Search

Search for projects by name or address

Linea logo
Linea

Badges

About

Linea is a ZK Rollup powered by a zkEVM developed at Consensys, designed to scale the Ethereum network.


  • Total Value SecuredTVS
    $472.17 M9.33%
  • Past day UOPSDaily UOPS
    0.3826.2%
  • Stage
  • Gas token
    ETH

  • Type
    ZK Rollup
  • Purpose
    Universal
  • Chain ID
    59144

  • Tokens breakdown

    Value secured breakdown

    View TVS breakdown
    Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Linea is a ZK Rollup powered by a zkEVM developed at Consensys, designed to scale the Ethereum network.


    Total
    Canonically BridgedCanonically Bridged ValueCanonical
    Natively MintedNatively Minted TokensNative
    Externally BridgedExternally Bridged ValueExternal

    ETH & derivatives
    Stablecoins
    BTC & derivatives
    Other

    2025 Mar 12 — 2026 Mar 12

    Past Day UOPS
    0.38
    Past Day Ops count
    33.13 K
    Max. UOPS
    55.69
    2024 Mar 31
    Past day UOPS/TPS Ratio
    <1.01

    The section shows the operating costs that L2s pay to Ethereum.


    2025 Mar 13 — 2026 Mar 12


    Total cost
    $12.29 K
    Avg cost per L2 UOP
    $0.000251
    Avg cost per day
    $33.69

    This section shows how much data the project publishes to its data-availability (DA) layer over time. The project currently posts data toEthereumEthereum.


    2025 Mar 13 — 2026 Mar 12


    Data posted
    5.77 GiB
    Avg size per day
    16.18 MiB
    Avg size per L2 UOP
    126.16 B

    This section shows how "live" the project's operators are by displaying how frequently they submit transactions of the selected type. It also highlights anomalies - significant deviations from their typical schedule.

    No ongoing anomalies detected

    Avg. tx data subs. interval
    Avg. proof subs. interval
    Avg. state updates interval
    Past 30 days anomalies

    Linea halts for 1 hour

    2025 Sep 10th

    Learn more

    Proof system is complete

    2024 Jun 9th

    The Linea proof system and verifier on ethereum covers 100% of the zkEVM.

    Learn more
    Sequencer failureState validationData availabilityExit windowProposer failure
    Sequencer failure
    No mechanism

    There is no mechanism to have transactions be included if the sequencer is down or censoring. Eventually (after 6 months of no finalized blocks) the Operator role becomes public, theoretically allowing anyone to post data.

    State validation
    Validity proofs (SN)

    SNARKs are succinct zero knowledge proofs that ensure state correctness, but require trusted setup.

    Data availability
    Onchain

    All of the data needed for proof construction is published on Ethereum L1. Unlike most ZK rollups, transaction data is posted instead of state diffs.

    Exit window
    None

    There is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.

    Proposer failure
    Cannot withdraw

    Only the whitelisted proposers can publish state roots on L1, so in the event of failure the withdrawals are frozen. Eventually (after 6 months of no finalized blocks) the Operator role becomes public, theoretically allowing anyone to propose state with valid proofs.

    Linea
    Linea is a
    Stage 0
    ZK Rollup.

    Learn more about Rollup stages
    Please keep in mind that these stages do not reflect rollup security, this is an opinionated assessment of rollup maturity based on subjective criteria, created with a goal of incentivizing projects to push toward better decentralization. Each team may have taken different paths to achieve this goal.

    All data required for proofs is published on chain

    All the data that is used to construct the system state is published on chain in the form of cheap blobs or calldata. This ensures that it will be available for enough time.

    1. LineaRollup.sol - Etherscan source code, submitBlobs() function
    Learn more about the DA layer here: Ethereum logoEthereum
    Node software

    The node software (Linea Besu) and a guide to reconstruct the state from L1 is available here. Other node implementations like Nethermind, Geth or Erigon can sync too, but state derivation from L1 and Linea-specific features are unsupported.

    Compression scheme

    Linea uses a bespoke lossless compression scheme based on LZSS (deflate-like). It is available as a dedicated library and a zk-decompression circuit in Gnark.

    Genesis state

    Is available via the official Linea docs for Linea Besu (preloaded), Besu, Erigon, Nethermind, Geth.

    Data format

    Linea groups L2 blocks into batches which are then posted to L1 for proving. Each batch (whether sent as a blob or compressed calldata) contains L2 blocks. Blocks in turn include the transactions with unnecessary data stripped. More info on the compression, packing and blob structure.

    Each update to the system state must be accompanied by a ZK proof that ensures that the new state was derived by correctly applying a series of valid user transactions to the previous state. These proofs are then verified on Ethereum by a smart contract.


    Prover Architecture

    The Linea prover code is available on Github. Linea splits proving into: Corset (Go + Lisp DSL) expands EVM execution traces and generates a bespoke constraint system for the zk-EVM. gnark (Go) ingests the expanded traces and constraint system, instantiates the circuits and produces the SNARK proof.

    ZK Circuits

    The constraint system lives in the public linea-constraints repo and is authored in a Lisp-style DSL before being compiled to Go. Gnark then turns those constraints into PLONK-compatible circuits over BN254. Internally, Linea’s flow uses a recursive proof stack called Vortex → Arcane → PLONK compression: Vortex/Arcane supply small inner proofs that are finally aggregated into a single PLONK proof that the L1 contract can verify.

    Verification Keys Generation

    Linea uses a Plonk-based proof system which requires a trusted setup. The verification keys are hardcoded in the verifier contract on-chain.

    Validity proofs

    Each update to the system state must be accompanied by a ZK proof that ensures that the new state was derived by correctly applying a series of valid user transactions to the previous state. These proofs are then verified on Ethereum by a smart contract.

    1. LineaRollup.sol - Etherscan source code, finalizeBlocks() and _verifyProof() calls
    2. PlonkVerifierMainnetFull.sol (Proof Type 3)
    3. PlonkVerifierMainnetFull.sol (Proof Type 4)
    PROVER

    Trusted Setups

    Used in

    Linea logo

    Verifiers

    2by

    Used in

    Linea logo

    Verifiers

    2by

    The system has a centralized sequencer

    Only a trusted sequencer is allowed to submit transaction batches. A mechanism for users to submit their own batches is currently disabled.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    • Funds can be frozen if the sequencer refuses to include an exit transaction (CRITICAL).

    1. LineaRollup.sol - Etherscan source code, onlyRole(OPERATOR_ROLE) modifier

    Users can't force any transaction

    There is no general mechanism to force the sequencer to include the transaction.

    • Users can be censored if the operator refuses to include their transactions.

    Regular messaging

    The user initiates L2->L1 messages by submitting a regular transaction on this chain. When the block containing that transaction is settled, the message becomes available for processing on L1. ZK proofs are required to settle blocks. Note that withdrawal requests can be censored by the Sequencer. Currently, there is a general limit of 30000.0 ETH that can be withdrawn within each 1d time window. Users can (eventually, after 6 months of inactivity from the centralized Operator) exit by replacing the Operator. In such a case they need to self-propose and prove their new state on the base layer with the required software which is currently not made available.

    • Funds can be frozen if the operator censors withdrawal transaction.

    1. L1MessageService.sol - Etherscan source code, claimMessageWithProof() function
    2. LineaRollup.sol - Etherscan source code, setFallbackOperator() function
    A dashboard to explore contracts and permissions
    Go to Disco
    Disco UI Banner

    Ethereum

    Roles:

    Operator (2)EOA 1EOA 2

    Allowed to prove blocks and post the corresponding transaction data.

    Actors:

    CallForwardingProxy0x3697…367D

    A public proxy contract forwarding calls to a predefined target contract (LineaRollup). Can be called by any address.

    • Can interact with LineaRollup
      • submit and finalize blocks as the Operator role when 6 months of no finalizations have passed
    Linea Multisig 10x892b…1DD3

    A Multisig with 5/9 threshold.

    • Can upgrade with no delay
      • TokenBridge
      • L1USDCBridge
      • LineaRollup
      • YieldManager
    • Can interact with TokenBridge
      • can pause the bridge
      • can pause token bridging actions initiated from the other layer
      • can pause token bridging actions initiated from this layer
      • can prevent tokens that have not been bridged already from being bridged by assigning them a reserved status with 3mo delay or with no delay
      • can remove the reserved status from a token, meaning that it is allowed to be bridged again with 3mo delay or with no delay
      • can set custom ERC20 contracts for specific ERC20s with 3mo delay or with no delay
      • can set the contract that is recognized to be the token bridge contract on the other side
      • can set the contract used as the source of truth from crosschain messages
      • can unpause token bridging actions initiated from the other layer
      • can unpause token bridging actions initiated from this layer
      • manage all critical access control roles and permissions (full admin of the main bridge escrow)
    • Can interact with Delay
      • enable/disable the module, set delays and expiration of transactions, set the target with 3mo delay
    • Can interact with UpgradeableBeacon
      • change the beacon implementation
    • Can interact with LineaRollup
      • manage all critical access control roles and permissions (full admin of the rollup system)
      • send ETH from the rollup bridge to the YieldManager
      • set the address of the yield manager contract that receives ETH from rollup bridge
    • Can interact with Timelock
      • cancel queued transactions
      • execute transactions that are ready
      • manage all access control roles and change the minimum delay
      • propose transactions with 3mo delay or with no delay
    • Can interact with YieldManager
      • manage native yield staking: modify reserve parameters, set yield pools, set yield receiver addresses
      • operate native yield staking: stake and unstake, collect yield, pause and unpause, ossify yield managers
    Linea Multisig 20xB8F5…0051

    A Multisig with 3/5 threshold. It uses the following modules: Delay (A simple Safe module for that can queue and execute transactions as Linea Multisig 2 after a delay of currently 3mo, if registered as a module there).

    • Can interact with TokenBridge
      • can prevent tokens that have not been bridged already from being bridged by assigning them a reserved status
      • can remove the reserved status from a token, meaning that it is allowed to be bridged again
      • can set custom ERC20 contracts for specific ERC20s
    • Can interact with Delay
      • enable/disable the module, set delays and expiration of transactions, set the target
    • Can interact with Timelock
      • propose transactions
    EOA 1 and EOA 2 (2)0x46d2…9E3e0x52FF…6754
    • Can interact with LineaRollup
    • Can interact with YieldManager
      • operate native yield staking: stake and unstake, collect yield, pause and unpause, ossify yield managers

    Linea

    Actors:

    Linea Multisig 40xB8F5…0051

    A Multisig with 3/5 threshold.

    • Can interact with TokenBridge
      • can prevent tokens that have not been bridged already from being bridged by assigning them a reserved status
      • can remove the reserved status from a token, meaning that it is allowed to be bridged again
      • can set custom ERC20 contracts for specific ERC20s
    • Can interact with L2Timelock
      • propose transactions
    Linea Multisig 30xf5cc…A0bD

    A Multisig with 5/9 threshold. It uses the following modules: L2Roles (The Zodiac ‘Roles’ module for Safe multisigs allows defining roles that can call preconfigured targets on behalf of the Gnosis Safe).

    • Can upgrade with no delay
      • TokenBridge
      • L2MessageService
      • L2USDCBridge
    • Can interact with TokenBridge
      • can pause the bridge
      • can pause token bridging actions initiated from the other layer
      • can pause token bridging actions initiated from this layer
      • can prevent tokens that have not been bridged already from being bridged by assigning them a reserved status
      • can remove the reserved status from a token, meaning that it is allowed to be bridged again
      • can set custom ERC20 contracts for specific ERC20s
      • can set the contract that is recognized to be the token bridge contract on the other side
      • can set the contract used as the source of truth from crosschain messages
      • can unpause token bridging actions initiated from the other layer
      • can unpause token bridging actions initiated from this layer
      • manage all critical access control roles and permissions (full admin of the main bridge escrow)
    • Can interact with L2Timelock
      • cancel queued transactions
      • execute transactions that are ready
      • manage all access control roles and change the minimum delay
      • propose transactions
    • Can interact with UpgradeableBeacon
      • change the beacon implementation
    • Can interact with L2MessageService
      • Can anchor L1 data on the L2. A check is supposed to be added to the proof system on L1 so that it is not possible to settle if the anchor is not correct. The function is permissioned because otherwise anyone can cause a liveness failure by posting an invalid anchor
    • Can interact with L2Roles
      • can pause the L2MessageService, the TokenBridge and the L2USDCBridge
    • Can interact with L2Roles
      • can mint XP soulbound tokens as part of the Voyage campaign
    A dashboard to explore contracts and permissions
    Go to Disco
    Disco UI Banner
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    Ethereum

    Contract used to bridge and escrow ERC-20 tokens.

    • Roles:
      • admin: ProxyAdmin; ultimately Linea Multisig 1
      • allPausers: Linea Multisig 1
      • allUnpausers: Linea Multisig 1
      • completeTokenBridgingPausers: Linea Multisig 1
      • completeTokenBridgingUnpausers: Linea Multisig 1
      • customContractSetters: Linea Multisig 1, Linea Multisig 2; ultimately Linea Multisig 1
      • defaultAdmin: Linea Multisig 1
      • initiateTokenBridgingPausers: Linea Multisig 1
      • initiateTokenBridgingUnpausers: Linea Multisig 1
      • messageServiceSetters: Linea Multisig 1
      • remoteTokenBridgeSetters: Linea Multisig 1
      • reserveTokenRemovers: Linea Multisig 1, Linea Multisig 2; ultimately Linea Multisig 1
      • reserveTokenSetters: Linea Multisig 1, Linea Multisig 2; ultimately Linea Multisig 1

    All supported tokens in this escrow are included in the value secured calculation.

    BridgedToken0x36f2…3763

    Standard implementation used for assets that are native to the other layer and are bridged to this layer.

    ProxyAdmin0x41fA…6eb5
    • Roles:
      • owner: Linea Multisig 1

    L1 side of the old and now unused USDC bridge.

    • Roles:
      • admin: ProxyAdmin; ultimately Linea Multisig 1

    A simple Safe module for that can queue and execute transactions as Linea Multisig 2 after a delay of currently 3mo, if registered as a module there.

    • Roles:
      • owner: Linea Multisig 2; ultimately Linea Multisig 1
      • zodiacModule_modules: Linea Multisig 1
    PlonkVerifierMainnetFull0x814D…177a

    Smart contract used to verify the proofs of Linea zkEVM execution.

    PlonkVerifierMainnetFull0x8f8E…Bb9b

    Smart contract used to verify the proofs of Linea zkEVM execution.

    UpgradeableBeacon0x971f…7DeB

    A beacon with an upgradeable implementation currently set as BridgedToken. Beacon proxy contracts pointing to this beacon will all use its implementation.

    • Roles:
      • owner: Linea Multisig 1

    The main contract of the Linea zkEVM rollup. Contains state roots, the verifier addresses and manages messages between L1 and the L2. ETH deployed to the rollup contract can be transfered to a yield protocol.

    • Roles:
      • admin: ProxyAdmin; ultimately Linea Multisig 1
      • defaultAdmin: Linea Multisig 1
      • ethStaker: EOA 3, Linea Multisig 1
      • fallbackOperator: CallForwardingProxy
      • operators: EOA 1, EOA 2
      • yieldManagerSetter: Linea Multisig 1
    The following tokens are included in the value secured calculation:
    ETH token logo

    A standard timelock with access control. The current minimum delay is 0s.

    • Roles:
      • canceller: Linea Multisig 1
      • executor: Linea Multisig 1
      • proposer: Linea Multisig 1, Linea Multisig 2; ultimately Linea Multisig 1
      • timelockAdmin: Timelock; ultimately Linea Multisig 1

    Manages flows of ETH and staked ETH in and out of rollup contract reserves. Tracks the available ETH balance for L2 exits, configures target parameters for amount of staked ETH, communicates with yield provider adaptors.

    • Roles:
      • admin: ProxyAdmin; ultimately Linea Multisig 1
      • yieldStakingManager: Linea Multisig 1
      • yieldStakingOperator: EOA 3, Linea Multisig 1
    ProxyAdmin0xF505…66d6
    • Roles:
      • owner: Timelock

    Linea

    ProxyAdmin0x1E1f…774E
    • Roles:
      • owner: L2Timelock

    Contract used to bridge and escrow ERC-20 tokens.

    • Roles:
      • admin: ProxyAdmin; ultimately Linea Multisig 3
      • allPausers: Linea Multisig 3
      • allUnpausers: Linea Multisig 3
      • completeTokenBridgingPausers: Linea Multisig 3
      • completeTokenBridgingUnpausers: Linea Multisig 3
      • customContractSetters: Linea Multisig 3, Linea Multisig 4
      • defaultAdmin: Linea Multisig 3
      • initiateTokenBridgingPausers: Linea Multisig 3
      • initiateTokenBridgingUnpausers: Linea Multisig 3
      • messageServiceSetters: Linea Multisig 3
      • remoteTokenBridgeSetters: Linea Multisig 3
      • reserveTokenRemovers: Linea Multisig 3, Linea Multisig 4
      • reserveTokenSetters: Linea Multisig 3, Linea Multisig 4

    The Zodiac ‘Roles’ module for Safe multisigs allows defining roles that can call preconfigured targets on behalf of the Gnosis Safe.

    • Roles:
      • pausers: EOA 5
      • voyageXpMinters: EOA 6
    • Roles:
      • admin: ProxyAdmin; ultimately Linea Multisig 3
      • l1l2MessageSetter: EOA 4

    L2 side of the old and now unused USDC bridge.

    • Roles:
      • admin: ProxyAdmin; ultimately Linea Multisig 3
    L2Timelock0xc808…56ca

    A standard timelock with access control. The current minimum delay is 0s.

    • Roles:
      • canceller: Linea Multisig 3
      • executor: Linea Multisig 3
      • proposer: Linea Multisig 3, Linea Multisig 4
      • timelockAdmin: L2Timelock; ultimately Linea Multisig 3
    ProxyAdmin0xcB04…A30c
    • Roles:
      • owner: Linea Multisig 3
    LineaVoyageXP0xd83a…599A

    Voyage XP tokens are non-transferrable, soulbound tokens that are distributed to recognize the community’s contribution toward the growth of the Linea ecosystem.

    BridgedToken0xda8A…49dF

    Standard implementation used for assets that are native to the other layer and are bridged to this layer.

    UpgradeableBeacon0xE798…02c0

    A beacon with an upgradeable implementation currently set as BridgedToken. Beacon proxy contracts pointing to this beacon will all use its implementation.

    • Roles:
      • owner: Linea Multisig 3

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is a 0s delay on code upgrades.