Search

Search for projects by name or address

Molten Network logo
Molten Network

Critical contracts can be upgraded by an EOA which could result in the loss of all funds.

Badges

About

Molten is an Orbit stack L3 on Arbitrum with Celestia DA, created by the UniDex team.


  • Total Value SecuredTVS
    $8.79 K0.01%
  • Past day UOPSDaily UOPS
    0.000.00%
  • Gas token
    MOLTEN
  • Type
    Other

  • Purpose
    Universal
  • Host chain
    Arbitrum One
  • Chain ID
    360

  • Tokens breakdown

    Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Molten is an Orbit stack L3 on Arbitrum with Celestia DA, created by the UniDex team.

    Why is the project listed in others?

    There are less than 5 external actors that can submit challenges

    Consequence: projects without a sufficiently decentralized set of challengers rely on few entities to safely update the state. A small set of challengers can collude with the proposer to finalize an invalid state, which can cause loss of funds.

    Learn more about the recategorisation here.


    Total
    Canonically BridgedCanonically Bridged ValueCanonical
    Natively MintedNatively Minted TokensNative
    Externally BridgedExternally Bridged ValueExternal

    ETH & derivatives
    Stablecoins
    BTC & derivatives
    Other

    2025 Apr 15 — 2026 Apr 15

    Past Day UOPS
    0.000.00%
    Past Day Ops count
    0
    Max. UOPS
    65.80
    2025 Jul 09
    Past day UOPS/TPS Ratio
    1.00

    This section shows how much data the project publishes to its data-availability (DA) layer over time. The project currently posts data toCelestiaCelestia.


    2025 May 07 — 2026 Apr 15


    Data posted
    30.07 GiB
    Avg size per day
    90.04 MiB
    Avg size per L2 UOP
    71.92 B

    Molten integrates Espresso sequencer

    2025 Jan 30th

    Molten adds the Espresso TEE sequencer to their Celestia DA with Blobstream.

    Learn more

    Molten starts using Blobstream

    2024 Nov 13th

    Upgraded ChallengeManager contract to the version that uses Celestia with Blobstream bridge

    Learn more
    There are 3 additional risks coming from the host chain Arbitrum One logoArbitrum One
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    The L3 risks depend on the individual properties of L3 and those of the host chain combined.
    Critical contracts can be upgraded by an EOA which could result in the loss of all funds.
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    SEQUENCER
    FAILURE
    STATE
    VALIDATION
    DATA
    AVAILABILITY
    EXIT WINDOWPROPOSER
    FAILURE
    Arbitrum One
    L2
    Self sequenceFraud proofs (INT)Onchain10dSelf propose
    Molten Network
    L3 • Individual
    Self sequenceFraud proofs (INT)OnchainNoneSelf propose
    Molten Network
    L3 • Combined
    Self sequenceFraud proofs (INT)OnchainNoneSelf propose
    L2 & L3 individual risks
    Sequencer failureState validationData availabilityExit windowProposer failure
    L3 combined risks
    Sequencer failureState validationData availabilityExit windowProposer failure

    L3 combined risks
    The information below reflects combined L2 & L3 risks.
    Sequencer failure
    Self sequence

    In the event of a sequencer failure, users can force transactions to be included in the project’s chain by sending them to L1. There can be up to a 2d delay on this operation.

    State validation
    Fraud proofs (INT)

    No actor outside of the single Proposer can submit fraud proofs. Interactive proofs (INT) require multiple transactions over time to resolve. The challenge protocol can be subject to delay attacks. There is a 6d 8h challenge period.

    Data availability
    Onchain

    All of the data needed for proof construction is published on Ethereum L1.

    Exit window
    None

    There is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.

    Proposer failure
    Self propose

    Anyone can become a Proposer after 12d 17h of inactivity from the currently whitelisted Proposers.

    Molten Network
    Molten Network is not even a
    Stage 0
    project.

    Learn more about Rollup stages
    Please keep in mind that these stages do not reflect rollup security, this is an opinionated assessment of rollup maturity based on subjective criteria, created with a goal of incentivizing projects to push toward better decentralization. Each team may have taken different paths to achieve this goal.

    All transaction data is recorded on chain

    All executed transactions are submitted to an on chain smart contract. The execution of the rollup is based entirely on the submitted transactions, so anyone monitoring the contract can know the correct state of the rollup chain.

    1. Sequencing followed by deterministic execution - Arbitrum documentation
    2. SequencerInbox.sol - source code, addSequencerL2BatchFromOrigin function
    Learn more about the DA layer here: Ethereum logoEthereum
    A diagram of the state validation
    A diagram of the state validation

    Updates to the system state can be proposed and challenged by a set of whitelisted validators. If a state root passes the challenge period, it is optimistically considered correct and made actionable for withdrawals.


    State root proposals

    Whitelisted validators propose state roots as children of a previous state root. A state root can have multiple conflicting children. This structure forms a graph, and therefore, in the contracts, state roots are referred to as nodes. Each proposal requires a stake, currently set to 0.1 ETH, that can be slashed if the proposal is proven incorrect via a fraud proof. Stakes can be moved from one node to one of its children, either by calling stakeOnExistingNode or stakeOnNewNode. New nodes cannot be created faster than the minimum assertion period by the same validator, currently set to 15m. The oldest unconfirmed node can be confirmed if the challenge period has passed and there are no siblings, and rejected if the parent is not a confirmed node or if the challenge period has passed and no one is staked on it.

    • Funds can be stolen if none of the whitelisted verifiers checks the published state. Fraud proofs assume at least one honest and able validator (CRITICAL).

    1. How is fraud proven - Arbitrum documentation FAQ
    Challenges

    A challenge can be started between two siblings, i.e. two different state roots that share the same parent, by calling the startChallenge function. Validators cannot be in more than one challenge at the same time, meaning that the protocol operates with partial concurrency. Since each challenge lasts 6d 8h, this implies that the protocol can be subject to delay attacks, where a malicious actor can delay withdrawals as long as they are willing to pay the cost of losing their stakes. If the protocol is delayed attacked, the new stake requirement increases exponentially for each challenge period of delay. Challenges are played via a bisection game, where asserter and challenger play together to find the first instruction of disagreement. Such instruction is then executed onchain in the WASM OneStepProver contract to determine the winner, who then gets half of the stake of the loser. As said before, a state root is rejected only when no one left is staked on it. The protocol does not enforces valid bisections, meaning that actors can propose correct initial claim and then provide incorrect midpoints.

    1. Fraud Proof Wars: Arbitrum Classic

    Program Hashes

    Name
    Hash
    Repository
    Verification
    Used in
    0x00de...0bef
    Code unknown
    None
    Molten Network logoBlobstream logo
    0x00e8...3322
    Code unknown
    None
    Molten Network logo
    0x002b...4922
    Code unknown
    None
    Molten Network logo

    Past upgrades

    The metrics include upgrades on the currently used proxy contracts. Historical proxy contracts and changes of such are not included.

    Count of upgrades
    20
    Last upgrade
    9mo 18d ago
    Avg upgrade interval
    6mo 11d
    The section considers only the L3 properties. For more details please refer to Arbitrum One logoArbitrum One

    The system has a centralized sequencer

    While forcing transaction is open to anyone the system employs a privileged sequencer that has priority for submitting transaction batches and ordering transactions.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    1. Sequencer - Arbitrum documentation

    Users can force any transaction

    Because the state of the system is based on transactions submitted on the underlying host chain and anyone can submit their transactions there it allows the users to circumvent censorship by interacting with the smart contract on the host chain directly. After a delay of 1d in which a Sequencer has failed to include a transaction that was directly posted to the smart contract, it can be forcefully included by anyone on the host chain, which finalizes its ordering.

    1. SequencerInbox.sol - source code, forceInclusion function
    2. Sequencer Isn't Doing Its Job - Arbitrum documentation

    Espresso TEE sequencer

    Integration with Espresso sequencing. In addition to providing regular pre-confirmations, the sequencer publishes blocks to the Espresso Network. The integration expects the transaction batch poster to run inside a Trusted Execution Environment (TEE), and it is programmed to verify batch inclusion in a Espresso Network block before publishing it to the host chain. However, the confirmations provided by Espresso Network are additive, and the batch poster can skip Espresso inclusion checks should the Espresso Network be down or unavailable. To ensure the batch poster is running inside a TEE, the SequencerInbox contract on the host chain was updated so that the data posting function also includes a TEE attestation as input (a “quote” / signature) that is verified onchain by the EspressoTEEVerifier for each batch transaction. The verifier checks whether the signature originates from inside the TEE and reverts if unsuccessful.

    • Withdrawals can be delayed if the owner of EspressoTEEVerifier updates the contract verification values (enclave hash, signer) and it is no longer possible to verify the TEE quote.

    1. Nitro Espresso Integration
    2. SGX Quote
    The section considers only the L3 properties. For more details please refer to Arbitrum One logoArbitrum One

    Regular messaging

    The user initiates L2->L1 messages by submitting a regular transaction on this chain. When the block containing that transaction is settled, the message becomes available for processing on L1. The process of block finalization usually takes several days to complete.

    1. Transaction lifecycle - Arbitrum documentation
    2. L2 to L1 Messages - Arbitrum documentation
    3. Mainnet for everyone - Arbitrum Blog

    Autonomous exit

    Users can (eventually) exit the system by pushing the transaction on L1 and providing the corresponding state root. The only way to prevent such withdrawal is via an upgrade.

    EVM compatible smart contracts are supported

    Arbitrum One uses Nitro technology that allows running fraud proofs by executing EVM code on top of WASM.

    1. Inside Arbitrum Nitro
    A dashboard to explore contracts and permissions
    Go to Disco
    Disco UI Banner

    Arbitrum One

    Roles:

    SequencerEOA 2

    Can submit transaction batches or commitments to the SequencerInbox contract on the host chain.

    ValidatorEOA 3

    Can propose new state roots (called nodes) and challenge state roots on the host chain.

    Actors:

    Caldera Multisig 10x6FD1…68BF

    A Multisig with 3/8 threshold.

    • Can upgrade with no delay
      • RollupProxy
      • SequencerInbox
      • Inbox
      • ERC20Gateway
      • ChallengeManager
      • UpgradeExecutor
      • RollupEventInbox
      • GatewayRouter
      • Outbox
      • Bridge
    • Can interact with RollupProxy
      • Pause and unpause and set important roles and parameters in the system contracts: Can delegate Sequencer management to a BatchPosterManager address, manage data availability, DACs and the fastConfirmer role, set the Sequencer-only window, introduce an allowList to the bridge and whitelist Inboxes/Outboxes
    Used in:

    A Multisig with 2/4 threshold.

    • Can interact with EspressoTEEVerifier
      • change the modular TEE verifier contracts
    • Can interact with EspressoSGXTEEVerifier
      • set the enclaveHash (hash of enclave’s code and initial data) and delete all registered signers
    • Can interact with EspressoNitroTEEVerifier
      • set the enclaveHash (hash of enclave’s code and initial data) and delete all registered signers
    Used in:
    SP1VerifierGatewayMultisig0xCafE…6878

    A Multisig with 2/3 threshold.

    • Can interact with SP1VerifierGatewayArb
      • affect the liveness and safety of the gateway - can transfer ownership, add and freeze verifier routes
    Used in:
    BlobstreamMultisig0x738a…7997

    A Multisig with 4/6 threshold.

    • Can upgrade with no delay
      • ArbitrumBlobstream
    • Can interact with ArbitrumBlobstream
      • can freeze the bridge contract and update the list of authorized relayers
    Used in:
    • Can upgrade with no delay
      • RollupProxy
      • SequencerInbox
      • Inbox
      • ERC20Gateway
      • ChallengeManager
      • UpgradeExecutor
      • RollupEventInbox
      • GatewayRouter
      • Outbox
      • Bridge
    • Can interact with RollupProxy
      • Pause and unpause and set important roles and parameters in the system contracts: Can delegate Sequencer management to a BatchPosterManager address, manage data availability, DACs and the fastConfirmer role, set the Sequencer-only window, introduce an allowList to the bridge and whitelist Inboxes/Outboxes
    • Can interact with SequencerInbox
      • Add/remove batchPosters (Sequencers)
    • A Sequencer - acting directly
    • Can interact with NitroEnclaveVerifier
      • set the root certificate, add/remove ZK verifier routes, update verifier and aggregator program IDs, and change the ZK coprocessor configuration
    EOA 5 and EOA 6 (2)0x3243…392D0x9c0B…afDC
    • Can interact with ArbitrumBlobstream
      • it is a ‘Relayer’ and can call commitHeaderRange() to commit block ranges. Since adding and removing Relayers emits no events, there can be more relayers than are presented here

    Base Chain

    Actors:

    SP1VerifierGatewayMultisig0xCafE…6878

    A Multisig with 2/3 threshold.

    • Can interact with SP1VerifierGatewayBase
      • affect the liveness and safety of the gateway - can transfer ownership, add and freeze verifier routes
    Used in:
    BlobstreamMultisig0x6ABa…1Ca6

    A Multisig with 4/6 threshold.

    • Can upgrade with no delay
      • BaseBlobstream
    • Can interact with BaseBlobstream
      • can freeze the bridge contract and update the list of authorized relayers
    Used in:
    EOA 7 and EOA 8 (2)0x3243…392D0x9c0B…afDC
    • Can interact with BaseBlobstream
      • it is a ‘Relayer’ and can call commitHeaderRange() to commit block ranges. Since adding and removing Relayers emits no events, there can be more relayers than are presented here

    Ethereum

    Actors:

    SP1VerifierGatewayMultisig0xCafE…6878

    A Multisig with 2/3 threshold.

    • Can interact with SP1VerifierGateway
      • affect the liveness and safety of the gateway - can transfer ownership, add and freeze verifier routes
    Used in:
    BlobstreamMultisig0x8bF3…18E6

    A Multisig with 4/6 threshold.

    • Can upgrade with no delay
      • EthereumBlobstream
    • Can interact with EthereumBlobstream
      • can freeze the bridge contract and update the list of authorized relayers
    Used in:
    EOA 9 and EOA 10 (2)0x3243…392D0x9c0B…afDC
    • Can interact with EthereumBlobstream
      • it is a ‘Relayer’ and can call commitHeaderRange() to commit block ranges. Since adding and removing Relayers emits no events, there can be more relayers than are presented here
    A dashboard to explore contracts and permissions
    Go to Disco
    Disco UI Banner
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    Arbitrum One

    Central contract for the project’s configuration like its execution logic hash (wasmModuleRoot) and addresses of the other system contracts. Entry point for Proposers creating new Rollup Nodes (state commitments) and Challengers submitting fraud proofs (In the Orbit stack, these two roles are both held by the Validators).

    • Roles:
      • admin: UpgradeExecutor; ultimately Caldera Multisig 1, EOA 1
      • owner: UpgradeExecutor; ultimately Caldera Multisig 1, EOA 1
      • validators: EOA 3

    The Espresso TEE sequencer (registered in this contract) can submit transaction batches or commitments here. This version of the SequencerInbox also supports commitments to data that is posted to Celestia.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1
      • batchPosterManager: EOA 2
      • batchPosters: EOA 2

    Contract that allows challenging state roots. Can be called through the RollupProxy by Validators or the UpgradeExecutor.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1

    Escrow contract for the project’s gas token (can be different from ETH). Keeps a list of allowed Inboxes and Outboxes for canonical bridge messaging.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1
    The following tokens are included in the value secured calculation:
    MOLTEN token logo

    Central contract defining the access control permissions for upgrading the system contract implementations.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1
      • executors: Caldera Multisig 1, EOA 1
    Implementation used in:

    Facilitates sending L1 to L2 messages like depositing ETH, but does not escrow funds.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1

    Escrows deposited ERC-20 assets for the canonical Bridge. Upon depositing, a generic token representation will be minted at the destination. Withdrawals are initiated by the Outbox contract.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1

    All supported tokens in this escrow are included in the value secured calculation.

    Facilitates L2 to L1 contract calls: Messages initiated from L2 (for example withdrawal messages) eventually resolve in execution on L1.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1
    Implementation used in:

    This routing contract maps tokens to the correct escrow (gateway) to be then bridged with canonical messaging.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1
    Implementation used in:
    NitroEnclaveVerifier0x0d4c…3B22

    ZK-backed verifier for AWS Nitro enclave attestations. Verifies ZK proofs (RiscZero, Succinct SP1 or Pico) that attest AWS Nitro cert chain validation was executed correctly off-chain.

    • Roles:
      • owner: EOA 4
    OneStepProofEntry0x23b7…2f5f

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    OneStepProverMemory0x59CD…3736

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    QuoteVerifier0x6952…0Cf7

    The QuoteVerifier contract is used by the EspressoTEEVerifier to verify the validity of the TEE quote. It references a PCCSRouter (0x0d089B3fA00CBAD0a5098025519e9e4620622acF), an access point for Intel SGX ‘collateral’, crucial references of which some modular contracts are unverified.

    Implementation used in:
    EspressoTEEVerifier0x7A7E…21c3

    TEE gateway contract that can be used to 1) register signers that were generated inside a TEE and 2) verify the signatures of such signers. It supports both Intel SGX and AWS Nitro TEEs through modular contracts.

    • Roles:
      • owner: SafeL2
    OneStepProverHostIo0x7d46…d7B8

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine. This version uses the Blobstream DA bridge (ArbitrumBlobstream) as source of truth for the DA referenced by the fault proof.

    OneStepProverMath0x7E67…457B

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    ProxyAdmin0x8Ab2…D238
    • Roles:
      • owner: UpgradeExecutor

    Helper contract sending configuration data over the bridge during the systems initialization.

    • Roles:
      • admin: ProxyAdmin; ultimately Caldera Multisig 1, EOA 1
    Implementation used in:
    ValidatorUtils0x9e83…94C0

    This contract implements view only utilities for validators.

    Implementation used in:
    SP1Verifier0xC513…f21D

    Verifier contract for SP1 proofs (v5.0.0).

    OneStepProver00xe3b1…6291

    One of the modular contracts used for the last step of a fraud proof, which is simulated inside a WASM virtual machine.

    EspressoSGXTEEVerifier0xEA25…A297

    Verifies attestations of an Intel SGX TEE.

    • Roles:
      • owner: SafeL2
    EspressoNitroTEEVerifier0xF99D…Ca89

    Verifies attestations of an AWS Nitro TEE. Note: currently only Succinct proofs are used.

    • Roles:
      • owner: SafeL2
    SP1Verifier0x0459…C459

    Verifier contract for SP1 proofs (v5.0.0).

    Implementation used in:
    SP1VerifierGatewayArb0x3B60…185e

    This contract is the router for zk proof verification. It stores the mapping between identifiers and the address of onchain verifier contracts, routing each identifier to the corresponding verifier contract.

    • Roles:
      • owner: SP1VerifierGatewayMultisig
    Implementation used in:
    SP1Verifier0x8a0f…Fc5C

    Verifier contract for SP1 proofs (v6.0.0).

    Implementation used in:

    The Blobstream DA bridge. This contract is used to bridge data commitments between Celestia and the destination chain. It specifies relayers that commit block ranges, but due to the lack of emitted events, there may be more relayers than are presented here.

    • Roles:
      • admin: BlobstreamMultisig
      • guardians: BlobstreamMultisig
      • relayers: EOA 5, EOA 6
    Proxy used in:

    Base Chain

    SP1Verifier0x0459…C459

    Verifier contract for SP1 proofs (v5.0.0).

    Implementation used in:
    SP1VerifierGatewayBase0x3B60…185e

    This contract is the router for zk proof verification. It stores the mapping between identifiers and the address of onchain verifier contracts, routing each identifier to the corresponding verifier contract.

    • Roles:
      • owner: SP1VerifierGatewayMultisig
    Implementation used in:
    SP1Verifier0x8a0f…Fc5C

    Verifier contract for SP1 proofs (v6.0.0).

    Implementation used in:

    The Blobstream DA bridge. This contract is used to bridge data commitments between Celestia and the destination chain. It specifies relayers that commit block ranges, but due to the lack of emitted events, there may be more relayers than are presented here.

    • Roles:
      • admin: BlobstreamMultisig
      • guardians: BlobstreamMultisig
      • relayers: EOA 7, EOA 8
    Proxy used in:

    Ethereum

    SP1Verifier0x0459…C459

    Verifier contract for SP1 proofs (v5.0.0).

    Implementation used in:
    SP1VerifierGateway0x3B60…185e

    This contract is the router for zk proof verification. It stores the mapping between identifiers and the address of onchain verifier contracts, routing each identifier to the corresponding verifier contract.

    • Roles:
      • owner: SP1VerifierGatewayMultisig
    Implementation used in:
    SP1Verifier0x8a0f…Fc5C

    Verifier contract for SP1 proofs (v6.0.0).

    Implementation used in:

    The Blobstream DA bridge. This contract is used to bridge data commitments between Celestia and the destination chain. It specifies relayers that commit block ranges, but due to the lack of emitted events, there may be more relayers than are presented here.

    • Roles:
      • admin: BlobstreamMultisig
      • guardians: BlobstreamMultisig
      • relayers: EOA 10, EOA 9
    Proxy used in:

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).

    Program Hashes

    Name
    Hash
    Repository
    Verification
    Used in
    0x00de...0bef
    Code unknown
    None
    Molten Network logoBlobstream logo
    0x00e8...3322
    Code unknown
    None
    Molten Network logo
    0x002b...4922
    Code unknown
    None
    Molten Network logo