Skip to main content

Ecosystem

Specter isn't just a protocol spec — it's a living network with real tools you can use today. Here's what's available and how the pieces fit together.

Wallets & Tools

MetaMask — Specter is a full EVM chain, which means MetaMask works out of the box. Add the Specter network, and you can send transactions, interact with contracts, and manage your GHOST tokens through the wallet you already know.

WalletConnect — Any WalletConnect-compatible wallet can connect to Specter dApps. This opens the door to mobile wallets, hardware wallets, and the broader wallet ecosystem.

Specter Block Explorer (specterscan.io) — A full-featured block explorer for the Specter network. View transactions, inspect contracts, track token transfers, and explore the chain's activity in real time.

Cross-Chain Bridges

Privacy is more useful when you can bring your existing assets along. Specter's cross-chain bridges, powered by Hyperlane, connect to major networks and let you move assets seamlessly.

Supported Source Chains

ChainStatus
EthereumLive
BaseLive
ArbitrumLive

Bridged Tokens

When you bridge an asset to Specter, it's represented as a wrapped "ghost" variant:

Source TokenSpecter TokenDescription
USDCgUSDCBridged USD Coin
WETHgWETHBridged Wrapped Ether
VIRTUALgVIRTUALBridged VIRTUAL token

The bridging process is straightforward: lock your tokens on the source chain, receive the ghost-wrapped equivalent on Specter, use them with full privacy features, and bridge back when you're ready. The wrapped tokens are fully backed 1:1 by the locked originals.

For Developers

If you're building on Specter, you're building on familiar ground with powerful new tools.

Full EVM Compatibility

Specter runs a complete EVM execution environment. Your Solidity contracts, your Hardhat scripts, your Foundry tests — they all work. If it deploys on Ethereum, it deploys on Specter. No new language to learn, no new toolchain to master.

Privacy Primitives as Building Blocks

The Ghost Protocol contracts are deployed and available for any developer to compose with:

  • CommitRevealVault — Single-use private transfers
  • OpenGhostVault — Secret sharing and sealed data
  • PersistentKeyVault — Reusable credentials
  • GhostStealthAnnouncer — ERC-5564 stealth addresses
  • DMSRegistry — Dead man's switch functionality

These aren't locked behind SDKs or permissioned APIs. They're smart contracts on-chain, callable by any other contract or EOA.

Permissionless Policy System

This is where it gets interesting. The policy system lets anyone extend Ghost Protocol's behavior by implementing the IRevealPolicy interface.

Want to create a reveal condition that checks an oracle price feed? Deploy a contract that implements IRevealPolicy, point a commitment to it, and the vault will call your policy at reveal time. If your policy returns true, the reveal succeeds. If not, it doesn't.

Built-in policies like TimelockExpiry, DestinationRestriction, and ThresholdWitness cover common cases. But the interface is open — you can deploy custom policies for any condition your application needs.

Getting Started

  1. Add the Specter network to your development environment
  2. Deploy contracts using your existing EVM tooling
  3. Interact with Ghost Protocol contracts for privacy features
  4. Implement IRevealPolicy for custom reveal conditions
  5. Test on the live testnet with faucet GHOST

The barrier to entry is intentionally low. If you've built on Ethereum, you can build on Specter — and now your applications can be private.