Skip to content

Commit a7c961f

Browse files
akugoneLe-CaignecCopilot
authored
feat: get started (#11)
Co-authored-by: Robin Le Caignec <[email protected]> Co-authored-by: Copilot <[email protected]> Co-authored-by: Le-Caignec <[email protected]>
1 parent c0eb23d commit a7c961f

File tree

7 files changed

+252
-130
lines changed

7 files changed

+252
-130
lines changed

.vitepress/sidebar.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ export function getSidebar() {
3939
link: '/overview/use-cases',
4040
},
4141
{
42-
text: '🤖 Use the docs in your AI',
43-
link: '/overview/ai-integration',
42+
text: '🤖 Develop with AI',
43+
link: '/overview/develop-with-ai',
4444
},
4545
],
4646
},

src/manage-data/dataProtector/types.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Types in DataProtector.
8484

8585
## ❌ RevokedAccess
8686

87-
### access: <span class="text-yellow">[`GrantedAccess`](#🔑-grantedaccess)</span>
87+
### access: <span class="text-yellow">[`GrantedAccess`](#-grantedaccess)</span>
8888

8989
- The granted access that was revoked.
9090

src/overview/ai-integration.md

Lines changed: 0 additions & 10 deletions
This file was deleted.

src/overview/develop-with-ai.md

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
title: Develop with AI
3+
description:
4+
Learn how to leverage AI tools like Vibe Coding and Context7 to build
5+
privacy-first applications with iExec
6+
---
7+
8+
# 🤖 Develop with AI
9+
10+
Building privacy-first applications with iExec can be accelerated using
11+
AI-powered development tools. This guide covers how to effectively use AI
12+
assistants while maintaining security best practices.
13+
14+
## 📚 Documentation for LLMs and AI code editors
15+
16+
You can use some MCP (Model Control Protocol) servers like
17+
[Context7](https://context7.com/iexecblockchaincomputing/documentation-tools) to
18+
provide:
19+
20+
- Code completion with iExec-specific knowledge
21+
- Architecture suggestions for privacy-first apps
22+
- Code explanation and best practices
23+
24+
## 🎨 Vibe Coding Integration
25+
26+
Vibe coding is a modern way to build applications by describing what you want in
27+
plain language. An AI assistant (like Cursor or ChatGPT) then generates code
28+
based on your description.
29+
30+
It's fast, creative, and helps you prototype ideas quickly. Even if you're not a
31+
technical expert you can:
32+
33+
- Write a prompt like: "I want to create a form able to protect my data with
34+
DataProtector"
35+
36+
- The AI suggests code using iExec tools like DataProtector or iApp Generator
37+
38+
- You review and adjust until it works
39+
40+
## ⚠️ Security Considerations
41+
42+
While vibe coding is powerful, it's important to keep privacy and security in
43+
mind:
44+
45+
- **Review the code**: Always check AI-generated code for bugs or
46+
vulnerabilities
47+
48+
- **Don't share secrets**: Never paste API keys, private keys, or sensitive
49+
logic into the AI
50+
51+
- **Validate privacy logic**: Make sure your confidential computing flow is
52+
correctly implemented
53+
54+
- **Test thoroughly**: Especially when handling protected data or smart contract
55+
logic
56+
57+
## Learn More
58+
59+
- [iExec MCP Server](https://www.iex.ec/news/mcp-server-secure-interoperability-autonomous-ai-agents)
60+
- [Agentic AI](https://www.iex.ec/academy/what-is-agentic-ai)
61+
- [ElizaOS TDX use case](https://www.iex.ec/news/elizaos-ai-agents-iexec-intel-tdx)

src/overview/helloWorld/1-overview.md

Lines changed: 3 additions & 76 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ description:
1515
<p>and explore how iExec can help you build Privacy-preserving applications and securely manage sensitive data.</p>
1616
</div>
1717

18-
## 👨‍💻 Why build Privacy-preserving dApps with iExec
18+
## 👨‍💻 Building Privacy-preserving dApps with iExec
1919

2020
<p>Imagine you're building a decentralized application (dApp) that needs to <strong> handle sensitive user data</strong>, for example:</p>
2121
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 mb-6">
@@ -80,13 +80,13 @@ Computing</a></span> technologies.
8080
<span class="text-fuchsia-700 font-semibold">confidentiality</span>, and <span class="text-fuchsia-700 font-semibold">monetization</span> of their data and digital assets within the <span class="text-fuchsia-700 font-semibold">Web3</span> ecosystem.</p>
8181
</div>
8282

83-
## 🔒 What are the three key elements?
83+
## 🔒 The three key elements?
8484

8585
iExec combines three fundamental elements that work together seamlessly:
8686

8787
#### 1. Protect data with our devtool [DataProtector](../../tools/dataProtector/getting-started)
8888

89-
- Encrypt your sensitive data and store it securely on IPFS
89+
- Encrypt your sensitive data and store it securely on Arweave or IPFS
9090
- Only you control who can access it and when
9191
- Perfect for private information like research data, business analytics, or
9292
personal records
@@ -152,79 +152,6 @@ Depending on the dApp's use case, Alice could:
152152

153153
And many other use cases...
154154

155-
## 💡 Possible use cases
156-
157-
<div class="grid grid-cols-1 md:grid-cols-2 gap-6 my-6">
158-
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
159-
<div class="flex items-baseline gap-2 text-lg">
160-
<span>💰</span>
161-
<h3 class="font-semibold m-0!">Finance</h3>
162-
</div>
163-
<ul class="list-disc ml-6">
164-
<li>Analyze sensitive financial data</li>
165-
<li>Process credit scores without exposing personal information</li>
166-
</ul>
167-
</div>
168-
169-
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
170-
<div class="flex items-baseline gap-2 text-lg">
171-
<span>🤖</span>
172-
<h3 class="font-semibold m-0!">AI/ML</h3>
173-
</div>
174-
<ul class="list-disc ml-6">
175-
<li>Train models on private datasets</li>
176-
<li>Perform confidential predictions</li>
177-
</ul>
178-
</div>
179-
180-
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
181-
<div class="flex items-baseline gap-2 text-lg">
182-
<span>🔬</span>
183-
<h3 class="font-semibold m-0!">Research</h3>
184-
</div>
185-
<ul class="list-disc ml-6">
186-
<li>Share and analyze research data securely</li>
187-
<li>Collaborate while protecting intellectual property</li>
188-
</ul>
189-
</div>
190-
191-
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
192-
<div class="flex items-baseline gap-2 text-lg">
193-
<span>📊</span>
194-
<h3 class="font-semibold m-0!">Business Analytics</h3>
195-
</div>
196-
<ul class="list-disc ml-6">
197-
<li>Process competitive market data</li>
198-
<li>Analyze business metrics confidentially</li>
199-
</ul>
200-
</div>
201-
202-
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
203-
<div class="flex items-baseline gap-2 text-lg">
204-
<span>🎮</span>
205-
<h3 class="font-semibold m-0!">Gaming</h3>
206-
</div>
207-
<ul class="list-disc ml-6">
208-
<li>Protect player data and game assets</li>
209-
<li>Process in-game transactions securely</li>
210-
</ul>
211-
</div>
212-
<div class="bg-[var(--vp-c-bg-soft)] rounded-[6px] p-6 flex flex-col gap-2">
213-
<div class="flex items-baseline gap-2 text-lg">
214-
<span>🏥</span>
215-
<h3 class="font-semibold m-0!">Healthcare</h3>
216-
</div>
217-
<ul class="list-disc ml-6">
218-
<li>Process patient records privately</li>
219-
<li>Run medical analyses while preserving patient confidentiality</li>
220-
</ul>
221-
</div>
222-
</div>
223-
224-
<div class="bg-gradient-to-r from-fuchsia-400/10 to-fuchsia-400/5 rounded-[6px] p-6 border-l-4 border-fuchsia-700 mb-6">
225-
<p class="m-0!">In the next chapters, we'll follow Alice and Bob's journey step by step, starting with how Alice can <span class="text-fuchsia-700 font-semibold">protect her sensitive data</span> and then how Bob can <span class="text-fuchsia-700 font-semibold">build and deploy a confidential app</span> to process it.</p>
226-
</div>
227-
228155
## 🎯 Key takeaways
229156

230157
<div class="flex flex-col my-6">

src/overview/helloWorld/2-protectData.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,9 @@ their dApps with these key features:
2424
- 🔐 **Data Privacy and Security**
2525

2626
Utilizes end-to-end encryption and decentralized storage
27-
(<a href="https://ipfs.tech/" target="_blank">IPFS</a>) to ensure protection
28-
and confidentiality, leveraging advanced confidential computing technology.
27+
(<a href="https://ipfs.tech/" target="_blank">IPFS</a> or
28+
<a href="https://ar.io/" target="_blank">AR.io</a>) to ensure protection and
29+
confidentiality, leveraging advanced confidential computing technology.
2930

3031
- 🎮 **Dynamic Access Management**
3132

0 commit comments

Comments
 (0)