Description
This page gathers Omnichain Tokens built on top of LayerZero AMB protocol, currently they are: STG, Harmony Bridge OFT, BOBA and agEUR. Risk associated with using any of them varies, depending on the technological decisions made by the developers. LayerZero as a framework to build omnichain application does not provide any base security as applications can define their own security settings, however applications and tokens choosing the default security settings will leverage security provided by default Oracle, Relayer, Verification Library and Proof Library. Default settings are managed by LayerZero team.
If you find something wrong on this page you can submit an issue or edit the information.
Risk summary
Funds can be stolen if
- oracles and relayers collude to submit fraudulent block hash and relay fraudulent transfer (CRITICAL),
- omnichain token owner changes Oracle/Relayer pair for their own (CRITICAL),
- the source code of unverified contracts contains malicious code (CRITICAL),
- a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).
Users can be censored if
Technology
Principle of operation
Omnichain tokens are tokenized Token Bridges. One chain is designated as main and acts as an token escrow. Transfers from the main chain are done using typical lock-mint model. Transfers between other (non-main) chains are made using burn-mint model. The implementation details may vary between each individual omnichain token and must be individually assessed.
Oracles and Relayers
Omnichain tokens are built on top of LayerZero protocol. LayerZero relies on Oracles to periodically submit source chain block hashes to the destination chain. Once block hash is submitted, Relayers can provide the merkle proof for the transfers. The Oracle and Relayer used can be either default LayerZero contracts, or custom built by the token developers.
Users can be censored if oracles or relayers fail to facilitate the transfer (CRITICAL).
Funds can be stolen if oracles and relayers collude to submit fraudulent block hash and relay fraudulent transfer (CRITICAL).
Funds can be stolen if omnichain token owner changes Oracle/Relayer pair for their own (CRITICAL).
Permissioned Addresses
The system uses the following set of permissioned addresses:
Contract authorized to relay messages and - as a result - withdraw funds from the bridge.
Contract that submits source chain block hashes to the destination chain.
Contract authorize to update default security parameters (Relayer, Oracle, Libraries). Owner of the Endpoint and UltraLightNodeV2 contract.
These addresses are the participants of the 2/5 LayerZero MultiSig.
Smart Contracts
The system consists of the following smart contracts:
Contracts using LayerZero smart contracts to transfer tokens between chains. The implementation details may vary between each individual omnichain token and must be individually assessed. LayerZero as a framework to build omnichain application does not provide any base security as applications can define their own security settings, however applications and tokens choosing the default security settings will leverage security provided by default Oracle, Relayer, Verification Library and Proof Library. Default settings are managed by LayerZero team. The source code of this contract is not verified on Etherscan.
Contract used to validate messages coming from other chains, e.g. Ethereum, Arbitrum, Optimism.
Contract used to validate messages coming from other chains, e.g. Aptos.
Layer Zero Enpoint contract used for cross-chain messaging.
LayerZero default send and receive library.
LayerZero contract responsible for fees mechanism.
LayerZero nonce contract.
The current deployment carries some associated risks:
Funds can be stolen if the source code of unverified contracts contains malicious code (CRITICAL).
Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).
the source code of unverified contracts contains malicious code (CRITICAL).