Agenda
- Update on evm-asm
- Project updates from all workstreams
- Projects 1,2,6
- Project 3
- Project 4
- Project 5
- Project 7
Meeting Time: Wednesday, April 08, 2026 at 15:00 UTC (60 minutes)
Meeting Time: Wednesday, April 08, 2026 at 15:00 UTC (60 minutes)
YouTube recording available: https://youtu.be/uldmKxLXqF8
The L1ZKVM breakout call number 3 focused on updates across multiple projects. Derek presented EVM ASM, a project to implement the EVM in RISC-V assembly for formal verification using Lean 4, with 24 out of 55 RISC-V opcodes currently proven correct. Ignacio shared progress on execution witness generation, including a new Engine API RPC proposal and 139 new tests covering execution witness fields. Marcin provided updates on zkVM guest API standardization, highlighting five accepted standards including RISC-V target triple and cryptographic accelerators, along with two new proposals for minimal memory resources and memory safety guard regions. Francesco reported on DevNet progress, including the deployment of a GPU-backed test network and plans for initial interop testing with Prism at the end of the following week. Han shared improvements to zkVM integration and observability features, including open telemetry integration and real-time proof monitoring dashboards. Cody discussed RISC-V compliance testing using the ACT 4 framework, which revealed new compliance issues and bugs, and shared progress on Python specifications for Snark Stark and OpenVM provers.
The meeting began with Ladislaus and Kevaundray discussing font size issues with a prompt calf, though they couldn’t reach a definitive conclusion about the appearance on different screen sizes. Kevaundray then welcomed attendees to the L1ZKVM breakout call number 3 and outlined three agenda items: EVM ASM updates, DevNet updates for ZKCL, and general project updates. The meeting was in its early stages, with Derek expected to provide updates on EVM ASM, though the transcript ended before he could begin.
Derek provided an update on the EVM ASM project, explaining that it aims to implement the EVM directly in RISC-V assembly for L1 ZK EVMs. The project, initiated by Yoichi at Zki Security, focuses on formally verifying the RISC-V and EVM components using Lean 4 and AI to ensure correctness and maintainability. Derek reported that 24 out of 55 RISC-V opcodes have been verified, and the primary EVM opcodes are implemented, though formal verification against the NetherMind EVM spec remains a to-do item.
The team discussed the size of the EVM implementation, with Alexandre noting that the current implementation uses around 1,000 RISC-V instructions, which is much smaller than a complete EVM program would be. Mamy explained that a complete EVM program would include additional functions for gas accounting and other overhead, while the current assembly code removes this complexity. Derek expressed optimism about making progress on the SDF and EVM parts within the next few months, aiming to have a working implementation by the summer to test and evaluate its performance.
The team discussed updates on two main projects. For the execution witness project, Ignacio reported that Developer Uche has been working on a new Engine API RPC proposal called “Engine with Witness” which combines two previous RPC calls into one. The project now has 139 new tests covering various execution scenarios, with good progress reported by multiple team members including Israex and Rev. For the guest programs project, Ignacio announced that a final spec has been completed with 25 tests to validate execution witness rejection. The team can run these tests on their EL working branches targeting the latest DevNets.
Inacio presented updates on benchmarking and metrics improvements, including a 2X speed up in public input calculation using a new Rust SSC library and a 5% overall speed up in block proving time. He also refreshed an emulator profiling tool and is working on transforming benchmarking results into concrete repricing proposals using a similar methodology to Glamson repricings. Marcin briefly mentioned a 20X reduction in witness generation by switching protocols and a 2X ZKSNARK cost reduction achieved through DMA and GPU optimizations.
Marcin provided an update on Project 3, CK VM guest API standardization, highlighting five accepted standards including RISC-V target triple, I/O interface, cryptographic accelerators C interface, execution termination semantics, and memory layout restrictions. He also presented two new proposals: minimal memory resources to address gaps in memory usage across different zkVMs, and memory safety guard regions to catch common low-level bugs like null pointer traps and stack overflows. Marcin noted that the Ethereum Foundation can provide engineering support to help zkVM vendors implement these standards, and requested feedback on the two new proposals under review.
The team discussed several key updates and progress in their projects. Francesco reported on the deployment of a GPU-based test network using the Kurtosis framework, with plans for an initial interop with Prism at the end of next week. Han shared updates on zkVM integration and observability features, including new dashboards for monitoring proof traces. Cody provided updates on RISC-V compliance testing, finding new compliance issues and bugs, and discussed the progress on formal verification and specification efforts. The team also briefly discussed a recent paper by Nadeem Kobesi highlighting issues with formal verification tools, with Alex Hicks providing context on their approach to verification and the use of alternative methods like assembly code and formally verified compilers.
.kRXP+8c).kRXP+8c).kRXP+8c)YouTube recording available: https://youtu.be/lohcW-sGzjU