L2BEAT Bridges is a work in progress. You might find incomplete research or inconsistent naming. Join our discord to suggest improvements!

SKALE IMA Bridge logoSKALE IMA Bridge

SKALE IMA Bridge is a part of SKALE Network ecosystem. It is a cross-chain BLS threshold bridge that allows users to transfer tokens and arbitrary messages between supported blockchains.
  • Total value locked
    $5.97 M20.20%
  • Destination
    Ethereum, SKALE
  • Validated by
    Destination Chain
  • Type
    Token Bridge
  • Chart

    ...

    Tokens

    Choose token

    Bridged Tokens (Top 15)

    RAZOR (RAZOR)
    SKALE (SKL)
    Pax Dollar (USDP)
    USD Coin (USDC)
    Ether (ETH)
    Tether USD (USDT)
    Dai Stablecoin (DAI)
    Wrapped BTC (WBTC)
    ChainLink Token (LINK)
    Risk summary
    Note: This project's overview requires more research and might not present accurate information. If you want to contribute you can edit the information on Github. Alternatively you contact the project team on Twitter and encourage them to contribute a PR.
    Technology

    Principle of Operation

    Note: This section requires more research and might not present accurate information.

    It is a cross-chain BLS threshold bridge that allows users to transfer Eth, ERC20, ERC721, ERC1155 and arbitrary messages between Ethereum and SKALE chains without fees and between SKALE chains without gas fees. Locks/Unlocks on main chain (Ethereum or SKALE chain which is origin of the asset), Burns/Mints on target chain.

    1. Bridging transactions

    Validation

    Note: This section requires more research and might not present accurate information.

    SKALE IMA Bridge operates on SKALE Network nodes for connected SKALE chain. Messages are signed by BLS secret key with a 11 out of 16 threshold, then sent and validated on Ethereum. The validator set signing the message is the same one that is used for the consensus of the SKALE chain, making the bridge as secure as the chain itself. Since the state root is not sent to L1, the bridge and the chain state can diverge.

    1. SKALE IMA Bridge - Overview
    Permissions

    The system uses the following set of permissioned addresses:

    ProxyAdminOwner 0x13fD…31C0

    This is an owner of DepositBox contracts proxies, can upgrade the implementation of those contracts, which potentially can introduce bug or introduce malicious behaviors. This is a Gnosis Safe with 3 / 5 threshold.

    Those are the participants of the ProxyAdminOwner.

    Smart contracts

    The system consists of the following smart contracts:

    Contract responsible for sending and receiving messages. It is used internally by the DepositBox contracts to transfer value between chains. It supports gas reimbursement from the CommunityPool.

    Bridge contract to transfer ETH to Skale chains, Proxy, Source code of implementation is verified on Etherscan. This contract stores the following tokens: ETH.

    Bridge contract to transfer ERC721 tokens with metadata to Skale chains, Proxy, Source code of implementation is verified on Etherscan.

    Bridge contract to transfer ERC20 tokens to Skale chains, Proxy, Source code of implementation is verified on Etherscan. This contract stores the following tokens: RAZOR, USDP, USDC, SKL, DAI, USDT, WBTC, LINK.

    Bridge contract to transfer ERC721 tokens to Skale chains, Proxy, Source code of implementation is verified on Etherscan.

    Bridge contract to transfer ERC1155 tokens to Skale chains, Proxy, Source code of implementation is verified on Etherscan.

    CommunityPool is Gas Wallet contract, where users need to deposit Eth, to be able to transfer their assets(Eth, ERC20, NFTs) or messages from SKALE chain to Ethereum. Deposited amount will be spend for gas reimbursement to Agent which will deliver message on Ethereum.

    Value Locked is calculated based on these smart contracts and tokens:

    Escrow for RAZOR, USDP, USDC, SKL, DAI, USDT, WBTC, LINK 0x8fB1…7669Implementation (Upgradable)Admin

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).

    If you find something wrong on this page you can submit an issue or edit the information