Search

Search for projects by name

L2BEAT Bridges is a work in progress. You might find incomplete research or inconsistent naming. Join our Discord to suggest improvements!

Socket logoSocket

The security parameters of each individual token and vault must be individually assessed, and can be changed by the developers. DYOR and use Socket at your own risk.

About

This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.


  • Total value secured
  • Destination
  • Validated by
    Third Party
  • Type
    Token Bridge

  • About

    This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.

    Value Secured

    2024 Jul 09 — 2025 Jul 09

    Detailed description

    This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.

    Socket is highly flexible and configurable and risks vary depending on the current configuration of the specific route. It allows to define custom Token Vaults that communicate using different messaging protocols. Token Vaults are connected via Plugs and Switchboards to their remote counterparts. The central contract on each chain, Socket, stores the configuration of all Plugs and Switchboards. Some Switchboards may be as secure as “native” (canonical) bridge, some may use simple Relayers/Watchers to move messages across chains.

    Risk summary
    This project includes unverified contracts. (CRITICAL)
    The security parameters of each individual token and vault must be individually assessed, and can be changed by the developers. DYOR and use Socket at your own risk.
    Technology

    Principle of operation

    Socket is a bridge framework connecting different chains via a set of “switchboards”. Every chain using Socket for some of its tokens can mix & match many switchboards with varying trust assumptions, for example mixing a “fast” route via “Fast Switchboard” with a “Standard Route” using a native rollup AMB.

    Various switchboards

    Note: This section requires more research and might not present accurate information.

    Vaults can use any registered switchboards. The validation model is chosen by the switchboard and their security can vary from using a canonical bridge to a third-party validation model.

    • Users can be censored if watchers fail to facilitate the transfer.

    • Funds can be stolen if watchers submit fraudulent block hash and relay fraudulent transfer.

    • Funds can be stolen if the Socket Vault owners change the Vault configuration.

    1. Protocol Design - Socket Documentation