Moddable, a leader in the IoT space, recently brought the Embedded Challenge, our digital escape room, to physical hardware, offering a whole new dimension of interaction! The challenge was ported to Moddable Six hardware, an embedded device powered by the ESP32-S3 microcontroller. 

The Embedded Challenge is a fun, interactive way for developers to experience the power of Hardened JavaScript firsthand. Think of it like a standing escape room challenge. The goal? Try to break out of the sandbox environment, find the hidden key, and win a bounty. But be warned: we’ve only paid out once so far.

A Long-Running Escape Room with Real Stakes

This challenge has been running for a while, offering participants a real-world test of Agoric’s security guarantees. It’s not just a “come and break this” challenge—we’re confident in our system, and the bounty on offer is proof of that. Our sandbox has remained virtually uncracked, despite many attempts, thanks to our strong security model. This challenge isn't just for fun either; it's a great tutorial on the features and limitations of our sandbox, offering invaluable insight into how our Compartment isolation works.

Why Take the Challenge?

  • The Embedded Challenge is an excellent way to explore the intricacies of Agoric’s security model, showcasing how the XS JavaScript engine and Hardened JavaScript protect sensitive data and system integrity.

  • Despite its openness, we’ve only had to pay out the bounty once—demonstrating how confident we are in our sandbox guarantees!

  • With the Embedded Challenge now available on the Moddable Six, you’ll get a first-hand look at the intersection of secure smart contracts and IoT. Explore how Agoric’s technology is making its way into hardware security, all while trying to crack one of the most secure sandboxes out there.

Try It Out!

Whether you’re an embedded systems enthusiast or a security-minded developer, the Embedded Challenge is an exciting way to put your skills to the test. 

Visit the Embedded Challenge page of the Agoric Documentation to dive in and let us know in Discord or X if you try to escape our sandbox!