Conversation

First - I anticipate people trying to frame this as "see - that is why you should use L2 and not side chains" - but they are wrong! The advantage L2s have, is that there is no need for trusted operators. So if a bridge operator would turn malicious or would get compromised...
2
15
you can rightfully say: see L2! But if there is a logic error/bug in a bridge - this can happen in the very same way in any L2. In fact, L2 designs are often more complicated than bridges of side chains so there is absolutely no reason to believe that they are less likely to...
1
21
Now talking about - first - yes the security is currently essentially an advanced multisig. While we have plans after "the merge" to update the security to the full validator set of Gnosis Beacon chain (currently 23k validators) currently it is a handful of trusted..
1
8
This is why it is e.g. possible to have a DAO on Gnosis Chain control a Safe on mainnet:
Quote Tweet
zodiac bridge module ♑ DAOs can now have cross-chain control by equipping this module, a DAO on one chain can control the assets and interact with systems like a @gnosisSafe on an *entirely different* EVM chain
Show this thread
Image
1
9
Replying to
Being prudent engineers security measures had been put in place like "daily limits". So in case of a hack - bridges funds can only be stolen up to a limit, giving time for a more secure "bridge governance" multisig with 15 independent cold wallet signers to intervene.
1
8
The bridge team kept innovating and created a setup where bridged funds can be used in low risk lending protocols (Aave and Compound) while using the returns to subsidize bridge gas costs for users.
2
4