Search for projects by name
L2BEAT Bridges is a work in progress. You might find incomplete research or inconsistent naming. Join our Discord to suggest improvements!
StarGate is built on top of LayerZero protocol and is a liquidity network for cross-chain transfer for assets.
StarGate is built on top of LayerZero protocol and is a liquidity network for cross-chain transfer for assets.
StarGate is built on top of LayerZero protocol and is a liquidity network for cross-chain transfer for assets.
It leverages an oracle and relayer for cross-chain security for the protocol. Note that StarGate UI also supports omnichain tokens built directly on top of LayerZero protocol, e.g. JOE.
StarGate is a Liquidity Network. It relies on liquidity providers to supply tokens to liquidity pools on each chain. Users can swap tokens between chains by transferring their tokens to a pool and receive token from the pool on the destination chain.
StarGate is built on top of LayerZero protocol. LayerZero relies on oracles to periodically submit source chain block hashes to the destination chain. Once block hash is submitted, relayers can provide the merkle proof for the transfers / swaps.
Users can be censored if oracles or relayers fail to facilitate the transfer.
Funds can be stolen if oracles and relayers collude to submit fraudulent block hash and relay fraudulent transfer .
A Gnosis Safe with 3 / 6 threshold. Bridge owner, can create new pools, chainpaths, set fees.
Used in:
Those are the participants of the StarGate Multisig.
A Gnosis Safe with 2 / 4 threshold. The owner of Endpoint, UltraLightNode and Treasury contracts. Can switch to a new UltraLightNode for an Endpoint. Can switch proof library for an UltraLightNode and change Treasury.
Used in:
Those are the participants of the LayerZero Multisig.
Contract authorized to relay messages and - as a result - withdraw funds from the bridge.
Used in:
Can upgrade LayerZero relayer contract with no delay.
Can upgrade LayerZero oracle contract with no delay.
Factory contract managing all liquidity pools.
Proxy used in:
Implementation used in:
Proxy used in:
Implementation used in:
USDC Escrow
USDT Escrow
USDD Escrow
DAI Escrow
FRAX Escrow
LUSD Escrow
METIS Escrow
USDT Pool 2
WOO Pool
mETH Pool
The current deployment carries some associated risks:
Funds can be stolen if the source code of unverified contracts contains malicious code (CRITICAL).