Gitcoin Grants 20!Donate here

L2BEAT Bridges is a work in progress. You might find incomplete research or inconsistent naming. Join our discord to suggest improvements!

Chainport logoChainport

ChainPort Cross-Chain Bridge: Port across 15+ Chains.
  • Total value locked
    $255.78 M7.51%
  • Destination
    Various
  • Validated by
    Third Party
  • Type
    Token Bridge
  • ...

    Risk summary
    This project includes unverified contracts. (CRITICAL)
    Technology

    Principle of operation

    Funds are moved between escrows and chains using third party actors.

    • Funds can be frozen if third party actors decide to not relay selected messages between chains (CRITICAL).

    • Funds can be stolen if third party actors relay a fake messages.

    Permissions

    The system uses the following set of permissioned addresses:

    Members of the Chainport Congress.

    MultisigVault1 0x7B8F…EA19

    Vault 1. This is a Gnosis Safe with 2 / 3 threshold.

    MultisigVault1 participants 0xbDCa…4fF70x8941…e0570x0004…a8d8

    Those are the participants of the MultisigVault1.

    MultisigVault2 0x450a…faf9

    Vault 2. This is a Gnosis Safe with 2 / 3 threshold.

    MultisigVault2 participants 0x8941…e0570xbDCa…4fF70xD223…50F6

    Those are the participants of the MultisigVault2.

    Smart contracts

    The system consists of the following smart contracts:

    Escrow controlled by the Chainport Congress. The source code of some implementations is not verified on Etherscan. This contract can store any token.

    ChainportCongress 0xB6b4…84a1

    Contains the logic to create proposal, vote and execute them.

    ChainportCongressMembersRegistry 0x1DeE…aBCa

    Registry of the Chainport Congress members. Acts as a 2-of-3 multisig.

    Value Locked is calculated based on these smart contracts and tokens:

    Generic escrow 0x7B8F…EA19
    Generic escrow 0x450a…faf9

    The source code of some implementations is not verified on Etherscan.

    The current deployment carries some associated risks:

    • Funds can be stolen if the source code of unverified contracts contains malicious code (CRITICAL).