Approach to analyzing risk

This is the framework we use to analyze sidechains, L2s and other scaling protocols

We analyze protocols on four categories: Data availability, network operators, settlement assurance (a.k.a finality), and the bridge custody (or two-way peg).

Protocols do not receive an overall score, but a risk summary is added at the beginning of every assessment to highlight risk areas that can be critical.

For example, if an optimium uses an offchain data availability solution that is a single server, then it only takes collusion between a sequencer and the operator of the DA server to steal everyone’s funds. This is a critical and should be noted in the summary.

Let’s review how protocols can potentially be assessed.

Data availability

  • Self-hosted: User can store data related to scaling protocol transactions locally - low risk

  • Onchain: Protocol uses Bitcoin for data availability - low risk

  • Offchain via alternative consensus protocol: Data is primarily stored on another publicly available, decentralized network and there is a mechanism to verify that the data is made available - medium risk

    • If the network sees N < 21 operators participating in the network, then it is high risk

    • If the network sees N > 100 operators participating in the network, then it is low risk

    • If no mechanism to detect fraud (e.g. DA withholding attack), then high risk

  • Offchain DAC: State updates are stored via a centralized (or permissioned) committee and Bitcoin full nodes, and users, cannot access that data - high risk

  • Offchain Single Server: State updates are stored via a centralized server and Bitcoin full nodes, and users, cannot access that data - high risk

  • Not disclosed: Code and/or documentation relevant to this category has not been disclosed and we cannot assign a risk score - critical risk

Network Operators

  • Network is operated peer-to-peer Protocol doesn’t rely on third party operators - low risk

  • Network operator set is N > 21 and users can self sequence - low risk

    • Sequencer designs can include of this Federated, Auction, PoS, DPoS, PoW

    • If network operator is N < 21 , then moved to medium risk

  • User can’t self sequence, but operator set is N > 21 - medium risk

    • If operator set is N > 100 then move to low risk

    • Designs include: Auction, PoS, DPoS, PoW

  • Federated operator set: Transactions are sequenced by an honest majority of participants in a permissioned, offchain consensus protocol/network - high risk

  • Centralized operator with no self-sequencing - high risk

  • Not disclosed: Code and/or documentation relevant to this category has not been disclosed and we cannot assign a risk score - critical risk

Settlement Assurance

  • Bitcoin-equivalent: Settlement happens on, or is enforced by, Bitcoin script and/or consensus participants - low risk

  • Onchain, optimistic settlement: Settlement happens through an onchain challenge response protocol - low risk

    • Note: BitVM2 sees challenger/verifier role be permissionless

    • If permissioned, medium risk

  • Offchain via alternative, permissionless consensus mechanism: Settlement is managed offchain by a permissionless consensus protocol and/or network of nodes - medium risk

  • Federated: Settlement for the layer is finalized by an honest majority of participants in a permissioned, offchain consensus protocol/network - high risk

  • Offchain via single server: Settlement for the layer is finalized by one party - high risk

  • Not disclosed: Code and/or documentation relevant to this category has not been disclosed and we cannot assign a risk score - critical risk

  • Edge case:

    • If the protocol has no fraud proofs, then it is high risk

Bridge Custody

  • No custody with unilateral exit enforced by an L1 transaction - low risk

    • If users can not bypass centralized operator for withdrawals, move to medium and note criticial risk that withdrawals can be paused indefinitely, but not stolen

    • If no state validation mechanism in place, and network operator(s) can collude and post fradulent state roots to steal funds, then move to high risk

  • No custody with optimistic settlement - low risk

  • The two-way peg is federated, but anyone can participate as a watchtower/challenger and challenge malicious withdrawals - low risk

    • If watchtower role is federated, move to medium risk. If N < 21 watchtowers, move to high risk

  • The two-way peg is governed by an alternative, consensus mechanism - medium risk

    • If operators do not post collateral, and there is no mechanism to slash this collateral, then high risk

    • If collateral posted by bridge operators does not exceed the amount of BTC, and there is no "liveness ratio" in place, then high risk

    • If outsourced to an alternative consensus mechanism, that is not the same consensus mechanism as the chain, then high risk

  • The protocol has an honest-majority federation securing its two way peg - high risk

  • The protocol doesn’t enable unilateral exit, and its two way peg is managed by centralized parties - high risk

  • Not disclosed: Code and/or documentation relevant to this category has not been disclosed and we cannot assign a risk score - critical risk

  • Edge case:

    • Users can unilaterally exit, but network operators can collude with other network participants to steal funds, and there is no way to challenge fraud - medium risk

Additional questions related to security derived from Bitcoin

  • Can users unilaterally exit the l2 and/or bridge that is custodying their funds?

    • Yes/no

    • Insert how

  • Does the protocol inherit security from Bitcoin miners, full nodes or BTC the asset?

    • Yes/no

    • Insert how

  • Does an alternative token play a role in network security/permitting withdrawals?

    • Yes/no

    • Insert how

  • Does the protocol create risks for MEV at the protocol, and base layer, level?

    • Yes/no

    • Insert how

  • Does the protocol pay fees to Bitcoin miners?

    • Yes/no

    • Insert how

Additional context related to potential risks

Some context related to risks with certain protocols may not be covered directly in our risk assessment. This can be covered in an "additional considerations" section that outlines relevant information. An example of this could be acknowledging that the majority of Lightning Network adoption is by way of custodial providers.

Critical risk acknowledgement

If a protocol has a critical risk item, even if not directly covered in our risk assessment, it should be clarified at the beginning of the review. An example of a critical risk, that is out of scope for our assessment, is a rollup settling on an EVM sidechain with immediately upgrade-able contracts. This does not fit into our risk assessment directly, but should be acknowledged at the top of the overall review.

Summary

This framework can be easier to customize and provide more nuance given the number of scaling solutions that are present in Bitcoin today. For example, related to block production/network operators, we can add even more scoring mechanisms based on how decentralized the network is. E.g. A network with 200 validators is better than a network with 10, and we can customize the assessment to highlight this.

This risk assessment is an initial starting point to analyze Bitcoin scaling protocols. It is a living document and is subject to change.

Bitcoin does not have a unified scaling roadmap. There are tradeoffs with every protocol being implemented to support Bitcoin scaling. This framework hopes to capture some of the nuance related to the various designs being proposed.

If you have comments on this framework, please consider joining our community chat to discuss.

Clarifying point(s)

We define permissionless as meaning anyone with sufficient capital and resources can participate in consensus, operating a node, block production, etc.

Last updated