Search for projects by name
L2BEAT Bridges is a work in progress. You might find incomplete research or inconsistent naming. Join our Discord to suggest improvements!
deBridge is an interoperability layer that enables messaging between various blockchains. For the typical token transfer, "deToken" is minted on the destination chain.
deBridge is an interoperability layer that enables messaging between various blockchains. For the typical token transfer, "deToken" is minted on the destination chain.
deBridge leverages cross-chain messaging to transfer tokens from Ethereum to other chains and vice-versa. The validation of cross-chain transactions is performed by a network of oracles signing the transaction, which would be later evaluated by the smart contract.
External validators observe events on deBridge supported chains and transfer signed messages to other chains. Message is considered valid when it contains at least minimum amount of signature, currently set to 8.
Users can be censored if nodes decide not to transfer tokens after observing an event on the supported chain.
Tokens transferred end up a their wrapped representation (deTokens).
Funds can be stolen if destination token contract is maliciously upgraded or not securely implemented.
This is a Gnosis Safe with 5 / 8 threshold. Admin for all upgradable proxy smart contracts. It can change the implementations of all proxies through the ProxyAdmin contract.
Those are the participants of the Admin Multisig.
Accounts permitted to sign the message coming from other chain. Currently at least 8 of them are need to sign the message.
The main point of cross-chain interactions, this contract allows user to send message to other chain and claim funds when bridging back to Ethereum. This contract stores the following tokens: USDC, WETH, FRAX, ETH, USDT, WBTC, DAI, MATIC, RAI.
Contract responsible for checking off-chain signatures performed by the oracles, currently there are needed at least 8 confirmations.
The current deployment carries some associated risks:
Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).