Search

Search for projects by name

Starknet logoStarknet

Badges

About

Starknet is a general purpose ZK Rollup based on STARKs and the Cairo VM.


Value secured
$657.31 M2.60%
Canonically Bridged
$645.55 M
Externally Bridged
$11.75 M
Natively Minted
$0.00

  • Tokens
  • Past day UOPS
    4.44408%
  • 30D ops count
    3.70 M

  • Stage
  • Type
    ZK Rollup
  • Purpose
    Universal
  • Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Starknet is a general purpose ZK Rollup based on STARKs and the Cairo VM.

    Value Secured

    2024 Feb 23 — 2025 Feb 22

    Activity

    2024 Feb 23 — 2025 Feb 21

    Onchain costs

    The section shows the operating costs that L2s pay to Ethereum.


    2024 Feb 22 — 2025 Feb 21


    Milestones & Incidents

    Starknet starts using blobs

    2024 Mar 13th

    Starknet starts publishing data to blobs.

    Learn more

    Starknet Provisions

    2024 Feb 14th

    Starknet begins allocating $STRK to early contributors and users.

    Learn more
    Risk summary
    Risk analysis
    Sequencer failureState validationData availabilityExit windowProposer failure

    Sequencer failure

    No mechanism

    There is no mechanism to have transactions be included if the sequencer is down or censoring.

    State validation

    ZK proofs (ST)

    STARKs are zero knowledge proofs that ensure state correctness.

    Data availability

    Onchain (SD)

    All of the data (SD = state diffs) needed for proof construction is published onchain.

    Exit window

    None

    There is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.

    Proposer failure

    Cannot withdraw

    Only the whitelisted proposers can publish state roots on L1, so in the event of failure the withdrawals are frozen.

    Rollup stage
    Under Review

    The information in the section might be incomplete or outdated.
    The L2BEAT Team is working to research & validate the content before publishing.

    StarknetStarknet is currently
    Review
    for stage assignment.
    Technology

    Validity proofs ensure state correctness

    Each update to the system state must be accompanied by a ZK proof that ensures that the new state was derived by correctly applying a series of valid user transactions to the previous state. These proofs are then verified on Ethereum by a smart contract.

    1. What is Starknet

    Zero knowledge STARK cryptography is used

    Despite their production use zkSTARKs proof systems are still relatively new, complex and they rely on the proper implementation of the polynomial constraints used to check validity of the Execution Trace.

    • Funds can be lost if the proof system is implemented incorrectly.

    1. STARK Core Engine Deep Dive

    All data required to reconstruct rollup state is published on chain

    State diffs are publish onchain as blob or calldata on every state update. The state diffs contain information on every contact whose storage was updated, and additional information on contract deployments. From diffs full system state can be recovered. Contracts’ code is not published on L1, but can be trustlessly verified if available elsewhere.

    1. On-Chain Data - Starknet documentation
    Learn more about the DA layer here: Ethereum logoEthereum
    State derivation
    Node software

    The Juno node software can be used to reconstruct the L2 state entirely from L1. The feature has not been released yet, but can be found in this PR.

    Compression scheme

    Starknet doesn’t use any compression scheme.

    Genesis state

    There is no non-empty genesis state.

    Data format

    The data format has been updated with different versions, and the full specification can be found here.

    State validation

    Each update to the system state must be accompanied by a ZK proof that ensures that the new state was derived by correctly applying a series of valid user transactions to the previous state. These proofs are then verified on Ethereum by a smart contract.


    Proven Program

    The source code of the Starknet OS can be found here. The source code of the bootloader can be found here.

    Operator

    The system has a centralized operator

    The operator is the only entity that can propose blocks. A live and trustworthy operator is vital to the health of the system. Typically, the Operator is the hot wallet of the Starknet service submitting state updates for which proofs have been already submitted and verified.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    Users can't force any transaction

    There is no general mechanism to force the sequencer to include the transaction.

    • Users can be censored if the operator refuses to include their transactions.

    1. Censorship resistance of Starknet - Forum Discussion
    Withdrawals

    Regular messaging

    The user initiates L2->L1 messages by submitting a regular transaction on this chain. When the block containing that transaction is settled, the message becomes available for processing on L1. ZK proofs are required to settle blocks. Note that the message request can be censored by the Sequencer.

    • Funds can be frozen if the operator censors withdrawal transaction.

    1. Withdrawing is based on l2 to l1 messages - Starknet documentation

    Emergency exit

    There is no generic escape hatch mechanism as Starknet cannot be forced by users into a frozen state. Note that a freezing mechanism on L2, to be secure, requires anti-censorship protection.

    Permissions

    Ethereum

    Actors:

    StarknetSecurityCouncil 0x15e8…C361

    A Multisig with 9 / 12 threshold. Can upgrade the central Starknet constract, potentially potentially allowing fraudulent state to be posted and gaining access to all funds stored in the bridge. Can also appoint operators, change the programHash, configHash, or message cancellation delay without upgrading the contract.Currently there is 0s delay before the upgrade.

    SHARP Verifier Governors 0x21F9…AEc4

    Can upgrade implementation of SHARP Verifier, potentially with code approving fraudulent state. Currently there is 0s delay before the upgrade.

    Used in:

    SHARPVerifierAdminMultisig 0x21F9…AEc4

    A Multisig with 2 / 4 threshold. SHARP Verifier Governor.

    Used in:

    StarkgateBridgeMultisig 0x0152…C6Ec

    A Multisig with 2 / 4 threshold. Can upgrade most of the Starkgate bridge escrows including the Starkgate Multibridge. Can also configure the flowlimits of the existing Starkgate escrows or add new deployments.

    Allowed to post state updates. When all operators are down the state cannot be updated.

    StarknetSCMinorityMultisig 0xF6b0…bC6B

    A Multisig with 3 / 12 threshold. An Operator. Allowed to post state updates. This minority multisig with the SecurityCouncil members is the only fallback in case of censorship by other operators.

    StarkgateSecurityAgentMultisig 0x77Dd…88c5

    A Multisig with 1 / 3 threshold. Can enable withdrawal limits for tokens in some Starkgate bridge Escrows.

    StarkGate LUSD owner 0x5751…f21A

    Can upgrade implementation of the LUSD escrow, potentially gaining access to all funds stored in the bridge. Currently there is 0s delay before the upgrade.

    StarkGate token blacklister EOA 0xF689…e86b

    Can remove and blacklist tokens from the Starkgate bridge.

    Smart contracts
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    Ethereum

    Starknet contract receives (verified) state roots from the Sequencer, allows users to read L2 -> L1 messages and send L1 -> L2 message.

    Implementation used in:

    CallProxy for GpsStatementVerifier.

    Proxy used in:

    SHARPVerifier 0x9fb7…1942

    Starkware SHARP verifier used collectively by Starknet, Sorare, ImmutableX, Apex, Myria, rhino.fi and Canvas Connect. It receives STARK proofs from the Prover attesting to the integrity of the Execution Trace of these Programs including correctly computed state root which is part of the Program Output.

    Implementation used in:

    FriStatementContract 0x30Ef…d400

    Part of STARK Verifier.

    Implementation used in:

    MerkleStatementContract 0x32a9…FdAd

    Part of STARK Verifier.

    Implementation used in:

    CairoBootloaderProgram 0x5860…c515

    Part of STARK Verifier.

    Implementation used in:

    MemoryPageFactRegistry 0xe583…C460

    MemoryPageFactRegistry is one of the many contracts used by SHARP verifier. This one is important as it registers all necessary onchain data.

    Implementation used in:

    OldMemoryPageFactRegistry 0xFD14…D1b4

    Same as MemoryPageFactRegistry but stores facts proved by the old SHARP Verifier, used as a fallback.

    Implementation used in:

    L1DaiGateway 0x9F96…388d

    Custom DAI Gateway, main entry point for users depositing DAI to L2 where “canonical” L2 DAI token managed by MakerDAO will be minted. Managed by MakerDAO.

    This contract allows the permissionless creation and configuration of StarkGate token escrows. Tokens can also be blacklisted for creation, and already actively bridged tokens can be deactivated from depositing by a designated TokenAdmin.

    A central registry contract to map token addresses to their StarkGate bridge contract.

    Value Secured is calculated based on these smart contracts and tokens:

    StarkGate bridge for EKUBO, ZEND, NSTR (and potentially other tokens listed via StarkgateManager). There is no bridge cap.

    Escrow for DAI 0x0437…585C

    DAI Vault for custom DAI Gateway managed by MakerDAO. The current bridge cap is 5.00 M DAI.

    StarkGate bridge for WBTC. There is no bridge cap.

    Can be upgraded by:

    StarkGate bridge for USDC. There is no bridge cap.

    Can be upgraded by:

    StarkGate bridge for USDT. There is no bridge cap.

    Can be upgraded by:

    StarkGate bridge for wstETH. There is no bridge cap.

    Can be upgraded by:

    StarkGate bridge for rETH. There is no bridge cap.

    Can be upgraded by:

    StarkGate bridge for UNI. There is no bridge cap.

    StarkGate bridge for FRAX. There is no bridge cap.

    StarkGate bridge for FXS. There is no bridge cap.

    StarkGate bridge for sfrxETH. There is no bridge cap.

    StarkGate bridge for LUSD. There is no bridge cap.

    Escrow for LORDS 0x023A…E5C9

    StarkGate bridge for LORDS.

    StarkGate bridge for STRK. There is no bridge cap.

    Can be upgraded by:

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).

    Knowledge nuggets