Getting started tutorial
Getting Started with Quex
Introduction
Quex provides a protocol and infrastructure for decentralized data transfer based on confidential computing. The most simple of these for developers is data oracle, and that’s what we’ll be learning about today. In this guide, we’ll be conceptualizing, understanding and building a basic parametric emission token, which will give you some idea of how to use Quex for accessing verifiable data on-chain.
Document Structure
This tutorial is organized into the following sections:
Introduction: Provides an overview of Quex and explains what we're building.
Try it Out: Quick start instructions to deploy and run the provided example.
Let’s Create a Quex-based Contract: Step-by-step instructions to set up your environment and implement smart contracts leveraging Quex.
Prepare Environment: How to configure your development environment.
Token Emission: Detailed implementation of ERC-20 token emission logic.
Create Flow: Defines how data requests are structured and handled by Quex oracle pools.
Deploy and Run: Guide to deploying the contracts and executing the request to mint tokens.
Next Steps: Recommendations on further exploration and advanced use cases.
What Are We Building?
Let’s begin by clearly defining what we’re building and why. Imagine you’re issuing a token for a DeFi protocol and want to design tokenomics that incentivize the foundation to actively increase the protocol’s Total Value Locked (TVL). One effective approach is awarding the foundation tokens proportional to the protocol's TVL, as reported by DeFiLlama.
Specifically, we'll design a token where the foundation receives freshly minted tokens daily, equal in number to the USD-denominated TVL of the protocol across all supported chains and protocol versions. For clarity and practical demonstration, we'll use TVL data from the DyDx protocol. Fortunately, DeFiLlama provides an API endpoint that returns exactly this number. However, because this data is provided off-chain, achieving our goal requires an oracle to securely transfer the data on-chain.
Try it Out
The codebase for this example, including a prepared Foundry environment, is available in our examples repository. You can easily explore it by cloning the repository and installing its dependencies:
This repository also provides scripts that help you deploy the contracts and make requests to the Quex data oracle, triggering token minting. To deploy these contracts, you’ll need the private key of a wallet holding sufficient gas tokens for your chosen network. Set your private key as an environment variable for convenience:
Build and Deploy Contracts
Run the DeployTVLEmissionScript to build and deploy the ERC-20 token, the token emission contract, and to set up the data flow for verifiable Quex HTTPS responses:
You’ll need the deployed contract address for making requests. Store the deployed contract’s address as an environment variable:
Make a Request
Next, make a request using the provided script:
Check Your Balance
Now, verify your wallet balance—you should receive freshly minted TVLT tokens, equal in amount to the current TVL of the DyDx protocol!
Congratulations! You've successfully deployed your first contract that relies on confidential computing proofs to bring off-chain data to your contract. In the following sections, we'll provide a detailed explanation of what's happening under the hood of our contracts. This will give you insights and ideas for building your own Quex-based smart contracts.
Let’s Create a Quex-based Contract!
Prepare Environment
We'll build our example using Foundry (Forge)—ensure it's correctly installed and up to date. Update Foundry by running:
We’ll also use the ERC-20 implementation from OpenZeppelin and Quex libraries to simplify our development:
Token emission
Next, let's create a new contract ParametricToken.sol
in src folder with the following code:
As you can see, this is a standard ERC-20 token with one modification: only the contract owner can mint new tokens. In our scenario, ownership of this token contract will belong to another contract.
Let’s create that contract, TVLEmission.sol
, next:
Let’s briefly summarize what’s happening here:
The contract imports and inherits from
QuexRequestManager
, which simplifies interactions with Quex oracle pools and performs the necessary response verification.The constructor is initialized with addresses for the token treasury, Quex core, and the HTTPS oracle pool. We also deploy the
ParametricToken
contract within the constructor, becoming its owner and gaining the ability to mint tokens.The
processResponse
method is implemented as a callback, which securely processes responses from the Quex oracle. It includes a cooldown period to limit request frequency and uses theverifyResponse
modifier to protect against oracle manipulation attacks.
At this point, we should make a side note regarding Quex architecture. Although Quex supports classic pull- and push-based data oracles, under the hood, all of them rely on callback mechanics. In our example, we use the fastest and most cost-efficient callback scenario, particularly useful when you need to process data directly upon receiving it.
However, though we've defined a processResponse
function to verify proofs and process responses, we haven't yet defined the data flow—the exact HTTPS request the oracle pool should perform and the necessary supporting information. We'll cover this in the next section.
Create Flow
In Quex terminology, a Flow
is a combination of the recipient contract address, recipient contract callback, callback gas limit, oracle pool address, and the ID of the action to be performed by the oracle. While there are multiple ways to define a Flow
, for clarity in our example, we'll define it directly within our contract.
To achieve this, create a generateFlow()
function as follows and invoke it from the constructor:
Let's go through the generateFlow()
method step by step. First, we define the HTTPS request we’d like to perform—in our case, it's https://api.llama.fi/tvl/dydx, which returns the USD-denominated TVL of the DyDx protocol as required for our task. Note that while our example is simple, Quex supports more advanced requests: you may specify headers, parameters, the HTTP method, and request body, if needed. These additional fields provide flexibility when working with more complex APIs.
Second, we define a filter—a script written in the jq programming language—for response post-processing. The DeFiLlama API from the previous step returns a floating-point number, e.g., 284291310.4518468
. However, standard ERC20 tokens follow a convention where token amounts are represented as integers, scaled by 1e18. To achieve this, the jq script ". * 1000000000000000000 | round"
multiplies the response by 1e18 and rounds it to an integer.
Third, we define a response schema—this is the format for encoding the oracle response. In our example, the response (an unsigned numeric value) can be easily encoded as a Solidity uint256
. However, you're not limited by this choice and can define more complex schemas if needed. If you wish to explore example using more complex data structures, check out this tutorial.
Fourth, there's a step to define a private patch—a field containing private data that will be passed within the TD in encrypted form and later on attached to the request. This is particularly useful for attaching API keys or security tokens to your requests. Creating flows with a non-empty private patch is slightly more challenging, so we've developed a standalone tool to simplify the process of creating complex flows. However, since our current example doesn't require private data, we simply set the patch ID to zero: bytes32 patchId = 0
.
Finally, we need to define what happens when the response is ready. We do this using three fields: the oracle pool's address (consumer
), the callback function (callback
) to handle the incoming data, and a gasLimit
for executing the callback. After defining these parameters, we call createFlow()
to register our flow in the Quex registry, and store the returned identifier via setFlowId()
for verifying incoming data later.
Deploy and Run
That's it!
Now, all you need is to deploy the TVLEmission
contract and call the built-in request()
method to fetch your data and mint tokens. You can do this using any tools you prefer—particularly, you may use our prepared Foundry scripts available in the examples repository.
Next Steps
Congratulations on deploying your very first contract that relies on data secured by confidential computing proofs! You can explore further by visiting other sections of our documentation to learn how to build more complex examples and create the next generation of DApps connected to real-world data.
Also, join our Community to stay updated on Quex developments and engage with other developers!
Last updated