Re.al logoRe.al

Re.al is an Arbitrum Orbit stack L2 with AnyTrust data availability, focusing on Real World Assets.
Value Locked

$8.30 M

7.75%

Canonically Bridged
$887.17 K
Externally Bridged
$1.05 M
Natively Minted
$6.36 M
  • Tokens
  • Daily TPS
    0.0222.55%
  • 30D tx count
    62.24 K
  • Type
    Optimium
  • Purposes
    RWA, Universal
  • ...

    Tokens

    Choose token

    Natively Minted Tokens

    Pearl (PEARL)
    arcUSD (arcUSD)
    MORE (MORE)
    Externally Bridged Tokens

    US T-Bill (USTB)
    Canonically Bridged Tokens (Top 15)

    Liquid staked Ether 2.0 (stETH)
    USD Coin (USDC)
    Tether USD (USDT)
    Wrapped BTC (WBTC)

    ...

    Milestones

    Re.al Mainnet Launch

    2024 May 15th

    Re.al launches its mainnet with some initial dapps deployed.

    Learn more

    Arcana Launch

    2024 May 15th

    Arcana launches their platform for rebasing, delta-neutral yields on re.al.

    Learn more

    RWA Token Launch

    2024 May 15th

    Re.al launches the RWA token and its governance protocol.

    Learn more
    Risk summary
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    Risk analysis
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    Sequencer failureState validationData availabilityExit windowProposer failure

    State validation

    Fraud proofs (INT)

    No actor outside of the single Proposer can submit fraud proofs. Interactive proofs (INT) require multiple transactions over time to resolve. The challenge protocol can be subject to delay attacks. There is a 6d 8h challenge period.

    Data availability

    External (DAC)

    Proof construction relies fully on data that is NOT published on chain. There exists a Data Availability Committee (DAC) with a threshold of 1/1 that is tasked with protecting and supplying the data.

    Exit window

    None

    There is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.

    Sequencer failure

    Self sequence

    In the event of a sequencer failure, users can force transactions to be included in the project’s chain by sending them to L1. There is a 1d delay on this operation.

    Proposer failure

    Self propose

    Anyone can become a Proposer after 6d 8h of inactivity from the currently whitelisted Proposers.

    Technology

    Fraud proofs ensure state correctness

    After some period of time, the published state root is assumed to be correct. For a certain time period, one of the whitelisted actors can submit a fraud proof that shows that the state was incorrect. The challenge protocol can be subject to delay attacks.

    • Funds can be stolen if none of the whitelisted verifiers checks the published state. Fraud proofs assume at least one honest and able validator (CRITICAL).

    1. How is fraud proven - Arbitrum documentation FAQ
    2. Arbitrum Glossary: Challenge Period
    3. RollupUser.sol - Etherscan source code, onlyValidator modifier
    4. Solutions to Delay Attacks on Rollups

    Data is not stored on chain

    Users transactions are not published on-chain, but rather sent to external trusted parties, also known as committee members (DAC). Members of the DAC collectively produce a Data Availability Certificate (comprising BLS signatures from a quorum) guaranteeing that the data behind the new transaction batch will be available until the expiry period elapses (currently a minimum of two weeks). This signature is not verified by L1, however external Validators will skip the batch if BLS signature is not valid resulting. This will result in a fraud proof challenge if this batch is included in a consecutive state update. It is assumed that at least one honest DAC member that signed the batch will reveal tx data to the Validators if Sequencer decides to act maliciously and withhold the data. If the Sequencer cannot gather enough signatures from the DAC, it will “fall back to rollup” mode and by posting the full data directly to the L1 chain. The current DAC threshold is 1 out of 1.

    • Funds can be lost if the external data becomes unavailable (CRITICAL).

    • Users can be censored if the committee restricts their access to the external data.

    1. Inside AnyTrust - Arbitrum documentation
    Operator

    The system has a centralized sequencer

    While forcing transaction is open to anyone the system employs a privileged sequencer that has priority for submitting transaction batches and ordering transactions.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    1. Sequencer - Arbitrum documentation

    Users can force any transaction

    Because the state of the system is based on transactions submitted on-chain and anyone can submit their transactions there it allows the users to circumvent censorship by interacting with the smart contract directly. Anyone can become a Proposer after approximately 6d 8h (45818 blocks) of inactivity from the currently whitelisted Proposers.

    1. SequencerInbox.sol - Etherscan source code, forceInclusion function
    2. Sequencer Isn’t Doing Its Job - Arbitrum documentation
    Withdrawals

    Regular exit

    The user initiates the withdrawal by submitting a regular transaction on this chain. When the block containing that transaction is finalized the funds become available for withdrawal on L1. The process of block finalization usually takes several days to complete. Finally the user submits an L1 transaction to claim the funds. This transaction requires a merkle proof.

    1. Transaction lifecycle - Arbitrum documentation
    2. L2 to L1 Messages - Arbitrum documentation
    3. Mainnet for everyone - Arbitrum Blog

    Tradeable Bridge Exit

    When a user initiates a regular withdrawal a third party verifying the chain can offer to buy this withdrawal by paying the user on L1. The user will get the funds immediately, however the third party has to wait for the block to be finalized. This is implemented as a first party functionality inside Arbitrum’s token bridge.

    1. Tradeable Bridge Exits - Arbitrum documentation

    Autonomous exit

    Users can (eventually) exit the system by pushing the transaction on L1 and providing the corresponding state root. The only way to prevent such withdrawal is via an upgrade.

    Other considerations

    EVM compatible smart contracts are supported

    Arbitrum One uses Nitro technology that allows running fraud proofs by executing EVM code on top of WASM.

    • Funds can be lost if there are mistakes in the highly complex Nitro and WASM one-step prover implementation.

    1. Inside Arbitrum Nitro
    Permissions

    The system uses the following set of permissioned addresses:

    ProxyAdmin 0xB032…80f1

    Admin of UpgradeExecutor, ChallengeManager, Outbox, Bridge, Inbox.

    Validators/Proposers 0x4b8F…eb62

    They can submit new state roots and challenge state roots. Some of the operators perform their duties through special purpose smart contracts.

    Sequencers 0x0e00…Fa2E

    Central actors allowed to submit transaction batches to L1.

    GelatoMultisig 0xBeA2…9Bbb

    Multisig that can execute upgrades of the L2 system contracts via the UpgradeExecutor. This is a Gnosis Safe with 6 / 10 threshold.

    Used in:

    Project icon
    EscrowMultisig 0xD47E…23d4

    Multisig that owns reETH-strategy and escrow-related contracts and can move deposited funds. Also governs the reETH token as a minter. This is a Gnosis Safe with 4 / 5 threshold.

    Those are the participants of the EscrowMultisig.

    Bridger Owner 0xeB65…b3A3

    Can upgrade the Bridger contract.

    Smart contracts

    The system consists of the following smart contracts on the host chain (Ethereum):

    StrategyManager 0x5Cba…DdD8

    A gateway contract that manages strategies for assets that are deposited to the AssetsVault. From a user PoV this happens when bridging to the L2.

    SwapManager 0x4AC3…c335

    Performs swaps via Curve or UniswapV3 to serve instant withdrawals from the reETH RealVault.

    RealVault 0xFC1d…A5e1

    This contract is responsible for managing deposit, withdrawal, and settlement processes for the assets backing reETH using the ERC4626 (tokenized vault) standard.

    AssetsVault 0xf985…2294

    This escrow contract receives ETH that users bridge to Re.al L2. This ETH is then converted to yielding assets using the StrategyManager.

    A Routing contract to the standard orbit stack bridge of the L2.

    Can be upgraded by: Bridger Owner

    Upgrade delay: No delay

    Main contract implementing Arbitrum One Rollup. Manages other Rollup components, list of Stakers and Validators. Entry point for Validators creating new Rollup Nodes (state commits) and Challengers submitting fraud proofs.

    Implementation used in:

    Project icon
    Project icon
    Project icon
    Project icon

    Contract managing Inboxes and Outboxes. It escrows the native token used for gas on the chain. This contract stores the following tokens: ETH.

    Can be upgraded by: ProxyAdmin

    Upgrade delay: No delay

    Implementation used in:

    Project icon

    Main entry point for the Sequencer submitting transaction batches.

    Implementation used in:

    Project icon
    Project icon
    Project icon

    Entry point for users depositing ETH and sending L1 -> L2 messages.

    Can be upgraded by: ProxyAdmin

    Upgrade delay: No delay

    Implementation used in:

    Project icon

    Contract that allows L2->L1 calls, i.e. messages initiated on L2 which eventually resolve in execution on L1.

    Can be upgraded by: ProxyAdmin

    Upgrade delay: No delay

    Implementation used in:

    Project icon

    Contract allowed to upgrade the system.

    Can be upgraded by: ProxyAdmin

    Upgrade delay: No delay

    Implementation used in:

    Project icon
    Project icon
    Project icon
    Project icon

    Contract that allows challenging invalid state roots. Can be called through the RollupProxy.

    Can be upgraded by: ProxyAdmin

    Upgrade delay: No delay

    Implementation used in:

    Project icon
    Project icon
    Project icon
    OneStepProofEntry 0x0982…0662

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    Project icon
    Project icon
    Project icon
    OneStepProverMemory 0x4811…A7f1

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    Project icon
    Project icon
    Project icon
    OneStepProverMath 0x89AF…3e06

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    Project icon
    Project icon
    Project icon
    OneStepProverHostIo 0x99a2…F878

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    Project icon
    Project icon
    Project icon
    OneStepProver0 0xDf94…0622

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    Project icon
    Project icon
    Project icon

    Value Locked is calculated based on these smart contracts and tokens:

    Default Gateway for non-native tokens. On depositing, a generic ‘wrapped’ version of the escrowed token is minted on the L2.

    Contract managing Inboxes and Outboxes. It escrows ETH sent to L2.

    Can be upgraded by: ProxyAdmin

    Upgrade delay: No delay

    Implementation used in:

    Project icon
    Escrow for stETH 0x679D…31f6

    This contract escrows the stETH that was deposited to mint reETH.

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).