Search for projects by name
L2BEAT Bridges is a work in progress. You might find incomplete research or inconsistent naming. Join our Discord to suggest improvements!
This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.
This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.
This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.
Socket is highly flexible and configurable and risks vary depending on the current configuration of the specific route. It allows to define custom Token Vaults that communicate using different messaging protocols. Token Vaults are connected via Plugs and Switchboards to their remote counterparts. The central contract on each chain, Socket, stores the configuration of all Plugs and Switchboards. Some Switchboards may be as secure as “native” (canonical) bridge, some may use simple Relayers/Watchers to move messages across chains.
Socket is a bridge framework connecting different chains via a set of “switchboards”. Every chain using Socket for some of its tokens can mix & match many switchboards with varying trust assumptions, for example mixing a “fast” route via “Fast Switchboard” with a “Standard Route” using a native rollup AMB.
Vaults can use any registered switchboards. The validation model is chosen by the switchboard and their security can vary from using a canonical bridge to a third-party validation model.
Users can be censored if watchers fail to facilitate the transfer.
Funds can be stolen if watchers submit fraudulent block hash and relay fraudulent transfer.
Funds can be stolen if the Socket Vault owners change the Vault configuration.
Account privileged to set up different roles in the main Socket contract.
A Gnosis Safe with 2 / 3 threshold. Multisig that owns the Socket Vaults associated with Lyra.
Those are the participants of the LyraMultisig.
A Gnosis Safe with 3 / 5 threshold. Multisig that owns the Socket Vaults associated with Kinto.
Those are the participants of the KintoMultisig.
owns some Vaults associated with Kinto.
A Gnosis Safe with 3 / 5 threshold. Multisig that owns a Socket Vault associated with LOOKS token.
Those are the participants of the LooksRareMultisig.
EOA that owns the Socket Vaults associated with Polynomial L2.
Central contract in Socket SuperBridge holding configuration of all Plugs and associated Switchboards.
Fast Switchboard having a set of Watchers authorizing transfers. If the transfer is not explicitly authorized within certain period of time, it is optimistically considered to be valid. Watchers can also stop (trip) an invalid transfer.
Switchboard using native Polygon message passing.
Switchboard using native Optimism message passing.
Switchboard using native Arbitrum message passing.
Manages crosschain execution and fees.
Manages and verifies transmitters: Permissioned actors who are allowed to send messages via socket.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Derive and owned by LyraMultisig.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoEOA.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoEOA.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoEOA.
Socket Vault associated with Kinto and owned by KintoEOA.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoMultisig.
Socket Vault associated with Kinto and owned by KintoEOA.
Socket Vault associated with Kinto and owned by KintoEOA.
Socket Vault associated with Kinto and owned by KintoEOA.
Socket Vault associated with Polynomial and owned by PolynomialEOA.
Socket Vault associated with Polynomial and owned by PolynomialEOA.
Socket Vault associated with Polynomial and owned by PolynomialEOA.
Socket Vault associated with Polynomial and owned by PolynomialEOA.
Socket Vault associated with Blast and owned by LooksRareMultisig.
Socket Vault associated with Zora and owned by Unknown Owner.
Socket Vault associated with Reya and owned by Socket EOA.
Socket Vault associated with Reya and owned by Socket EOA.
Socket Vault associated with Reya and owned by Socket EOA.
Socket Vault associated with Reya and owned by Socket EOA.
Socket Vault associated with Reya and owned by Socket EOA.
The current deployment carries some associated risks:
Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).
Funds can be stolen if the source code of unverified contracts contains malicious code (CRITICAL).