Morpheus Paymaster
Purpose
Morpheus Paymaster is a policy-gated sponsorship service exposed by the Oracle runtime at:
It is intended to sponsor pre-approved Neo N3 Abstract Account operations without exposing a global open faucet.
Current production architecture:
- ingress, auth, rate limit, and recovery stay outside the TEE
- the Oracle CVM executes the confidential authorization path
- mainnet and testnet share the same Oracle CVM and differ only by network-scoped policy variables and request metadata
Current runtime scope:
- active supported chain:
- Neo X sponsorship examples are not part of the current production path
Security Model
The service does not blindly pay for arbitrary requests.
Current controls:
- network-scoped enable/disable flags
- policy ids
- per-network max gas limit
- per-network allowlisted target contracts
- per-network allowlisted method names
- optional per-network allowlisted account ids
- optional per-network blocklisted account ids
- optional per-network allowlisted dapp ids
- short-lived signed authorization result
- TEE attestation bound to the authorization payload
The returned payload includes:
This makes the response portable across:
- AA relay backends
- first-party bundlers
- third-party sponsored execution gateways
Environment Variables
Testnet
Mainnet
Request Shape
zERC20 Builtins
Available builtins:
Integration Patterns
1. AA Relay / Bundler
Call
just before relay submission.Recommended order:
- simulate the AA invocation
- estimate gas units
- call Morpheus Paymaster with normalized operation metadata
- submit only if
2. Third-Party Bundler
The bundler can use the signed authorization as a sponsorship ticket and verify:
- signature
- optional
- target contract
- method
- gas limit
- attestation metadata
3. Application Server
An app backend can pre-screen business policy, then delegate final sponsorship approval to Morpheus Paymaster so that:
- app policy remains app-specific
- TEE-signed sponsorship remains portable
Current AA Integration
The AA frontend relay request builder now forwards optional
metadata, and the AA relay API can request Morpheus paymaster authorization before broadcasting a relay-ready meta invocation.This is currently a server-side integration path. It does not require changing the AA on-chain contract.
The latest integrated Oracle + NeoDID + AA verifier regression entrypoint is:
- reference docs: ,
Validated Neo N3 Testnet Flow
The AA relay + Morpheus paymaster path has been validated live on Neo N3 testnet.
Validated service-side facts:
- network:
- policy id:
- target chain:
- allowed AA target contract:
- allowed method:
- Oracle CVM app id:
Validated end-to-end flow:
- register a V3 AA account
- update the verifier key
- update the paymaster allowlist on the CVM
- simulate the AA invocation
- request Morpheus paymaster authorization
- relay the sponsored
- confirm on-chain
Successful live full-path validation example:
- account id:
- register txid:
- update verifier txid:
- relay txid:
- paymaster approval digest:
- paymaster attestation hash:
A successful replay path using an already allowlisted account was also validated:
- account id:
- relay txid:
Operational note:
- The worker service itself remains protected and is not intended to be left as a public open endpoint.
- For the live validation harness, the most stable CVM access pattern was to upload a helper script, followed by to execute it on the CVM.
- This replaced an earlier stdin-piped bridge that was intermittently failing with transport error .