Search

Search for projects by name or address

Gravity logo
Gravity

Badges

About

Gravity is an Optimium built on the Orbit stack. It features onchain questing and has its own gas token - G. Other Galxe products are aiming to integrate with the L2 and a future migration to an L1 of the same name is planned.


  • Total Value SecuredTVS
    $26.77 M14.4%
  • Past day UOPSDaily UOPS
    1.7063.1%
  • Gas token
    G
  • Type
    Other

  • Purpose
    Universal
  • Chain ID
    1625

  • Tokens breakdown

    Value secured breakdown

    View TVS breakdown
    Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Gravity is an Optimium built on the Orbit stack. It features onchain questing and has its own gas token - G. Other Galxe products are aiming to integrate with the L2 and a future migration to an L1 of the same name is planned.

    Why is the project listed in others?

    There are less than 5 external actors that can submit challenges

    Consequence: projects without a sufficiently decentralized set of challengers rely on few entities to safely update the state. A small set of challengers can collude with the proposer to finalize an invalid state, which can cause loss of funds.

    There are less than 5 external actors that can attest data availability

    Consequence: projects without a sufficiently decentralized data availability committee rely on few entities to safely attest data availability on Ethereum. A small set of entities can collude with the proposer to finalize an unavailable state, which can cause loss of funds.

    Learn more about the recategorisation here.


    Total
    Canonically BridgedCanonically Bridged ValueCanonical
    Natively MintedNatively Minted TokensNative
    Externally BridgedExternally Bridged ValueExternal

    ETH & derivatives
    Stablecoins
    BTC & derivatives
    Other

    2025 Feb 13 — 2026 Feb 13

    Past Day UOPS
    1.70
    Past Day Ops count
    146.99 K
    Max. UOPS
    69.45
    2024 Aug 19
    Past day UOPS/TPS Ratio
    1.00

    The section shows the operating costs that L2s pay to Ethereum.


    2025 Feb 13 — 2026 Feb 13


    Total cost
    $6.59 K
    Avg cost per L2 UOP
    $0.000038
    Avg cost per day
    $18.00

    This section shows how much data the project publishes to its data-availability (DA) layer over time. The project currently posts data toCelestiaCelestia.


    2025 Apr 29 — 2026 Feb 13


    Data posted
    15.20 GiB
    Avg size per day
    78.24 MiB
    Avg size per L2 UOP
    159.47 B

    This section shows how "live" the project's operators are by displaying how frequently they submit transactions of the selected type. It also highlights anomalies - significant deviations from their typical schedule.

    No ongoing anomalies detected

    Avg. tx data subs. interval
    Avg. state updates interval
    Past 30 days anomalies

    Gravity stops using Celestia

    2025 Nov 18th

    Gravity stops using Celestia and switches to ArbOS v32 with a DAC for data availability.

    Learn more

    Gravity starts using Blobstream

    2025 Apr 28th

    Upgraded ChallengeManager contract to the version that uses Celestia with Blobstream bridge.

    Learn more
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    Sequencer failureState validationData availabilityExit windowProposer failure
    Sequencer failure
    Self sequence

    In the event of a sequencer failure, users can force transactions to be included in the project’s chain by sending them to L1. There can be up to a 2y 9mo delay on this operation.

    State validation
    Fraud proofs (INT)

    No actor outside of the single Proposer can submit fraud proofs. Interactive proofs (INT) require multiple transactions over time to resolve. The challenge protocol can be subject to delay attacks. There is a 5d 14h challenge period.

    Data availability
    External (DAC)

    Proof construction relies fully on data that is NOT published onchain. There exists a Data Availability Committee (DAC) with a threshold of 1/1 that is tasked with protecting and supplying the data.

    Exit window
    None

    There is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.

    Proposer failure
    Cannot withdraw

    Only the whitelisted proposers can publish state roots on L1, so in the event of failure the withdrawals are frozen.

    Data is not stored on chain

    Users transactions are not published onchain, but rather sent to external trusted parties, also known as committee members (DAC). Members of the DAC collectively produce a Data Availability Certificate (comprising BLS signatures from a quorum) guaranteeing that the data behind the new transaction batch will be available until the expiry period elapses (currently a minimum of two weeks). This signature is not verified by L1, however external Validators will skip the batch if BLS signature is not valid resulting. This will result in a fraud proof challenge if this batch is included in a consecutive state update. It is assumed that at least one honest DAC member that signed the batch will reveal tx data to the Validators if Sequencer decides to act maliciously and withhold the data. If the Sequencer cannot gather enough signatures from the DAC, it will “fall back to rollup” mode and by posting the full data directly to the L1 chain. The current DAC threshold is 1 out of 1.

    • Funds can be lost if the external data becomes unavailable (CRITICAL).

    • Users can be censored if the committee restricts their access to the external data.

    1. Inside AnyTrust - Arbitrum documentation
    A diagram of the state validation
    A diagram of the state validation

    Updates to the system state can be proposed and challenged by a set of whitelisted validators. If a state root passes the challenge period, it is optimistically considered correct and made actionable for withdrawals.


    State root proposals

    Validators propose state roots as children of a previous state root. A state root can have multiple conflicting children. State roots are referred to as “assertions” within the contracts. Each chain of assertions only requires one stake, and validators staked on assertions with a child are considered inactive and can either move their stake to a new node or withdraw it. The function used to propose a new assertion is the stakeOnNewAssertion function. The stake is currently set to 0.1 ETH, and it can be slashed if the proposal is proven incorrect via a fraud proof. The protocol allows such funds to be trustlessly pooled together if necessary. New nodes cannot be created faster than the minimum assertion period, currently set to 15m. An assertion without “rivals” can be confirmed after the challenge period has passed, currently set to 5d 14h. If a rival is present, then it is checked that the assertion is the winner in the challenge protocol.

    1. BoLD paper
    Challenges

    A challenge can be started between two siblings, i.e. two different state roots that share the same parent, by calling the createLayerZeroEdge function in the ChallengeManager contract. Edges represent assertions, or bisected assertions, within the challenge protocol. Challenges are played via a bisection game, where asserters and challengers play together to find the first instruction of disagreement. Such instruction is then executed onchain in the WASM OneStepProver contract to determine the winner. An edge can only be bisected when rivaled. The bisection process requires no new stake as their validity is checked against a parent “history root” that contains all intermediate states. An edge can also be confirmed if itself or its descendants spend enough time being unrivaled. Such time is set to 5d 14h. If both actors play as slow as possible, the maximum time to confirm an edge is double such value, i.e. 11d 4h. Due to the complexities of maintaining the history root, the challenge protocol is divided into 3 levels, where the lowest level represents assertions over blocks, the highest level represents assertions over single WASM instructions, and intermediate levels represent assertions over chunks of WASM instructions. When moving between levels, a new stake is required. Level 0 (block level) requires a stake of 0.0 ETH, level 1 requires a stake of 0.1 ETH, level 2 requires a stake of 0.1 ETH. The ratio between such stakes can be exploited to perform resource exhaustion attacks.

    • Funds can be stolen if an attacker successfully performs a resource exhaustion attack.

    1. Fraud Proof Wars: Arbitrum BoLD

    Program Hashes

    Name
    Hash
    Repository
    Verification
    Used in
    0x8a75...a499

    Projects used in

    Search for projects used in

    The system has a centralized sequencer

    While forcing transaction is open to anyone the system employs a privileged sequencer that has priority for submitting transaction batches and ordering transactions.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    1. Sequencer - Arbitrum documentation

    Users can force any transaction

    Because the state of the system is based on transactions submitted on the underlying host chain and anyone can submit their transactions there it allows the users to circumvent censorship by interacting with the smart contract on the host chain directly. After a delay of 2y 9mo in which a Sequencer has failed to include a transaction that was directly posted to the smart contract, it can be forcefully included by anyone on the host chain, which finalizes its ordering.

    1. SequencerInbox.sol - source code, forceInclusion function
    2. Sequencer Isn't Doing Its Job - Arbitrum documentation

    Buffered forced transactions

    To force transactions from the host chain, users must first enqueue “delayed” messages in the “delayed” inbox of the Bridge contract. Only authorized Inboxes are allowed to enqueue delayed messages, and the so-called Inbox contract is the one used as the entry point by calling the sendMessage or sendMessageFromOrigin functions. If the centralized sequencer doesn’t process the request within some time bound, users can call the forceInclusion function on the SequencerInbox contract to include the message in the canonical chain. The time bound is defined to be the minimum between 2y 9mo and the time left in the delay buffer. The delay buffer gets replenished over time and gets consumed every time the sequencer doesn’t timely process a message. Only messages processed with a delay greater than 428424622y 1mo consume the buffer. The buffer is capped at 428424622y 1mo. The replenish rate is currently set at 1m every 20m. Even if the buffer is fully consumed, messages are still allowed to be delayed up to 428424622y 1mo.

    1. Sequencer and censorship resistance - Arbitrum documentation

    Regular messaging

    The user initiates L2->L1 messages by submitting a regular transaction on this chain. When the block containing that transaction is settled, the message becomes available for processing on L1. The process of block finalization usually takes several days to complete.

    1. Transaction lifecycle - Arbitrum documentation
    2. L2 to L1 Messages - Arbitrum documentation
    3. Mainnet for everyone - Arbitrum Blog

    Autonomous exit

    Users can (eventually) exit the system by pushing the transaction on L1 and providing the corresponding state root. The only way to prevent such withdrawal is via an upgrade.

    EVM compatible smart contracts are supported

    Arbitrum One uses Nitro technology that allows running fraud proofs by executing EVM code on top of WASM.

    1. Inside Arbitrum Nitro
    A dashboard to explore contracts and permissions
    Go to Disco
    Disco UI Banner

    Ethereum

    Roles:

    Can submit transaction batches or commitments to the SequencerInbox contract on the host chain.

    Validator EOA 1

    Can propose new state roots (called nodes) and challenge state roots on the host chain.

    Used in:

    Actors:

    Conduit Multisig 1 0x4a49…A746

    A Multisig with 4/13 threshold.

    • Can upgrade with no delay
      • EdgeChallengeManager
      • Outbox
      • RollupProxy
      • Bridge
      • Inbox
      • SequencerInbox
      • RollupEventInbox
      • UpgradeExecutor
    • Can interact with RollupProxy
      • Pause and unpause and set important roles and parameters in the system contracts: Can delegate Sequencer management to a BatchPosterManager address, manage data availability and DACs, set the Sequencer-only window, introduce an allowList to the bridge and whitelist Inboxes/Outboxes
    Used in:
    SP1VerifierGatewayMultisig 0xCafE…6878

    A Multisig with 2/3 threshold.

    • Can interact with SP1VerifierGateway
      • affect the liveness and safety of the gateway - can transfer ownership, add and freeze verifier routes
    Used in:
    BlobstreamMultisig 0x8bF3…18E6

    A Multisig with 4/6 threshold.

    • Can upgrade with no delay
      • EthereumBlobstream
    • Can interact with EthereumBlobstream
      • can freeze the bridge contract and update the list of authorized relayers
    Used in:
    Used in:
    EOA 15 and EOA 16 (2) 0x3243…392D0x9c0B…afDC
    • Can interact with EthereumBlobstream
      • it is a ‘Relayer’ and can call commitHeaderRange() to commit block ranges. Since adding and removing Relayers emits no events, there can be more relayers than are presented here

    Arbitrum One

    Actors:

    SP1VerifierGatewayMultisig 0xCafE…6878

    A Multisig with 2/3 threshold.

    • Can interact with SP1VerifierGateway
      • affect the liveness and safety of the gateway - can transfer ownership, add and freeze verifier routes
    Used in:
    BlobstreamMultisig 0x738a…7997

    A Multisig with 4/6 threshold.

    • Can upgrade with no delay
      • ArbitrumBlobstream
    • Can interact with ArbitrumBlobstream
      • can freeze the bridge contract and update the list of authorized relayers
    Used in:
    EOA 11 and EOA 12 (2) 0x3243…392D0x9c0B…afDC
    • Can interact with ArbitrumBlobstream
      • it is a ‘Relayer’ and can call commitHeaderRange() to commit block ranges. Since adding and removing Relayers emits no events, there can be more relayers than are presented here

    Base Chain

    Actors:

    SP1VerifierGatewayMultisig 0xCafE…6878

    A Multisig with 2/3 threshold.

    • Can interact with SP1VerifierGateway
      • affect the liveness and safety of the gateway - can transfer ownership, add and freeze verifier routes
    Used in:
    BlobstreamMultisig 0x6ABa…1Ca6

    A Multisig with 4/6 threshold.

    • Can upgrade with no delay
      • BaseBlobstream
    • Can interact with BaseBlobstream
      • can freeze the bridge contract and update the list of authorized relayers
    Used in:
    EOA 13 and EOA 14 (2) 0x3243…392D0x9c0B…afDC
    • Can interact with BaseBlobstream
      • it is a ‘Relayer’ and can call commitHeaderRange() to commit block ranges. Since adding and removing Relayers emits no events, there can be more relayers than are presented here
    A dashboard to explore contracts and permissions
    Go to Disco
    Disco UI Banner
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    Ethereum

    Contract that implements the main challenge protocol logic of the fraud proof system.

    • Roles:
      • admin: ProxyAdmin; ultimately Conduit Multisig 1
    Implementation used in:

    Central contract for the project’s configuration like its execution logic hash (wasmModuleRoot) and addresses of the other system contracts. Entry point for Proposers creating new assertions (state commitments) and Challengers submitting fraud proofs (In the Orbit stack, these two roles are both called Validators).

    • Roles:
      • admin: UpgradeExecutor; ultimately Conduit Multisig 1
      • getValidators: EOA 1
      • owner: UpgradeExecutor; ultimately Conduit Multisig 1
    Implementation used in:

    Escrow contract for the project’s gas token (can be different from ETH). Keeps a list of allowed Inboxes and Outboxes for canonical bridge messaging.

    • Roles:
      • admin: ProxyAdmin; ultimately Conduit Multisig 1
    • This contract stores the following tokens: G.
    Implementation used in:

    A sequencer (registered in this contract) can submit transaction batches or commitments here.

    • Roles:
      • admin: ProxyAdmin; ultimately Conduit Multisig 1
      • batchPosters: EOA 10, EOA 2, EOA 3, EOA 4, EOA 5, EOA 6, EOA 7, EOA 8, EOA 9
    Implementation used in:

    Central contract defining the access control permissions for upgrading the system contract implementations.

    • Roles:
      • admin: ProxyAdmin; ultimately Conduit Multisig 1
      • executors: Conduit Multisig 1
    Implementation used in:

    Facilitates L2 to L1 contract calls: Messages initiated from L2 (for example withdrawal messages) eventually resolve in execution on L1.

    • Roles:
      • admin: ProxyAdmin; ultimately Conduit Multisig 1
    Implementation used in:

    Facilitates sending L1 to L2 messages like depositing ETH, but does not escrow funds.

    • Roles:
      • admin: ProxyAdmin; ultimately Conduit Multisig 1
    Implementation used in:
    OneStepProverMemory 0x29ef…2283

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    Implementation used in:
    OneStepProver0 0x7368…5835

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    Implementation used in:
    OneStepProofEntry 0x91cB…A64f

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    Implementation used in:

    Helper contract sending configuration data over the bridge during the systems initialization.

    • Roles:
      • admin: ProxyAdmin; ultimately Conduit Multisig 1
    Implementation used in:
    ProxyAdmin 0xBbc3…7E68
    • Roles:
      • owner: UpgradeExecutor
    OneStepProverMath 0xD1D7…F5e4

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    Implementation used in:
    OneStepProverHostIo 0xDdaD…2D60

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    Implementation used in:
    SP1Verifier 0x0459…C459

    Verifier contract for SP1 proofs (v5.0.0).

    Implementation used in:
    SP1VerifierGateway 0x3B60…185e

    This contract is the router for zk proof verification. It stores the mapping between identifiers and the address of onchain verifier contracts, routing each identifier to the corresponding verifier contract.

    • Roles:
      • owner: SP1VerifierGatewayMultisig
    Implementation used in:

    The Blobstream DA bridge. This contract is used to bridge data commitments between Celestia and the destination chain. It specifies relayers that commit block ranges, but due to the lack of emitted events, there may be more relayers than are presented here.

    • Roles:
      • admin: BlobstreamMultisig
      • guardians: BlobstreamMultisig
      • relayers: EOA 15, EOA 16
    Proxy used in:

    Arbitrum One

    SP1Verifier 0x0459…C459

    Verifier contract for SP1 proofs (v5.0.0).

    Implementation used in:
    SP1VerifierGateway 0x3B60…185e

    This contract is the router for zk proof verification. It stores the mapping between identifiers and the address of onchain verifier contracts, routing each identifier to the corresponding verifier contract.

    • Roles:
      • owner: SP1VerifierGatewayMultisig
    Implementation used in:

    The Blobstream DA bridge. This contract is used to bridge data commitments between Celestia and the destination chain. It specifies relayers that commit block ranges, but due to the lack of emitted events, there may be more relayers than are presented here.

    • Roles:
      • admin: BlobstreamMultisig
      • guardians: BlobstreamMultisig
      • relayers: EOA 11, EOA 12
    Proxy used in:

    Base Chain

    SP1Verifier 0x0459…C459

    Verifier contract for SP1 proofs (v5.0.0).

    Implementation used in:
    SP1VerifierGateway 0x3B60…185e

    This contract is the router for zk proof verification. It stores the mapping between identifiers and the address of onchain verifier contracts, routing each identifier to the corresponding verifier contract.

    • Roles:
      • owner: SP1VerifierGatewayMultisig
    Implementation used in:

    The Blobstream DA bridge. This contract is used to bridge data commitments between Celestia and the destination chain. It specifies relayers that commit block ranges, but due to the lack of emitted events, there may be more relayers than are presented here.

    • Roles:
      • admin: BlobstreamMultisig
      • guardians: BlobstreamMultisig
      • relayers: EOA 13, EOA 14
    Proxy used in:

    Value Secured is calculated based on these smart contracts and tokens:

    Contract managing Inboxes and Outboxes. It escrows G sent to L2.

    Can be upgraded by:
    Implementation used in:

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).

    Program Hashes

    Name
    Hash
    Repository
    Verification
    Used in
    0x8a75...a499

    Projects used in

    Search for projects used in