Introduction
With several layer-one protocols gaining meaningful traction over the last few years and layer-two protocols taking center stage in the scalability roadmap for Ethereum , it is increasingly becoming clear that the future will be multichain. This thesis is further reinforced by emerging patterns such as modular blockchains , application-specific chains , and fractal scaling . A multichain world is one in which disparate chains co-exist as thriving ecosystems.
In the absence of a countervailing force, the proliferation of chains would naturally lead to increased fragmentation and the siloing of ecosystems. Crosschain protocols directly address this problem by enabling interoperation across distinct chains.
The growth and adoption of such protocols over the last couple of years have been astounding. The total value locked in token bridges on Ethereum alone, which only offers a partial picture of the scale of adoption of such protocols, reached a high of US$27B in late 2021.
The flip side to this rapid growth and adoption has been the slew of high-profile hacks and failures of these protocols. Between 2021 and 2022, more than US$2.5B was stolen in bridge hacks , which is more than two-thirds of all DeFI hacks in that period.
To this end, this document provides a high-level systematic overview of the security risks in crosschain protocols by identifying, classifying, and analyzing the risk elements inherent in the design, implementation, and operation of such infrastructure. In addition, it offers a set of risk controls and best practices to mitigate the likelihood and severity of risks.
While this document is still a work in progress, its ultimate objective is to enable progress toward more secure, robust, and decentralized crosschain protocols that can serve as solid foundations for a multichain future. We highly encourage contributions and feedback from the community towards this end.
Types of Crosschain Interaction
Broadly defined, crosschain protocols enable the exchange of data and value across chains through one of the following three types of interactions:
Asset Exchange
Asset Exchange involves coordinating the transfer of ownership of an asset in one network with a corresponding transfer of ownership in another. This enables two or more parties to swap assets across networks under pre-agreed exchange terms.
Asset Transfer
Asset Transfer involves moving the value of an asset from a source ledger to a destination ledger. It enables assets in one network to be used inside applications in another.
General-purpose Messaging
General-purpose messaging refers to the communication of any data across chains. It can enable asset exchanges and transfers but also orchestrate complex application behavior across chains for a broad range of use cases.
Stakeholders
Crosschain protocols can have several distinct stakeholders with direct or indirect involvement in the system. These stakeholders can be individuals, groups, or organizations and have different roles, constraints, goals, and incentives.
Users
Users are the primary customers of the service offered by a crosschain protocol. They interact with the system directly to exchange assets or transfer data and value across chains.
Liquidity Providers
In a crosschain asset exchange, a liquidity provider is the counter-party to a user.
Bridge-wrapped Token Holders
A common approach to enabling the transfer of assets from one chain to another is through a lock-and-mint mechanism, in which crosschain protocols lock assets on one network and mint corresponding synthetic assets on another. bridge token holder . A bridge token holder might or might not be a user of a crosschain protocol.
Bridge Validators
Crosschain protocols typically coordinate several off-chain systems and actors that collectively ensure the integrity of state communication across chains. bridge validators are the primary entities that ensure the security and continued operation of a crosschain protocol and thus represent a significant source of potential risk to the overall system.
Bridge Operators
Bridge operators are actors that can update or reconfigure key elements of a crosschain protocol (e.g., upgrading on-chain smart contracts, updating validator registries, or moving contract funds). How many bridge operators a protocol has, what they are allowed to change and what policies govern their actions can significantly influence the risk profile of a protocol and varies considerably across projects.
Bridge Developers
Bridge developers design, build, test, and maintain the codebase behind a crosschain protocol. implementation risk .
In addition to the direct stakeholders discussed above, crosschain protocols also have indirect stakeholders. These entities have interest in or influence over the security and efficacy of crosschain protocols, even though they might not directly interact with them.
-
Blockchain Network Participants: Recent bridge hacks have shown how failures in crosschain protocols can cause significant disruptions and halts of the underlying blockchains, impacting all network participants.
-
Crosschain Applications: Applications built atop crosschain protocols have independent economic value that could influence the security of the underlying bridge. In addition, they have their own stakeholders that are impacted by the operations of the crosschain protocol.
-
Bridge Protocol Investors: Investors of bridge protocols can directly or indirectly influence the operations and security of a protocol. For instance, the security guarantees of Proof-of-Stake bridges depend on the value of the bridge tokens staked.
For brevity, the rest of this document primarily focuses only on direct stakeholders of crosschain protocols.
Security Risks
At its essence, crosschain communication creates a dependency relationship between two or more networks. unidirectional or bidirectional , transient or persistent .
- Only states that are valid and final in the source network are communicated to the destination network
- All relevant state transitions in the source network are relayed to the destination network in a timely manner
- Any invariants that emerge from the crosschain interactions are preserved
This document primarily discusses and assesses the risk of crosschain protocols by considering factors that affect these core security requirements.
Created: October 13, 2023