isValidfunction of the registry with a given hash.
Pon an input data
D, and the correctness of the post-execution state of the system.
escapeProofformat. Note that unlike a standard Merkle proof, the
escapeProofcontains both the nodes along the Merkle path and their siblings. The proof ends with the expected root and the ID of the vault for which the proof is submitted (which implies the location of the nodes within the Merkle tree).
claimHash = keccak256(starkKey, assetId, quantizedAmount, vaultRoot, treeHeight, vaultId)