Gluon logoGluon

This project is archived.
Value Locked

$70.96 K

10.25%

Canonically Bridged
$70.96 K (100%)
Externally Bridged
$0.00 (0%)
Natively Minted
$0.00 (0%)
  • Breakdown
  • Daily TPS
    Coming soon
  • 30D tx count
    Coming soon
  • Technology
    Plasma
  • Purpose
    Exchange

  • ...

    View tokens

    Choose a token

    Canonically Bridged Tokens (Top 15)

    Can't find a token?

    Request it here

    Description

    LeverJ trading platform appears to be in a maintenance mode as the team moved to build NFT trading platform. Social medias associated with the project are silent since mid 2021.

    Gluon aims to be a Layer 2 scalable trading engine built on top of Ethereum, unlocking low fees and high frequency trading.

    If you find something wrong on this page you can submit an issue or edit the information.

    Risk Analysis

    Sequencer failureState validationData availabilityUpgradeabilityProposer failure

    State validation

    Fraud proofs (!)

    Fraud proofs allow actors watching the chain to prove that the state is incorrect. Because the data is not present on chain the security of fraud proofs is severely weakened.

    Data availability

    External

    Proof construction and state derivation rely fully on data that is NOT published on chain.

    Upgradeability

    Yes

    The code that secures the system can be changed arbitrarily and without notice.

    Sequencer failure

    Force via L1

    Users can force the sequencer to include a withdrawal transaction by submitting a request through L1. If the sequencer censors or is down for , users can use the exit hatch to withdraw their funds.

    Proposer failure

    Use escape hatch

    Users are able to trustlessly exit by submitting a Merkle proof of funds.

    Note: This project's overview requires more research and might not present accurate information. If you want to contribute you can edit the information on Github. Alternatively you contact the project team on Twitter and encourage them to contribute a PR.

    Technology

    Fraud proofs ensure state correctness

    Note: This section requires more research and might not present accurate information.

    After some period of time, the published state root is assumed to be correct. For a certain time period, usually one week anyone can submit a fraud proof that shows that the state was incorrect.

    • Funds can be stolen if there is no one that checks the published state. Fraud proofs assume at least one honest and able validator.

    Data is not stored on chain

    Note: This section requires more research and might not present accurate information.

    The transaction data is stored on a plasma chain and is not recorded on the Ethereum main chain.

    • Funds can be lost if the external data becomes unavailable (CRITICAL).

    Operator

    The system has a centralized operator

    Note: This section requires more research and might not present accurate information.

    The operator is the only entity that can propose blocks. A live and trustworthy operator is vital to the health of the system.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    Users can independently exit the system

    Note: This section requires more research and might not present accurate information.

    Independent exit allows the users to escape censorship by withdrawing their funds. The system allows users to withdraw their funds by submitting a transaction directly to the contract on-chain.

    • Users can be censored if the operator refuses to include their transactions. However, there exists a mechanism to independently exit the system.

    Withdrawals

    Regular exit

    Note: This section requires more research and might not present accurate information.

    The user executes the withdrawal by submitting a transaction on L1 that requires a merkle proof of funds.

    The mass exit problem is unsolved

    Note: This section requires more research and might not present accurate information.

    In case the operator is malicious all users need to exit within a predetermined time frame. Users that do not manage to do this will lose their funds.

    • Funds can be stolen if users are unable to withdraw in a mass exit event.

    Smart Contracts

    The system consists of the following smart contracts:

    This contract stores the following tokens: ETH, DAI, L2.

    This contract stores the following tokens: DAI, USDT.

    LegacyTokensExtension 0xDA88…2082

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).