#lightning #validation #signer #cryptography #node #implemented #operation

no-std vls-protocol

A library for implementing a Lightning signer, which externalizes and secures cryptographic operations

14 unstable releases (3 breaking)

0.11.0 Feb 29, 2024
0.11.0-rc.3 Feb 28, 2024
0.11.0-rc.1 Nov 29, 2023
0.10.0 Aug 17, 2023
0.2.0 Mar 14, 2023

#1006 in Magic Beans

Download history 35/week @ 2023-12-22 90/week @ 2023-12-29 521/week @ 2024-01-05 128/week @ 2024-01-12 330/week @ 2024-01-19 276/week @ 2024-01-26 439/week @ 2024-02-02 623/week @ 2024-02-09 420/week @ 2024-02-16 865/week @ 2024-02-23 1190/week @ 2024-03-01 936/week @ 2024-03-08 1136/week @ 2024-03-15 621/week @ 2024-03-22 314/week @ 2024-03-29 496/week @ 2024-04-05

2,690 downloads per month
Used in 6 crates (5 directly)


1.5K SLoC

Validating Lightning Signer

Please see the VLS Project Overview for more information. Our web site.


The following remain to be implemented:

  • vlsd2 --recover-to can only handle a simple force-close by us. It cannot sweep a force-close or a breach by the peer. It also cannot sweep HTLC outputs.
  • there is no facility to recover from loss of signer state.
  • on-chain tracking is not fully implemented, so a malicious node can steal funds by failing to remedy a breach (for example)

Additional Crates

Development Information

Additional HOWTO Documentation

Formatting Code

Enable formatting precommit hooks:


For some reason, the ignore configuration for rustfmt is only available on the nightly channel, even though it's documented as stable.

rustup install nightly

cargo +nightly fmt

Building Validating Lightning Signer

Build VLS and related crates:

cargo build

Running Unit Tests

cargo test

To enable logging for a failing test (adjust log level to preference):

RUST_LOG=trace cargo test

Using llvm-cov for Code Coverage


cargo +stable install cargo-llvm-cov --locked

Run coverage:


Changing linker to mold instead of ld:

cp .cargo/config.sample.toml .cargo/config.toml


Running Benchmarks

cargo bench -p vls-core --bench secp_bench

Note that you might need to add --features=test_utils if you want to run all benches in vls-core.

Without optimizations:

cargo bench -p vls-core --bench secp_bench --profile=dev

Expect something like:

    test fib1_bench        ... bench:           1 ns/iter (+/- 0)
    test fib_bench         ... bench:      17,247 ns/iter (+/- 198)
    test hash_bench        ... bench:         258 ns/iter (+/- 2)
    test secp_create_bench ... bench:      49,981 ns/iter (+/- 642)
    test sign_bench        ... bench:      25,692 ns/iter (+/- 391)
    test verify_bench      ... bench:      31,705 ns/iter (+/- 1,445)

i.e. around 30 microseconds per secp256k1 crypto operation. We also see that creating a secp context is expensive, but not prohibitively so.


~120K SLoC