Search

Search for projects by name

L2BEAT Bridges is a work in progress. You might find incomplete research or inconsistent naming. Join our Discord to suggest improvements!

Socket logoSocket

The security parameters of each individual token and vault must be individually assessed, and can be changed by the developers. DYOR and use Socket at your own risk.

About

This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.


  • Total value locked
  • Destination
    Various
  • Validated by
    Third Party
  • Type
    Token Bridge

  • About

    This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.


    Value Locked
    Detailed description

    This page gathers Socket vaults built on top of Socket Data Layer cross chain messaging protocol.

    Socket is highly flexible and configurable and risks vary depending on the current configuration of the specific route. It allows to define custom Token Vaults that communicate using different messaging protocols. Token Vaults are connected via Plugs and Switchboards to their remote counterparts. The central contract on each chain, Socket, stores the configuration of all Plugs and Switchboards. Some Switchboards may be as secure as “native” (canonical) bridge, some may use simple Relayers/Watchers to move messages across chains.

    Risk summary
    This project includes unverified contracts. (CRITICAL)
    The security parameters of each individual token and vault must be individually assessed, and can be changed by the developers. DYOR and use Socket at your own risk.
    Technology

    Principle of operation

    Socket is a bridge framework connecting different chains via a set of “switchboards”. Every chain using Socket for some of its tokens can mix & match many switchboards with varying trust assumptions, for example mixing a “fast” route via “Fast Switchboard” with a “Standard Route” using a native rollup AMB.

    Various switchboards

    Note: This section requires more research and might not present accurate information.

    Vaults can use any registered switchboards. The validation model is chosen by the switchboard and their security can vary from using a canonical bridge to a third-party validation model.

    • Users can be censored if watchers fail to facilitate the transfer.

    • Funds can be stolen if watchers submit fraudulent block hash and relay fraudulent transfer.

    • Funds can be stolen if the Socket Vault owners change the Vault configuration.

    1. Protocol Design - Socket Documentation
    Permissions

    The system uses the following set of permissioned addresses:

    socketadmin.eth EOA 0xB0BB…1836

    Account privileged to set up different roles in the main Socket contract.

    LyraMultisig 0x246d…9fCF

    A Gnosis Safe with 2 / 3 threshold. Multisig that owns the Socket Vaults associated with Lyra.

    LyraMultisig participants (3) 0xb88D…1F650x76E6…6D520x4cEa…9F12

    Those are the participants of the LyraMultisig.

    KintoMultisig KintoEOA

    A Gnosis Safe with 3 / 5 threshold. Multisig that owns the Socket Vaults associated with Kinto.

    Those are the participants of the KintoMultisig.

    KintoEOA KintoMultisig

    owns some Vaults associated with Kinto.

    LooksRareMultisig 0xC8C5…ef13

    A Gnosis Safe with 3 / 5 threshold. Multisig that owns a Socket Vault associated with LOOKS token.

    Those are the participants of the LooksRareMultisig.

    PolynomialEOA 0xAeBF…B332

    EOA that owns the Socket Vaults associated with Polynomial L2.

    Smart contracts
    Note: This section requires more research and might not present accurate information.
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    The system consists of the following smart contracts on the host chain (Ethereum):

    Central contract in Socket SuperBridge holding configuration of all Plugs and associated Switchboards.

    FastSwitchboard 0xD5a8…F5cD

    Fast Switchboard having a set of Watchers authorizing transfers. If the transfer is not explicitly authorized within certain period of time, it is optimistically considered to be valid. Watchers can also stop (trip) an invalid transfer.

    PolygonL1Switchboard 0x0534…62CD

    Switchboard using native Polygon message passing.

    OptimismSwitchboard 0x139f…c287

    Switchboard using native Optimism message passing.

    ArbitrumL1Switchboard 0xdf5f…9CAe

    Switchboard using native Arbitrum message passing.

    ExecutionManager 0x98CA…e57C

    Manages crosschain execution and fees.

    TransmitManager 0xeD03…0341

    Manages and verifies transmitters: Permissioned actors who are allowed to send messages via socket.

    Value Locked is calculated based on these smart contracts and tokens:

    Escrow for sUSDe 0xE3E9…37bf

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for USDC 0x6D30…cC1d

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for USDe 0x26Cf…0C2A

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for USDT 0x5e98…ECBa

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for sDAI 0x613e…C142

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for DAI 0x7E1d…0c91

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for weETH 0x8180…bf78

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for WETH 0xD4ef…1b7e

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for rswETH 0x4BB4…1eB4

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for rsETH 0x35d4…1caD

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for LBTC 0x7662…B803

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for SNX 0x7D7a…5592

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for WBTC 0x3Eec…E3ab

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for eBTC 0x25d3…55A5

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for cbBTC 0x5F18…9F50

    Socket Vault associated with Derive and owned by LyraMultisig.

    Escrow for sDAI 0x5B8A…Fb85

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for sUSDe 0x43b7…5b32

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for SPX 0xd122…e6A8

    Socket Vault associated with Kinto and owned by KintoEOA.

    Escrow for USDe 0xdf34…8c1e

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for USDC 0x755c…5f0d

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for ETHFI 0x95d6…37E5

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for MKR 0x0fC7…dCc2

    Socket Vault associated with Kinto and owned by KintoEOA.

    Escrow for EIGEN 0xdb16…e640

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for wstETH 0xc5d0…f2dc

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for LINK 0xA6Ae…4013

    Socket Vault associated with Kinto and owned by KintoEOA.

    Escrow for SOL 0xA2bc…80f8

    Socket Vault associated with Kinto and owned by KintoEOA.

    Escrow for weETH 0xeB66…6397

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for WETH 0x00A0…8A94

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for DAI 0x12Cf…EcB5

    Socket Vault associated with Kinto and owned by KintoMultisig.

    Escrow for PAXG 0x25f0…0ef2

    Socket Vault associated with Kinto and owned by KintoEOA.

    Escrow for XAUt 0xd04B…E8bF

    Socket Vault associated with Kinto and owned by KintoEOA.

    Escrow for cbBTC 0x8F52…86B9

    Socket Vault associated with Kinto and owned by KintoEOA.

    Escrow for USD0++ 0xDf9F…020F

    Socket Vault associated with Polynomial and owned by PolynomialEOA.

    Escrow for sUSDe 0xC6cf…032b

    Socket Vault associated with Polynomial and owned by PolynomialEOA.

    Escrow for USDC 0xDE16…d76F

    Socket Vault associated with Polynomial and owned by PolynomialEOA.

    Escrow for sDAI 0x6151…9eDc

    Socket Vault associated with Polynomial and owned by PolynomialEOA.

    Escrow for LOOKS 0xa83B…5137

    Socket Vault associated with Blast and owned by LooksRareMultisig.

    Escrow for USDT 0x1417…66fB

    Socket Vault associated with Zora and owned by Unknown Owner.

    Escrow for USDC 0xdFf7…75f7

    Socket Vault associated with Reya and owned by Socket EOA.

    Escrow for USDe 0xaA2f…0F35

    Socket Vault associated with Reya and owned by Socket EOA.

    Escrow for sUSDe 0x5F3B…0Cd3

    Socket Vault associated with Reya and owned by Socket EOA.

    Escrow for WETH 0x64dF…D658

    Socket Vault associated with Reya and owned by Socket EOA.

    Escrow for WBTC 0x2344…d4B6

    Socket Vault associated with Reya and owned by Socket EOA.

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).

    • Funds can be stolen if the source code of unverified contracts contains malicious code (CRITICAL).