Search

Search for projects by name

Shibarium logoShibarium

Critical contracts can be upgraded by an EOA which could result in the loss of all funds.

Badges

About

Shibarium is an EVM-compatible, proof of stake sidechain for Ethereum. It is built by developers behind the Shiba Inu token ecosystem. The main bridge to Ethereum is currently validated by Shibarium validators and allows for asset as well as data movement...


Value secured
$5.56 M3.68%
Canonically Bridged
$5.56 M
Natively Minted
$0.00
Externally Bridged
$0.00

  • Tokens
  • Past day UOPS
    21.6755.9%
  • 30D ops count
    88.27 M
  • Type
    Other

  • Purpose
    Universal
  • Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Shibarium is an EVM-compatible, proof of stake sidechain for Ethereum. It is built by developers behind the Shiba Inu token ecosystem. The main bridge to Ethereum is currently validated by Shibarium validators and allows for asset as well as data movement...

    Why is the project listed in others?

    The proof system isn't fully functional

    Consequence: projects without a proper proof system fully rely on single entities to safely update the state. A malicious proposer can finalize an invalid state, which can cause loss of funds.

    There is no data availability bridge

    Consequence: projects without a data availability bridge fully rely on single entities (the sequencer) to honestly rely available data roots on Ethereum. A malicious sequencer can collude with the proposer to finalize an unavailable state, which can cause loss of funds.

    Learn more about the recategorisation here.

    Value Secured

    2024 Apr 18 — 2025 Apr 18


    Total value securedTotal
    $5.56 M3.68%
    Canonically BridgedCanonically Bridged ValueCanonical
    $5.56 M3.68%
    Natively MintedNatively Minted TokensNative
    $0.000.00%
    Externally BridgedExternally Bridged ValueExternal
    $0.000.00%
    Risk summary
    This project includes unverified contracts. (CRITICAL)
    Risk analysis
    This project includes unverified contracts. (CRITICAL)
    Critical contracts can be upgraded by an EOA which could result in the loss of all funds.
    Sequencer failureState validationData availabilityExit windowProposer failure
    Sequencer failure
    Enqueue via L1

    Users can submit transactions to an L1 queue, but can’t force them. The sequencers cannot selectively skip transactions but can stop processing the queue entirely. In other words, if the sequencers censor or are down, they are so for everyone.

    State validation
    None

    Currently the system permits invalid state roots. More details in project overview.

    Data availability
    External

    Proof construction and state derivation rely fully on data that is NOT published onchain.

    Exit window
    None

    There is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.

    Proposer failure
    Cannot withdraw

    Only the whitelisted proposers can publish state roots on L1, so in the event of failure the withdrawals are frozen.

    Technology

    No state validation

    As a fork of Polygon PoS, state updates are supposed to be settled if signed by at least 2/3+1 of the Shibarium validators stake, without checking whether the state transition is valid. Since some contracts are not verified, it is not possible to verify the exact mechanism.

    • Users can be censored if validators on Shibarium decide to not mint tokens after observing an event on Ethereum.

    • Funds can be stolen if validators decide to mint more tokens than there are locked on Ethereum thus preventing some existing holders from being able to bring their funds back to Ethereum.

    • Funds can be stolen if validators submit a fraudulent checkpoint allowing themselves to withdraw all locked funds.

    Permissions

    Ethereum

    Actors:

    • Is allowed to interact with DepositManager - can update the root chain it references.
    • Is allowed to interact with SlashingManager - can update how much of the slashed funds go to the proposer and reporter.
    • Is allowed to interact with RootChain - can delete arbitrary checkpoints.
    • Can upgrade the implementation of ERC1155Predicate, MintableERC721Predicate, RootChainManager, StakeManager, ERC20Predicate, ERC721Predicate, EtherPredicate.
    Smart contracts

    Ethereum

    Can be upgraded by:

    Main configuration contract to manage tokens, token types, escrows (predicates) for given token types. It also serves as an entry point for deposits and withdrawals effectively acting as a token router.

    Can be upgraded by:
    StateSender 0x3a12…A21C

    Smart contract allowing whitelisted addresses to send messages to contracts on the child chain.

    StakingInfo 0x5399…A1aE

    Contains logging and getter functions about staking.

    The source code of this contract is not verified on Etherscan.

    The source code of this contract is not verified on Etherscan.

    Can be upgraded by:

    This contract can store any token.

    Can be upgraded by:

    NFTs used to represent a withdrawal in the withdrawal PriorityQueue (Only used for tokens initially deposited via DepositManager).

    Contract to deposit and escrow ETH, ERC20 or ERC721 tokens. This contract can store any token.

    SlashingManager 0x8ed7…d3ce

    Contract that allows the consensus supermajority to slash validators.

    ERC721Predicate 0x9df5…D5a3

    The source code of this contract is not verified on Etherscan.

    RLPReader 0xc107…41c4

    This contract stores the following tokens: ETH.

    Can be upgraded by:

    Simple contract that allows the owner to call an update function on arbitrary contracts.

    Contract storing chain checkpoints. Note that validity of these checkpoints is not verified, it is assumed to be valid if signed by 2/3 of the validators.

    ERC20Predicate 0xdaF1…462c

    The source code of this contract is not verified on Etherscan.

    ValidatorShare 0xe99f…1dE6

    The source code of this contract is not verified on Etherscan.

    Registry 0xF486…62BB

    Maintains the addresses of the contracts used in the system.

    Value Secured is calculated based on these smart contracts and tokens:

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).

    • Funds can be stolen if the source code of unverified contracts contains malicious code (CRITICAL).