Search

Search for projects by name

Mantle logoMantle

Badges

About

Mantle is an under development EVM compatible Optimium, based on the OP Stack.


Value secured
$1.62 B5.15%
Canonically Bridged
$1.10 B
Externally Bridged
$484.47 M
Natively Minted
$41.40 M

  • Tokens
  • Past day UOPS
    3.064.77%
  • 30D ops count
    10.19 M

  • Type
    Optimium
  • Purpose
    Universal
  • Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Mantle is an under development EVM compatible Optimium, based on the OP Stack.

    Recategorisation

    117d
    03h
    27m
    57s

    The project will be classified as "Other" due to its specific risks that set it apart from the standard classifications.

    The project will move to Others because:

    The proof system isn't fully functional

    Consequence: projects without a proper proof system fully rely on single entities to safely update the state. A malicious proposer can finalize an invalid state, which can cause loss of funds.

    There are less than 5 external actors that can attest data availability

    Consequence: projects without a sufficiently decentralized data availability committee rely on few entities to safely attest data availability on Ethereum. A small set of entities can collude with the proposer to finalize an unavailable state, which can cause loss of funds.

    Learn more about the recategorisation
    Value Secured

    2024 Feb 22 — 2025 Feb 21

    Activity

    2024 Feb 22 — 2025 Feb 20

    Milestones & Incidents

    Mainnet v2 Tectonic Upgrade

    2024 Mar 15th

    Mantle completes Mainnet v2 Tectonic Upgrade.

    Learn more

    Mainnet launch

    2023 Jul 14th

    Mantle is live on mainnet.

    Learn more
    Risk summary
    Risk analysis
    Sequencer failureState validationData availabilityExit windowProposer failure

    Sequencer failure

    Self sequence

    In the event of a sequencer failure, users can force transactions to be included in the project’s chain by sending them to L1. There can be up to a 12h delay on this operation.

    State validation

    None

    Currently the system permits invalid state roots. More details in project overview.

    Data availability

    External

    Proof construction and state derivation rely fully on data that is NOT published on chain. Mantle DA contracts are forked from EigenDA with significant modifications, most importantly removal of slashing conditions. DA fraud proof mechanism is not live yet.

    Exit window

    None

    There is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.

    Proposer failure

    Cannot withdraw

    Only the whitelisted proposers can publish state roots on L1, so in the event of failure the withdrawals are frozen.

    Technology

    Fraud proofs are not enabled

    OP Stack projects can use the OP fault proof system, already being deployed on some. This project though is not using fault proofs yet and is relying on the honesty of the permissioned Proposer and Challengers to ensure state correctness. The smart contract system permits invalid state roots.

    • Funds can be stolen if an invalid state root is submitted to the system (CRITICAL).

    1. L2OutputOracle.sol - source code, deleteL2Outputs function

    Data is not stored on chain

    The transaction data is not recorded on the Ethereum main chain. The sequencer posts the transactions data batch root, and then propagates the data to off-chain permissioned nodes to sign. It subsequently posts the nodes signatures on chain to verify they belong to the specified members of the quorum, and that the minimum stake threshold is met.

    • Funds can be lost if the external data becomes unavailable (CRITICAL).

    1. DataLayrServiceManager.sol#L389 - Etherscan source code, confirmDataStore function
    2. DataLayrServiceManager.sol#L404 - Etherscan source code, signature verification check
    3. Derivation: Batch submission - OP Mainnet specs
    4. BatchInbox - address
    5. OptimismPortal.sol - source code, depositTransaction function
    Data availability

    Mantle DA is a data availability solution built on EigenDA contracts, which have been forked and significantly modified.

    Risk analysis
    DA Layer Risks
    Economic security
    No slashing

    Although node operators are required to stake MNT tokens to become members of the DA network, there is no slashing mechanism in place for misbehaving nodes.

    Fraud detection
    None

    There is no fraud detection mechanism in place. A data withholding attack can only be detected by nodes downloading the full data from the DA layer.

    DA Bridge Risks
    Committee security
    9/10

    The committee requires an honest minority (less than 1/3) of members (or the network stake) to prevent the DA bridge from accepting an unavailable data commitment. However, the committee is not diverse enough to prevent a single entity from controlling the majority of the committee.

    Upgradeability
    No delay

    There is no delay in the upgradeability of the bridge. Users have no time to exit the system before the bridge implementation update is completed.

    Relayer failure
    No mechanism

    The relayer role is permissioned, and the DA bridge does not have a Security Council or a governance mechanism to propose new relayers. In case of relayer failure, the DA bridge will halt and be unable to recover without the intervention of a centralized entity.

    Technology

    Architecture

    MantleDA architecture Mantle DA is an independent DA module that is built on top of an early version of EigenDA smart contracts. The system is made up of two main component: onchain smart contracts for storing and verifying data commitments, and an offchain network of permissioned nodes storing the data. The permissioned set of nodes is tasked with providing data availability to the Mantle network. They receive Mantle network transaction data, sign it using a BLS signature scheme, and send back signatures to the sequencer to post commitments to the DataLayrServiceManager (DA Bridge) contract on Ethereum. The DA DataLayrServiceManager acts as a verifier smart contract, verifying that the signatures provided by the sequencer are indeed from node operators who have agreed to be in the quorum. To become members of the DA network, node operators are required to stake 100,000 MNT tokens, and can only be registered by an authorized entity. There is no slashing mechanism in place for misbehaving nodes.

    DA Bridge

    MantleDA bridge

    The DA bridge contract is used for storing transaction data headers and confirming the data store by verifying operators signatures. The Mantle sequencer posts the data hash as a commitment to the DataLayrServiceManager contract on Ethereum through an InitDataStore() transaction. Once the commitment is posted, the sequencer sends the data to the permissioned set of nodes, who sign the data and send back the signatures to the sequencer. The sequencer then posts the signatures to the DataLayrServiceManager contract on Ethereum through a confirmDataStore() transaction. The confirmDataStore() function verify the signatures and if the quorum is reached, the data is considered available.

    Operator

    The system has a centralized operator

    The operator is the only entity that can propose blocks. A live and trustworthy operator is vital to the health of the system.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    1. L2OutputOracle.sol - source code, CHALLENGER address
    2. L2OutputOracle.sol - source code, PROPOSER address

    Users can force any transaction

    Because the state of the system is based on transactions submitted on the underlying host chain and anyone can submit their transactions there it allows the users to circumvent censorship by interacting with the smart contract on the host chain directly.

    1. Sequencing Window - OP Mainnet Specs
    2. OptimismPortal.sol - source code, depositTransaction function
    Withdrawals

    Regular messaging

    The user initiates L2->L1 messages by submitting a regular transaction on this chain. When the block containing that transaction is settled, the message becomes available for processing on L1. The process of block finalization takes a challenge period of 7d to complete.

    • Funds can be frozen if the centralized validator goes down. Users cannot produce blocks themselves and exiting the system requires new block production (CRITICAL).

    1. OptimismPortal.sol - source code, proveWithdrawalTransaction function
    2. OptimismPortal.sol - source code, finalizeWithdrawalTransaction function
    3. L2OutputOracle.sol - source code, PROPOSER check

    Forced messaging

    If the user experiences censorship from the operator with regular L2->L1 messaging they can submit their messages directly on L1. The system is then obliged to service this request or halt all messages, including forced withdrawals from L1 and regular messages initiated on L2. Once the force operation is submitted and if the request is serviced, the operation follows the flow of a regular message.

    1. Forced withdrawal from an OP Stack blockchain
    Other considerations

    EVM compatible smart contracts are supported

    OP stack chains are pursuing the EVM Equivalence model. No changes to smart contracts are required regardless of the language they are written in, i.e. anything deployed on L1 can be deployed on L2.

    1. Introducing EVM Equivalence
    Permissions

    Ethereum

    Roles:

    Allowed to challenge or delete state roots proposed by a Proposer.

    Allowed to pause deposits and withdrawals.

    Proposer 0x6667…d77D

    Allowed to post new state roots of the current layer to the host chain.

    Sequencer 0x2f40…d749

    Allowed to commit transactions from the current layer to the host chain.

    Actors:

    PauserRegistry 0x075a…A86f
    • Is allowed to interact with InvestmentManager - defines addresses that can pause or unpause ability to invest into strategies.
    • Is allowed to interact with MantleSecondStrat, MantleFirstStrat - defines addresses that can pause or unpause ability to deposit tokens into strategies.
    MantleEngineeringMultisig 0x2F44…daC9
    • A Multisig with 3 / 7 threshold.
    • A Challenger.
    • A Guardian.
    MantleSecurityMultisig 0x4e59…D40f
    • A Multisig with 6 / 13 threshold.
    • Can act on behalf of ProxyAdmin, ProxyAdmin, ProxyAdmin.
    • Can act on behalf of TimelockController with 1d delay.
    • Is allowed to interact with SystemConfig - it can update the preconfer address, the batch submitter (Sequencer) address and the gas configuration of the system.
    • Is allowed to interact with TimelockController - cancel queued transactions.
    • Is allowed to interact with TimelockController - execute transactions that are ready.
    • Is allowed to interact with TimelockController - manage all access control roles - acting via TimelockController with 1d delay.
    • Is allowed to interact with TimelockController - manage all access control roles.
    • Is allowed to interact with TimelockController - propose transactions.
    • Is allowed to interact with Lib_AddressManager - set and change address mappings - acting via ProxyAdmin.
    • Can upgrade the implementation of BLSRegistry, InvestmentManager, L2OutputOracle, SystemConfig, DataLayrServiceManager, PubkeyCompendium, MantleSecondStrat, RegistryPermission, OptimismPortal, DataLayrChallenge, MantleFirstStrat, DataLayrChallengeUtils, Delegation - acting via ProxyAdmin.
    • Can upgrade the implementation of L1MantleToken - acting via MantleTokenProxyAdmin, TimelockController with 1d delay.
    • Can upgrade the implementation of EigenDataLayerChain.
    • Can upgrade the implementation of L1StandardBridge - upgrading the bridge implementation can give access to all funds escrowed therein - acting via ProxyAdmin.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    • Member of MantleEngineeringMultisig.
    • Is allowed to interact with RegistryPermission - can register or change status of DA node operators.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Is allowed to interact with BLSRegistry - sign data commitments for the DA bridge.

    Smart contracts
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    Ethereum

    MantleTokenProxyAdmin 0x0cac…9ADd

    Can be used to upgrade implementation of L1MantleToken.

    This contract stores the number of Mantle DA operators and their public keys. It also store the quorum threshold and the minimum stake required to be part of the quorum.

    Contract managing different investment strategies, forked from EigenLayer StrategyManager.

    ProxyAdmin 0x2Cd3…9e83

    Can be used to upgrade implementation of InvestmentManager, MantleSecondStrat, RegistryPermission, MantleFirstStrat, Delegation.

    Contains a list of proposed state roots which Proposers assert to be a result of block execution. Currently only the PROPOSER address can submit new state roots.

    MNT token contract: Mantle uses Mantle (MNT) as the designated gas token, allowing users pay for gas in MNT.

    Contains configuration parameters such as the Sequencer address, gas limit on this chain and the unsafe block signer address.

    ProxyAdmin 0x47D5…1EBb

    Can be used to upgrade implementation of BLSRegistry, DataLayrServiceManager, PubkeyCompendium, DataLayrChallenge, DataLayrChallengeUtils.

    PauserRegistry2 0x4ca7…92D0

    This contract is the main entry point for data availability. It is responsible for storing transaction data headers and confirming the data store by verifying operators signatures.

    TimelockController 0x6533…447F
    • A timelock with access control. The current minimum delay is 1d.
    • Can act on behalf of MantleTokenProxyAdmin.
    • Can be used to interact with TimelockController - manage all access control roles.

    Sends messages from host chain to this chain, and relays messages back onto host chain. In the event that a message sent from host chain to this chain is rejected for exceeding this chain’s epoch gas limit, it can be resubmitted via this contract’s replay function.

    Lib_AddressManager 0x6968…5a42

    Legacy contract used to manage a mapping of string names to addresses. Modern OP stack uses a different standard proxy system instead, but this contract is still necessary for backwards compatibility with several older contracts.

    The main entry point to deposit ERC20 tokens from host chain to this chain. This contract can store any token.

    Basic do-nothing investment strategy.

    The main entry point to deposit funds from host chain to this chain. It also allows to prove and finalize withdrawals. This contract stores the following tokens: ETH, MNT.

    ProxyAdmin 0xca35…7794
    • Can be used to interact with Lib_AddressManager - set and change address mappings.
    • Can be used to upgrade implementation of L2OutputOracle, SystemConfig, OptimismPortal.
    • Can be used to upgrade implementation of L1StandardBridge - upgrading the bridge implementation can give access to all funds escrowed therein.

    Basic do-nothing investment strategy.

    Value Secured is calculated based on these smart contracts and tokens:

    Main entry point for users depositing ERC20 token that do not require custom gateway.

    Can be upgraded by:

    Main entry point for users depositing ETH, MNT.

    Can be upgraded by:

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).

    Knowledge nuggets