Since the full-scale russian invasion of Ukraine on 24th February 2022, the situation has quickly become dire for millions of Ukrainians. Outside of the humanitarian crisis and military needs required by Ukraine, there is an unprecedented need for new tools and solutions to systematically respond to the new reality of war in Ukraine.
Kyiv Tech Summit is a one-of-a-kind hybrid hackathon brought to you by the non-profit blockchain fund Unchain Ukraine together with Ukraine DAO, the metaverse Atlantis World, and Web3 activists!
We are bringing together some of the best developers, technology providers, designers, innovators, and product evangelists who will solve tangible, on-the-ground issues aiding the Ukrainian people in their fight for freedom!
We are also partnering with many prominent media outlets and documentarians to record this historical hackathon so that our message can be shared across the globe! (more on this soon…)
Our power is in unity and together we are one step close to the victory! Together, we can all fight the oppression and show that the spirit of innovation does more than talk, let's build!
What to Build
Submissions are software solutions that solve problems related to one of the five hackathon categories:
- Fighting Censorship & Disinformation
- Improving Communication & Infrastructure
- Tokenizing the Economy
- Raising Funds for Ukrainians
- Bringing Web3 to Ukrainian IT
You can read more about each of the five categories in Resources.
Project Development and Terms
- The Hackathon ("Hackathon") is a software programming competition. Contributors to the Hackathon must obey the code of conduct.
- A team of contributors may submit only one entry for the hackathon. Participation at the hackathon is subject to a “per-team” basis meaning contributors are not allowed to be on more than one team at the event.
- Contributors to the Hackathon may create original solutions, prototypes, datasets, scripts, or other content, materials, discoveries, or inventions (a “Submission”). The Submissions contributors develop will be evaluated by judges, who will award rewards to contributors who submit qualifying Submissions as determined in the sole discretion of the Judges. Contributors may use any software development tool, game engine, IDE, and/or programming language to create their Contribution.
- Contributors may build on existing projects, so long as (1) contributions are substantially developed, modified, or improved during the hackathon event; and (2) contributors have permission, for example, under a Creative Commons Zero license, to use the preexisting projects and assets. Proof of permission must be provided upon request. Assets, SDKs, APIs or other tools or components available under a trial license may be used.
- Licenses selected by the team must be clearly listed in code (page per page) or a generic page announcing the licenses the application adheres to. The public code used inside your application should also list the licenses the code is subjected to.
- Contributor submissions must be released under one of the licenses referenced in https://opensource.org/licenses.
- Contributors retain ownership of all intellectual and industrial property rights (including moral rights) in and to submissions.
- As a condition of submission, each contributor grants the hackathon organizer, its subsidiaries, agents and partner companies, a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive license to use, reproduce, adapt, modify, publish, distribute, publicly perform, create a derivative work from, and publicly display the submission.
- Contributors provide submissions on an "as is" basis, without warranties or conditions of any kind, either express or implied, including, without limitation, any warranties or conditions of title, non-infringement, merchantability, or fitness for a particular purpose.
What to Submit
All projects are required to submit a link to a Github Repository containing all project files and a final presentation with slides answering the following:
- What problem is being solved?
- Why does this problem need to be solved?
- Who is affected by this problem and why would they use your solution?
- What is the functionality of your solution?
- What is your plan for real world implementation?
$53,420 in prizes
Prizes paid in cryptocurrency
Grand Prize - 1st place
One $5,000 Grand Prize
One grand prize winner will be selected by the judges as the best project in any category!
One $2,500 Prize for second place
2nd place winner will be selected by the judges as the second best project in any category!
One $1000 Prize for second place
3rd place winner will be selected by the judges as the third best project in any category!
One $500 Prize for second place
4th place winner will be selected by the judges as the fourth best project in any category!
One $1,420 Prize
One winner will be selected from the community based on Public Voting. The project with the most votes will win, and any project can be considered, even if they have won another prize.
Celo Sponsored Bounty
Celo Prize pool: 10000 cusd. You will need to have deployed to Celo when submitting your project and your idea should touch on refi (daos, nfts, gaming), social impact, and defi projects that match Celo ethos.
See the links below for starter ideas and example projects:
Aragon Sponsored Bounty
Two $3,000 Prizes
At Aragon we are building a new set of smart contracts for creating and managing DAO's. These contracts are envisioned towards a more open and unopinionated way of architecting digital organizations through a permission managements system and a plugin registry. This new version is in heavy development right now and we want the community to help design the last details of the protocol, starting with the Kyiv Tech Summit builders! Incentives are always a powerful way to ensure good feedback is given, because of that reason we have thought of different types of projects where help is needed:
- Aragon Plugins: These are the heart of the protocol and what makes it a community owned hyperstructure. We would like one to two teams working on this challenge. A few examples that we've thought about are: creating contracts for ERC721 or Soulbound Governance, a straightforward integration with Gnosis Safe, on chain voting solutions for tokens that don't support the Governance standard (doable with https://github.com/CodeSandwich/Snapshop for example)... But it's open ended! Bring your best ideas, or things that you would need in the new Aragon!
- Aragon Permissions Oracle: Creating a "Guardian" for DAO's that allows to halt them upon certain action, or limit withdrawals to a certain limit, or set of custom rules you've thought would be useful when managing DAO's.
- Aragon is building the architecture of its new DAO Chapter. This means we are building the DAO contracts for our own functioning! Bring us examples that inspire you regarding a secure Delegated Voting experience. You can use the set of contracts from Open Zeppelin Governance and add cool things such as overriding delegators votes, auto undelegation after 1 year, being able to delegate to multiple addresses a percentage of your holdings, quorum parameters, etc.
Aave Sponsored Bounty
One $4,000 Prize
Stablecoin Growth - Build projects and integrations that bring more stablecoin liquidity into Aave such as new yield aggregation tools, wallet integrations or fintech / e-commerce integrations.
Credit Delegation with Lens Protocol - Assess reputation of Lens profiles and use this data to enable users to delegate or access credit.
Accessibility - Enable new ways or groups of users to access the Aave protocol.
Aave Forex Tool - Enhance the ability of users to access forex liquidity by using one or all of: E-mode, flashloans, other DeFi integrations such as Curve.
Transaction Builder - Create new ways to compose or visualize Aave transactions such as a dispatcher contract for submitting multiple actions in a single transaction, or a recipe builder with gas estimation.
Unstoppable Domains Sponsored Bounty
One $2,000 Prize to the winner in the category
Two $500 Prizes for the second and third place in the category
Pool Prize of $1000 to the projects that successfully do the Login integration
Web 3 should be easy! Simplify your UX by adding support for the most popular Web3 naming system.
Why build with Unstoppable?
Level up your dapp or application by integrating with the foundational layer for digital identity on Web3. Chose one of the following options of integrations to win the prize:
Universal Web3 Logins
Login with Unstoppable allows owners of Unstoppable Domains to log in and share profile information with EVM-compatible applications. This gives users more control over their personal information and allows developers to access information about their users without needing to host or maintain a CRM database. Docs here https://docs.unstoppabledomains.com/login-with-unstoppable/
Simple Crypto Payments
Unstoppable Domains allows you to make payments with over 281 cryptocurrencies using a single domain name. As long as you have configured your addresses to the domain, our members can send crypto to your domain, and it will end up in your wallet.
Docs are here https://docs.unstoppabledomains.com/crypto-payments/
Have your own idea how to use Unstoppable Domains - feel free to play with the tech!
IPFS | Filecoin Sponsored Bounty
One $2,000 Prize to the winner in the category
Three $670 Prizes for the second, third and fourth place in the category
The best use of IPFS for content addressing and Filecoin for persistent, decentralized storage to make war-time life easier and safer. Use of other tooling may also qualify*.
*For details about eligibility criteria please see this page: https://ecosystem-wg.notion.site/Filecoin-IPFS-Hackathon-Judging-Criteria-fb29da31431c4c8da1be6c30e1d0ef82”
Nym Sponsored Bounty
One $4,000 Prize
- AnonDrop -
One of the harder problems facing the documentation of war crimes is to allow witnesses to send in data without revealing who they are or their location to an adversary that can watch their internet connection. The last thing someone who wishes to disclose a human rights violation to do is to make themselves a victim simply by reporting the crime!
Nym is a decentralised mixnet that provides privacy and anonymity at the network layer and so potentially can serve as a powerful privacy-protecting front-end for these attacks. The mix network can be utilized to provide strong privacy protections able to withstand attacks by even nation level adversaries.
We believe there is an urgent need to create an encrypted file drop application — AnonDrop. This will use the Nym mixnet to hide the metadata of a user uploading encrypted files (and their decryption keys) to a service operated by institutions requiring sensitive evidence where sender anonymity is paramount.
For information and requirements, please visit:
Near Sponsored Bounty
One $4,000 Prize
Qualifying projects will build a solution related to one of the five main hackathon categories and must be built on Near.
Most impactful project built on Ethereum
3 projects with the most impactful solutions built on Ethereum will receive a $1,000 prize.
To qualify, a project will simply build a solution related to one of the five main hackathon categories and must be built on Ethereum.
Swarm Association Sponsored Bounty
Integration of Ghost - 1x4k DAI
Swarm (https://www.ethswarm.org/) is a censorship resistant decentralized storage and communication system.
Freedom of expression is the freedom to seek, receive and impart information and ideas through any media and regardless of frontiers. Yet, censorship is spreading.
This bounty will reward an integration between Swarm and Ghost.
You will need to implement a integration architecture that uses:
Swarm Bee Node as the Storage layer
Submitting to this hackathon could earn you:
Hackathon coordinator, NEAR
Developer Relations Engineer at Aave
Relevance & Impact
Does the solution work? Does it accurately follow the instructions and convert to code and actions? Does it bring value and usefulness to real-world users? How well does the product/solution align with the Hackathon challenge statements?
How easy is it to use the product/solution? Does it provide an intuitive and engaging experience?
If the solution deals with sensitive data, how secure is the program? How difficult would it be to exploit?
What is the difficulty level of the task? Does the team have thorough documentation of code, features, and usage?
How innovative and groundbreaking is the idea? Does it use a particularly clever technique or require many different components?