacks:
consensus/quasar/gpu_ntt_nocgo.govms/thresholdvm/fhe/gpu_fhe_nocgo.govms/zkvm/accel/accel_mlx.go
Problem: C-chain and D-chain RPC endpoints returning 404 despite VMs running.
Cause: The zap.Client in vms/rpcchainvm/zap/client.go did not implement the CreateHandlers interface. The node checks for this interface to register HTTP handlers (like /rpc, /ws) with the HTTP server.
Solution: Added CreateHandlers method to zap.Client that:
- Sends
MsgCreateHandlersvia ZAP wire protocol to the VM - Receives
CreateHandlersResponsewith list of handlers (prefix + server address) - Creates
httputil.NewSingleHostReverseProxyfor each handler - Returns
map[string]http.Handlerfor registration
File Modified: vms/rpcchainvm/zap/client.go
Verification:
curl -s -X POST -H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"eth_chainId","params":[],"id":1}' \
http://localhost:9640/ext/bc/C/rpc
# Returns: {"jsonrpc":"2.0","id":1,"result":"0x17870"}Feature: The node's root endpoint ("/") provides EVM compatibility and node information.
Behavior:
- GET /: Returns JSON node information (nodeId, networkId, version, chains, endpoints)
- POST /: Proxies JSON-RPC requests directly to C-chain
/ext/bc/C/rpc - OPTIONS /: Returns CORS preflight headers
Files Modified: server/http/router.go, server/http/server.go
Types:
type RootInfo struct {
NodeID string `json:"nodeId,omitempty"`
NetworkID uint32 `json:"networkId,omitempty"`
Version string `json:"version,omitempty"`
Ready bool `json:"ready"`
Chains struct { C, P, X string } `json:"chains"`
Endpoints struct { RPC, Websocket, Info, Health string } `json:"endpoints"`
}
type RootInfoProvider interface {
GetRootInfo() RootInfo
}Usage:
# Get node info
curl http://localhost:9650/
# Send EVM JSON-RPC directly to root (proxied to C-chain)
curl -X POST -H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"eth_chainId","params":[],"id":1}' \
http://localhost:9650/Implementation Notes:
- The Server interface exposes
SetRootInfoProvider(provider)to configure node info - When no provider is set, returns default endpoint paths
- POST errors return proper JSON-RPC error format if C-chain unavailable
Problem: Health check shows "validator doesn't have a BLS key" despite BLS keys being correctly configured in genesis.
Cause: The initValidatorSets() function in /vms/platformvm/state/state.go was skipping validator population when NumNets() != 0. This happened because:
- Network layer might pre-populate validators (without BLS keys) before state initialization
- When
initValidatorSets()runs, it sees validators exist and skips adding them with proper BLS keys - The health check queries
n.vdrs.GetValidator()which returns validator with nil PublicKey
Solution: Modified initValidatorSets() to always add validators (not skip when NumNets() != 0). The AddStaker method replaces existing entries, so validators get updated with proper BLS keys.
File Modified: vms/platformvm/state/state.go (line ~2144)
Before:
if s.validators.NumNets() != 0 {
// skip re-adding them here
return nil
}After:
if s.validators.NumNets() != 0 {
log.Info("initValidatorSets: validator manager not empty, will update with BLS keys")
}
// Continue to add validators with proper BLS keysVerification:
curl -s http://localhost:9650/ext/health | jq '.checks.bls'
# Should show: "message": "node has the correct BLS key"Testing conducted on a single Lux validator node (testnet mode, macOS):
| Metric | Result |
|---|---|
| Sustained TPS | 1,091 TPS (60s benchmark) |
| Peak TPS | 1,094 TPS (5 workers) |
| Query Performance | 840 queries/sec |
| Query Latency | 17.67ms avg |
| Optimal Concurrency | 5 workers |
| Total Transactions | 65,497 txs/min |
Concurrency Scaling:
| Workers | TPS |
|---|---|
| 1 | 438 |
| 5 | 1,094 (optimal) |
| 10 | 684 |
| 20 | 521 |
Key Findings:
- Single node achieves ~1,100 TPS sustained with optimal concurrency
- Higher concurrency (>5 workers) decreases TPS due to nonce contention
- Query latency is consistent at ~18ms
- Testnet mode uses K=20 Snow consensus (vs K=1 dev mode)
Benchmark Command:
cd ~/work/lux/benchmarks
LUX_ENDPOINT="http://localhost:9640/ext/bc/C/rpc" \
PRIVATE_KEY="<funded_key>" \
./bin/bench tps --chains=lux --duration=60s --concurrency=5Last Updated: 2026-02-04