Search

Search for projects by name

L2BEAT Bridges is a work in progress. You might find incomplete research or inconsistent naming. Join our Discord to suggest improvements!

Chainport logoChainport

About

ChainPort Cross-Chain Bridge: Port across 15+ Chains.


  • Total value locked
  • Destination
    Various
  • Validated by
    Third Party
  • Type
    Token Bridge

  • About

    ChainPort Cross-Chain Bridge: Port across 15+ Chains.


    Value Locked
    Risk summary
    This project includes unverified contracts. (CRITICAL)
    Technology

    Principle of operation

    Funds are moved between escrows and chains using third party actors.

    • Funds can be frozen if third party actors decide to not relay selected messages between chains.

    • Funds can be stolen if third party actors relay a fake messages.

    Permissions

    The system uses the following set of permissioned addresses:

    Members of the Chainport Congress.

    MultisigVault1 0x7B8F…EA19

    This is a Gnosis Safe with 2 / 3 threshold. Vault 1.

    MultisigVault1 participants (3) Congress membersCongress membersCongress members

    Those are the participants of the MultisigVault1.

    MultisigVault2 0x450a…faf9

    This is a Gnosis Safe with 2 / 3 threshold. Vault 2.

    MultisigVault2 participants (3) Congress membersCongress members0xD223…50F6

    Those are the participants of the MultisigVault2.

    Smart contracts

    The system consists of the following smart contracts on the host chain (Ethereum):

    Escrow controlled by the Chainport Congress. This contract can store any token.

    ChainportCongress 0xB6b4…84a1

    Contains the logic to create proposal, vote and execute them.

    ChainportCongressMembersRegistry 0x1DeE…aBCa

    Registry of the Chainport Congress members. Acts as a 2-of-3 multisig.

    Value Locked is calculated based on these smart contracts and tokens:

    The current deployment carries some associated risks:

    • Funds can be stolen if the source code of unverified contracts contains malicious code (CRITICAL).