Search

Search for projects by name

Arbitrum One logoArbitrum One

Badges

About

Arbitrum One is a general-purpose Optimistic Rollup built by Offchain Labs and governed by the Arbitrum DAO.


Value Locked
$17.10 B13.2%
Canonically Bridged
$6.38 B
Externally Bridged
$4.66 B
Natively Minted
$6.05 B

  • Tokens
  • Daily UOPS
    29.7215.3%
  • 30D tx count
    64.55 M

  • Stage
    Stage 1
  • Type
    Optimistic Rollup
  • Purpose
    Universal
  • Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Arbitrum One is a general-purpose Optimistic Rollup built by Offchain Labs and governed by the Arbitrum DAO.


    Value Locked
    Activity
    Onchain costs
    Milestones & Incidents

    Exit window extension to 7 days

    2024 Oct 25th

    ArbOS 32 Emergency upgrade

    2024 Sep 25th

    SecurityCouncil emergency upgrades to fix attack vectors related to Stylus resource pricing.

    Learn more
    Risk summary
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    Risk analysis
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    Sequencer failureState validationData availabilityExit windowProposer failure

    Sequencer failure

    Self sequence

    In the event of a sequencer failure, users can force transactions to be included in the project’s chain by sending them to L1. There is a 1d delay on this operation.

    State validation

    Fraud proofs (INT)

    Fraud proofs allow 14 WHITELISTED actors watching the chain to prove that the state is incorrect. Interactive proofs (INT) require multiple transactions over time to resolve. There is a 6d 8h challenge period.

    Data availability

    Onchain

    All of the data needed for proof construction is published on Ethereum L1.

    Exit window

    7d
    The Security Council can upgrade with no delay.

    Non-emergency upgrades are initiated on L2 and go through a 8d delay. Since there is a 1d delay to force a tx (forcing the inclusion in the following state update), users have only 7d to exit.

    If users post a tx after that time, they would only be able to self propose a state root 12d 17h after the last state root was proposed and then wait for the 6d 8h challenge window, while the upgrade would be confirmed just after the 6d 8h challenge window and the 3d L1 timelock.

    Proposer failure

    Self propose

    Anyone can become a Proposer after 12d 17h of inactivity from the currently whitelisted Proposers.

    Rollup stage
    Arbitrum OneArbitrum One is a
    Stage 1
    Optimistic Rollup.

    Learn more about Rollup stages
    Please keep in mind that these stages do not reflect rollup security, this is an opinionated assessment of rollup maturity based on subjective criteria, created with a goal of incentivizing projects to push toward better decentralization. Each team may have taken different paths to achieve this goal.
    Technology

    All data required for proofs is published on chain

    All the data that is used to construct the system state is published on chain in the form of cheap blobs or calldata. This ensures that it will be available for enough time.

    1. Sequencing followed by deterministic execution - Arbitrum documentation
    2. SequencerInbox.sol - Etherscan source code, addSequencerL2BatchFromOrigin function
    State derivation
    Node software

    The rollup node (Arbitrum Nitro) consists of four parts. The base layer is the core Geth server (with minor modifications to add hooks) that emulates the execution of EVM contracts and maintains Ethereum’s state and a fork of wasmer that is used for native WASM execution. The middle layer, ArbOS, provides additional Layer 2 functionalities such as decompressing data batches, accounting for Layer 1 gas costs, and supporting cross-chain bridge functionalities. The top layer consists of node software, primarily from Geth, that handles client connections (i.e., regular RPC node). View Code

    Compression scheme

    The Sequencer’s batches are compressed using a general-purpose data compression algorithm known as Brotli, configured to its highest compression setting.

    Genesis state

    They performed a regenesis from Classic to Nitro, and that file represents the last Classic state. To sync from the initial Classic state, instructions can be found here.

    Data format

    Nitro supports Ethereum’s data structures and formats by incorporating the core code of the popular go-ethereum (“Geth”) Ethereum node software. The batch is composed of a header and a compressed blob, which results from compressing concatenated RLP-encoded transactions using the standard RLP encoding.

    State validation
    A diagram of the state validation
    A diagram of the state validation

    Updates to the system state can be proposed and challenged by a set of whitelisted validators. If a state root passes the challenge period, it is optimistically considered correct and made actionable for withdrawals.


    State root proposals

    Whitelisted validators propose state roots as children of a previous state root. A state root can have multiple conflicting children. This structure forms a graph, and therefore, in the contracts, state roots are referred to as nodes. Each proposal requires a stake, currently set to 1.0 ETH, that can be slashed if the proposal is proven incorrect via a fraud proof. Stakes can be moved from one node to one of its children, either by calling stakeOnExistingNode or stakeOnNewNode. New nodes cannot be created faster than the minimum assertion period by the same validator, currently set to 15m. The oldest unconfirmed node can be confirmed if the challenge period has passed and there are no siblings, and rejected if the parent is not a confirmed node or if the challenge period has passed and no one is staked on it.

    • Funds can be stolen if none of the whitelisted verifiers checks the published state. Fraud proofs assume at least one honest and able validator (CRITICAL).

    1. How is fraud proven - Arbitrum documentation FAQ
    Challenges

    A challenge can be started between two siblings, i.e. two different state roots that share the same parent, by calling the startChallenge function. Validators cannot be in more than one challenge at the same time, meaning that the protocol operates with partial concurrency. Since each challenge lasts 6d 8h, this implies that the protocol can be subject to delay attacks, where a malicious actor can delay withdrawals as long as they are willing to pay the cost of losing their stakes. If the protocol is delayed attacked, the new stake requirement increases exponentially for each challenge period of delay. Challenges are played via a bisection game, where asserter and challenger play together to find the first instruction of disagreement. Such instruction is then executed onchain in the WASM OneStepProver contract to determine the winner, who then gets half of the stake of the loser. As said before, a state root is rejected only when no one left is staked on it. The protocol does not enforces valid bisections, meaning that actors can propose correct initial claim and then provide incorrect midpoints.

    1. Fraud Proof Wars: Arbitrum Classic
    Operator

    The system has a centralized sequencer

    While forcing transaction is open to anyone the system employs a privileged sequencer that has priority for submitting transaction batches and ordering transactions.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    1. Sequencer - Arbitrum documentation

    Users can force any transaction

    Because the state of the system is based on transactions submitted on the underlying host chain and anyone can submit their transactions there it allows the users to circumvent censorship by interacting with the smart contract on the host chain directly. After a delay of 1d in which a Sequencer has failed to include a transaction that was directly posted to the smart contract, it can be forcefully included by anyone on the host chain, which finalizes its ordering.

    1. SequencerInbox.sol - Etherscan source code, forceInclusion function
    2. Sequencer Isn’t Doing Its Job - Arbitrum documentation
    Withdrawals

    Regular exit

    The user initiates the withdrawal by submitting a regular transaction on this chain. When the block containing that transaction is finalized the funds become available for withdrawal on L1. The process of block finalization usually takes several days to complete. Finally the user submits an L1 transaction to claim the funds. This transaction requires a merkle proof.

    1. Transaction lifecycle - Arbitrum documentation
    2. L2 to L1 Messages - Arbitrum documentation
    3. Mainnet for everyone - Arbitrum Blog

    Tradeable Bridge Exit

    When a user initiates a regular withdrawal a third party verifying the chain can offer to buy this withdrawal by paying the user on L1. The user will get the funds immediately, however the third party has to wait for the block to be finalized. This is implemented as a first party functionality inside Arbitrum’s token bridge.

    1. Tradeable Bridge Exits - Arbitrum documentation

    Autonomous exit

    Users can (eventually) exit the system by pushing the transaction on L1 and providing the corresponding state root. The only way to prevent such withdrawal is via an upgrade.

    Other considerations

    EVM compatible and Stylus smart contracts are supported

    Arbitrum One supports smart contracts written in Solidity and other programming languages (Rust, C++) that compile to WASM. Such smart contracts are executed by nodes using either a geth fork or a fork of wasmer inside the Nitro node, and can be proven with the onchain WASM VM.

    • Funds can be lost if there are mistakes in the highly complex Nitro and WASM one-step prover implementation.

    1. Inside Arbitrum Nitro
    2. A gentle introduction: Stylus

    Arbitrum DAO is in charge of upgrades

    Arbitrum DAO allows $ARB token holders to propose and vote on changes to the organization and the technologies it governs. The governance smart contracts are implemented on Arbitrum One rollup chain. The DAO can upgrade the Arbitrum One contracts on L2 with 8d delay and - using L2 --> L1 Governance Relay, update contracts on L1 with additional 3d delay + 6d 8h delay for all L2 --> L1 messages (in total a delay of 17d 8h). The Security Council can upgrade the contracts without any delay. It can also cancel any upgrades initiated by the DAO.

    • Funds can be stolen if a contract receives a malicious code upgrade. There is a 17d 8h delay on code upgrades.

    1. Arbitrum DAO
    Upgrades & Governance
    A diagram of the upgrades and governance
    A diagram of the upgrades and governance

    All critical system smart contracts are upgradeable (can be arbitrarily changed). This permission is governed by the Arbitrum Decentralized Autonomous Organization (DAO) and their elected Security Council. The Arbitrum DAO controls Arbitrum One and Arbitrum Nova through upgrades and modifications to their smart contracts on Layer 1 Ethereum and the Layer 2s. While the DAO governs through token-weighted governance in their associated ARB token, the Security Council can directly act through the Security Council smart contracts on all three chains. Although these multisigs are technically separate and connect to different target permissions, their member- and threshold configuration is kept in sync by a manager contract on Arbitrum One and crosschain transactions.

    Regular upgrades, Admin- and Owner actions originate from either the Arbitrum DAO or the non-emergency (proposer-) Security Council on Arbitrum One and pass through multiple delays and timelocks before being executed at their destination. Contrarily, the three Emergency Security Council multisigs (one on each chain: Arbitrum One, Ethereum, Arbitrum Nova) can skip delays and directly access all admin- and upgrade functions of all smart contracts. These two general paths have the same destination: the respective UpgradeExecutor smart contract.

    Regular upgrades are scheduled in the L2 Timelock. The proposer Security Council can do this directly and the Arbitrum DAO (ARB token holders and delegates) must meet a CoreGovernor-enforced 5% threshold of the votable tokens. The L2 Timelock queues the transaction for a 8d delay and then sends it to the Outbox contract on Ethereum. This incurs another delay (the challenge period) of 6d 8h. When that has passed, the L1 Timelock delays for additional 3d. Both timelocks serve as delays during which the transparent transaction contents can be audited, and even cancelled by the Emergency Security Council. Finally, the transaction can be executed, calling Admin- or Owner functions of the respective destination smart contracts through the UpgradeExecutor on Ethereum. If the predefined transaction destination is Arbitrum One or -Nova, this last call is executed on L2 through the canonical bridge and the aliased address of the L1 Timelock.

    Operator roles like the Sequencers and Validators are managed using the same paths. Sequencer changes can be delegated to a Batch Poster Manager.

    Transactions targeting the Arbitrum DAO Treasury can be scheduled in the 3d Treasury Timelock by meeting a TreasuryGovernor-enforced 3% threshold of votable ARB tokens. The Security Council cannot regularly cancel these transactions or schedule different ones but can overwrite them anyway by having full admin upgrade permissions for all the underlying smart contracts.

    Permissions

    The system uses the following set of permissioned addresses:

    Central actors allowed to submit transaction batches to L1.

    They can submit new state roots and challenge state roots. Some of the operators perform their duties through special purpose smart contracts.

    SecurityCouncil 0xF06E…3F85

    This is a Gnosis Safe with 9 / 12 threshold. It uses the following modules: UpgradeExecutor. The admin of all contracts in the system, capable of issuing upgrades without notice and delay. This allows it to censor transactions and to upgrade the bridge implementation, potentially gaining access to all funds stored in the bridge and change the sequencer or any other system component (unlimited upgrade power). It is also the admin of the special purpose smart contracts used by validators.

    Used in:

    L1Timelock 0xE684…7f49

    Timelock contract for Arbitrum Governance transactions. Scheduled transactions from Arbitrum One L2 (by the DAO or the Security Council) are delayed here and can be canceled by the Security Council or executed to upgrade and change system contracts on Ethereum, Arbitrum One and -Nova.

    Used in:

    BatchPosterManagerMultisig 0xd0FD…679B

    This is a Gnosis Safe with 4 / 6 threshold. It can update whether an address is authorized to be a batch poster at the sequencer inbox. The UpgradeExecutor retains the ability to update the batch poster manager (along with any batch posters).

    Used in:

    Those are the participants of the BatchPosterManagerMultisig.

    The system consists of the following permissions on Arbitrum One:

    L2SecurityCouncilEmergency 0x4235…1641

    This is a Gnosis Safe with 9 / 12 threshold. It uses the following modules: L2UpgradeExecutor. The elected signers for the Arbitrum SecurityCouncil can act through this multisig on Layer2, permissioned to upgrade all system contracts without delay.

    Those are the participants of the L2SecurityCouncilEmergency.

    L2SecurityCouncilPropose 0xADd6…a941

    This is a Gnosis Safe with 9 / 12 threshold. It uses the following modules: L2UpgradeExecutor. The elected signers for the Arbitrum SecurityCouncil can act through this multisig on Layer2 to propose transactions in the L2Timelock (e.g. upgrade proposals).

    Smart contracts
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    The system consists of the following smart contracts on the host chain (Ethereum):

    Main contract implementing Arbitrum One Rollup. Manages other Rollup components, list of Stakers and Validators. Entry point for Validators creating new Rollup Nodes (state commits) and Challengers submitting fraud proofs.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Implementation used in:

    Contract managing Inboxes and Outboxes. It escrows ETH sent to L2. This contract stores the following tokens: ETH.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Implementation used in:

    Main entry point for the Sequencer submitting transaction batches to a Rollup. Sequencers can be changed here through the UpgradeExecutor or the BatchPosterManager.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Implementation used in:

    Entry point for users depositing ETH and sending L1 --> L2 messages. Deposited ETH is escrowed in a Bridge contract.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Arbitrum’s Outbox system allows for arbitrary L2 to L1 contract calls; i.e., messages initiated from L2 which eventually resolve in execution on L1.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    This contract can upgrade the system’s contracts. The upgrades can be done either by the Security Council or by the L1Timelock.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Proxy used in:

    Timelock contract for Arbitrum Governance transactions. Scheduled transactions from Arbitrum One L2 (by the DAO or the Security Council) are delayed here and can be canceled by the Security Council or executed to upgrade and change system contracts on Ethereum, Arbitrum One and -Nova.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Proxy used in:

    Router managing token <–> gateway mapping.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Implementation used in:

    Contract that allows challenging invalid state roots. Can be called through the RollupProxy by Validators or the UpgradeExecutor.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Implementation used in:

    OneStepProofEntry 0xa328…6FC7

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    OneStepProverMemory 0x5C9F…7A18

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    OneStepProverMath 0x2c78…F7c9

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    OneStepProverHostIo 0x8D78…2544

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    OneStepProver0 0xD046…c5B6

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    The system consists of the following smart contracts on Arbitrum One:

    Governance contract accepting and managing constitutional Arbitrum Improvement Proposals (AIPs, core proposals) and, among other formal parameters, enforcing the 5% quorum for proposals.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Delays constitutional AIPs from the CoreGovernor by 8d.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Governance contract used for creating non-constitutional AIPs, or “treasury proposals”, e.g., transferring founds out of the DAO Treasury. Also enforces the 3% quorum for proposals.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Delays treasury proposals from the TreasuryGovernor by 3d. Is used as the main recipient for the ETH from L2SurplusFee and L2BaseFee contracts.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    This contract can upgrade the L2 system’s contracts through the L2ProxyAdmin. The upgrades can be done either by the Security Council or by the L1Timelock (via its alias on L2).

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    This contract enforces the rules for changing members and cohorts of the SecurityCouncil and creates crosschain messages to Ethereum and Arbitrum Nova to keep the configuration in sync.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    ConstitutionHash 0x1D62…0417

    Keeps the current hash of the ArbitrumDAO Constitution. Settable by the L2UpgradeExecutor.

    L2ProxyAdmin 0xdb21…961e

    The owner (UpgradeExecutor) can upgrade proxies’ implementations of all L2 system contracts through this contract.

    L2GatewaysProxyAdmin 0xd570…2a86

    The owner (UpgradeExecutor) can upgrade proxies’ implementations of all L2 bridging gateway contracts through this contract.

    L2BaseFee 0xbF50…b649

    This contract receives all BaseFees: The transaction fee component that covers the minimum cost of Arbitrum transaction execution. They are withdrawable to a configurable set of recipients.

    L2SurplusFee 0x32e7…6b1d

    This contract receives all SurplusFees: Transaction fee component that covers the cost beyond that covered by the L2 Base Fee during chain congestion. They are withdrawable to a configurable set of recipients.

    The ARB token contract. Supply can be increased by the owner once per year by a maximum of 2%.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Router managing token <–> gateway mapping on L2.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Counterpart to the L1ERC20Gateway. Can mint (deposit to L2) and burn (withdraw to L1) ERC20 tokens on L2.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Counterpart to the Bridge on L1. Mints and burns WETH on L2.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    ARB sent from L2 to L1 is escrowed in this contract and minted on L1.

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    L2DAIGateway 0x4671…6C65

    Counterpart to the L1DaiGateway. Can mint (deposit to L2) and burn (withdraw to L1) DAI tokens on L2

    L2LPTGateway 0x6D24…D318

    Counterpart to the L1LPTGateway. Can mint (deposit to L2) and burn (withdraw to L1) LPT on L2

    Value Locked is calculated based on these smart contracts and tokens:

    Main entry point for users depositing ERC20 tokens that require minting custom tokens on L2.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Main entry point for users depositing ERC20 tokens. Upon depositing, on L2 a generic, “wrapped” token will be minted.

    Can be upgraded by:

    Upgrade delay: 17d 8h or 0 if overridden by the Security Council

    Contract managing Inboxes and Outboxes. It escrows ETH sent to L2.

    Can be upgraded by:

    Upgrade delay: No delay

    Implementation used in:

    Escrow for DAI 0xA10c…9400

    DAI Vault for custom DAI Gateway. Fully controlled by MakerDAO governance.

    wstETH Vault for custom wstETH Gateway. Fully controlled by Lido governance.

    Escrow for LPT 0x6A23…210A

    LPT Vault for custom Livepeer Token Gateway.

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is a 17d 8h delay on code upgrades unless upgrade is initiated by the Security Council in which case there is no delay.

    Knowledge nuggets