Gluon
About
Gluon aims to be a Layer 2 scalable trading engine built on top of Ethereum, unlocking low fees and high frequency trading.
$34.57 K
4.45%
About
Gluon aims to be a Layer 2 scalable trading engine built on top of Ethereum, unlocking low fees and high frequency trading.
...
Choose token
![](https://assets.coingecko.com/coins/images/279/large/ethereum.png?1595348880)
![](https://assets.coingecko.com/coins/images/9956/large/Badge_Dai.png?1696509996)
![](https://assets.coingecko.com/coins/images/325/large/Tether.png?1696501661)
Funds can be stolen if
Funds can be lost if
Users can be censored if
MEV can be extracted if
State validation
Fraud proofs (!)Fraud proofs allow actors watching the chain to prove that the state is incorrect. Because the data is not present on chain the security of fraud proofs is severely weakened.
Data availability
ExternalProof construction and state derivation rely fully on data that is NOT published on chain.
Exit window
NoneThere is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.
Sequencer failure
Force via L1Proposer failure
Use escape hatchUsers are able to trustlessly exit by submitting a Merkle proof of funds.
Fraud proofs ensure state correctness
After some period of time, the published state root is assumed to be correct. For a certain time period, usually one week anyone can submit a fraud proof that shows that the state was incorrect.
Funds can be stolen if there is no one that checks the published state. Fraud proofs assume at least one honest and able validator.
Data is not stored on chain
The transaction data is stored on a plasma chain and is not recorded on the Ethereum main chain.
Funds can be lost if the external data becomes unavailable (CRITICAL).
The system has a centralized operator
The operator is the only entity that can propose blocks. A live and trustworthy operator is vital to the health of the system.
MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.
Users can independently exit the system
Independent exit allows the users to escape censorship by withdrawing their funds. The system allows users to withdraw their funds by submitting a transaction directly to the contract on-chain.
Users can be censored if the operator refuses to include their transactions. However, there exists a mechanism to independently exit the system.
Regular exit
The user executes the withdrawal by submitting a transaction on L1 that requires a merkle proof of funds.
The mass exit problem is unsolved
In case the operator is malicious all users need to exit within a predetermined time frame. Users that do not manage to do this will lose their funds.
Funds can be stolen if users are unable to withdraw in a mass exit event.
The system consists of the following smart contracts on the host chain (Ethereum):
This contract stores the following tokens: ETH, DAI.
This contract stores the following tokens: DAI, USDT.
The current deployment carries some associated risks:
Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).