Search

Search for projects by name

Parallel logoParallel

Badges

About

Parallel is an Ethereum L2 solution utilizing Arbitrum Nitro technology.


Value Locked
$63.72 K6.99%
Canonically Bridged
$63.72 K
Externally Bridged
$0.00
Natively Minted
$0.00

  • Tokens
  • Daily TPS
    0.000.00%
  • 30D tx count
    29.00

  • Stage
    Stage 0
  • Type
    Optimistic Rollup
  • Purpose
    Universal
  • Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Parallel is an Ethereum L2 solution utilizing Arbitrum Nitro technology.


    Value Locked
    Activity
    Onchain costs
    Milestones & Incidents

    ArbOS v20 upgrade

    2024 Apr 10th

    Introduces EIP-4844 data blobs for L1 data availability and Dencun-related opcodes on L2.

    Learn more

    Parallel Mainnet closed launch

    2024 Jan 5th

    Parallel Mainnet is open for developers.

    Learn more
    Risk summary
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    Risk analysis
    Critical contracts can be upgraded by an EOA which could result in the loss of all funds.
    Fraud proof system is fully deployed but is not yet permissionless as it requires Validators to be whitelisted.
    Sequencer failureState validationData availabilityExit windowProposer failure

    Sequencer failure

    Self sequence

    In the event of a sequencer failure, users can force transactions to be included in the project’s chain by sending them to L1. There is a 2d delay on this operation.

    State validation

    Fraud proofs (INT)

    No actor outside of the single Proposer can submit fraud proofs. Interactive proofs (INT) require multiple transactions over time to resolve. The challenge protocol can be subject to delay attacks. There is a 6d challenge period.

    Data availability

    Onchain

    All of the data needed for proof construction is published on Ethereum L1.

    Exit window

    None

    There is no window for users to exit in case of an unwanted regular upgrade since contracts are instantly upgradable.

    Proposer failure

    Self propose

    Anyone can become a Proposer after 12d 8h of inactivity from the currently whitelisted Proposers.

    Rollup stage
    ParallelParallel is a
    Stage 0
    Optimistic Rollup.
    The requirement for available node software is under review

    Learn more about Rollup stages
    Please keep in mind that these stages do not reflect rollup security, this is an opinionated assessment of rollup maturity based on subjective criteria, created with a goal of incentivizing projects to push toward better decentralization. Each team may have taken different paths to achieve this goal.
    Technology

    All transaction data is recorded on chain

    All executed transactions are submitted to an on chain smart contract. The execution of the rollup is based entirely on the submitted transactions, so anyone monitoring the contract can know the correct state of the rollup chain.

    1. Sequencing followed by deterministic execution - Arbitrum documentation
    2. SequencerInbox.sol - Etherscan source code, addSequencerL2BatchFromOrigin function
    State validation
    A diagram of the state validation
    A diagram of the state validation

    Updates to the system state can be proposed and challenged by a set of whitelisted validators. If a state root passes the challenge period, it is optimistically considered correct and made actionable for withdrawals.


    State root proposals

    Whitelisted validators propose state roots as children of a previous state root. A state root can have multiple conflicting children. This structure forms a graph, and therefore, in the contracts, state roots are referred to as nodes. Each proposal requires a stake, currently set to 0.1 ETH, that can be slashed if the proposal is proven incorrect via a fraud proof. Stakes can be moved from one node to one of its children, either by calling stakeOnExistingNode or stakeOnNewNode. New nodes cannot be created faster than the minimum assertion period by the same validator, currently set to 15m. The oldest unconfirmed node can be confirmed if the challenge period has passed and there are no siblings, and rejected if the parent is not a confirmed node or if the challenge period has passed and no one is staked on it.

    • Funds can be stolen if none of the whitelisted verifiers checks the published state. Fraud proofs assume at least one honest and able validator (CRITICAL).

    1. How is fraud proven - Arbitrum documentation FAQ
    Challenges

    A challenge can be started between two siblings, i.e. two different state roots that share the same parent, by calling the startChallenge function. Validators cannot be in more than one challenge at the same time, meaning that the protocol operates with partial concurrency. Since each challenge lasts 6d, this implies that the protocol can be subject to delay attacks, where a malicious actor can delay withdrawals as long as they are willing to pay the cost of losing their stakes. If the protocol is delayed attacked, the new stake requirement increases exponentially for each challenge period of delay. Challenges are played via a bisection game, where asserter and challenger play together to find the first instruction of disagreement. Such instruction is then executed onchain in the WASM OneStepProver contract to determine the winner, who then gets half of the stake of the loser. As said before, a state root is rejected only when no one left is staked on it. The protocol does not enforces valid bisections, meaning that actors can propose correct initial claim and then provide incorrect midpoints.

    1. Fraud Proof Wars: Arbitrum Classic
    Operator

    The system has a centralized sequencer

    While forcing transaction is open to anyone the system employs a privileged sequencer that has priority for submitting transaction batches and ordering transactions.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    1. Sequencer - Arbitrum documentation

    Users can force any transaction

    Because the state of the system is based on transactions submitted on the underlying host chain and anyone can submit their transactions there it allows the users to circumvent censorship by interacting with the smart contract on the host chain directly. After a delay of 2d in which a Sequencer has failed to include a transaction that was directly posted to the smart contract, it can be forcefully included by anyone on the host chain, which finalizes its ordering.

    1. SequencerInbox.sol - Etherscan source code, forceInclusion function
    2. Sequencer Isn’t Doing Its Job - Arbitrum documentation
    Withdrawals

    Regular exit

    The user initiates the withdrawal by submitting a regular transaction on this chain. When the block containing that transaction is finalized the funds become available for withdrawal on L1. The process of block finalization usually takes several days to complete. Finally the user submits an L1 transaction to claim the funds. This transaction requires a merkle proof.

    1. Transaction lifecycle - Arbitrum documentation
    2. L2 to L1 Messages - Arbitrum documentation
    3. Mainnet for everyone - Arbitrum Blog

    Tradeable Bridge Exit

    When a user initiates a regular withdrawal a third party verifying the chain can offer to buy this withdrawal by paying the user on L1. The user will get the funds immediately, however the third party has to wait for the block to be finalized. This is implemented as a first party functionality inside Arbitrum’s token bridge.

    1. Tradeable Bridge Exits - Arbitrum documentation

    Autonomous exit

    Users can (eventually) exit the system by pushing the transaction on L1 and providing the corresponding state root. The only way to prevent such withdrawal is via an upgrade.

    Other considerations

    EVM compatible smart contracts are supported

    Arbitrum One uses Nitro technology that allows running fraud proofs by executing EVM code on top of WASM.

    • Funds can be lost if there are mistakes in the highly complex Nitro and WASM one-step prover implementation.

    1. Inside Arbitrum Nitro
    Permissions

    The system uses the following set of permissioned addresses:

    Central actors allowed to submit transaction batches to L1.

    Validators/Proposers 0xcCE4…6FeA

    They can submit new state roots and challenge state roots. Some of the operators perform their duties through special purpose smart contracts.

    Can execute upgrades via the UpgradeExecutor, potentially stealing all funds.

    ParallelMultisig RollupOwner

    This is a Gnosis Safe with 3 / 5 threshold. Multisig that can execute upgrades via the UpgradeExecutor.

    Those are the participants of the ParallelMultisig.

    Smart contracts
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    The system consists of the following smart contracts on the host chain (Ethereum):

    Router managing token <–> gateway mapping.

    Main contract implementing Arbitrum One Rollup. Manages other Rollup components, list of Stakers and Validators. Entry point for Validators creating new Rollup Nodes (state commits) and Challengers submitting fraud proofs.

    Implementation used in:

    Contract managing Inboxes and Outboxes. It escrows the native token used for gas on the chain. This contract stores the following tokens: ETH.

    Implementation used in:

    Main entry point for the Sequencer submitting transaction batches.

    Implementation used in:

    Entry point for users depositing ETH and sending L1 -> L2 messages.

    Implementation used in:

    Contract that allows L2->L1 calls, i.e. messages initiated on L2 which eventually resolve in execution on L1.

    Implementation used in:

    Contract allowed to upgrade the system.

    Implementation used in:

    Contract that allows challenging invalid state roots. Can be called through the RollupProxy.

    Implementation used in:

    OneStepProofEntry 0x57EA…C221

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    OneStepProverMemory 0x8b73…a22f

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    OneStepProverMath 0x90eC…9F38

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    OneStepProverHostIo 0x17e7…8010

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    OneStepProver0 0x72B1…5a62

    Contract used to perform the last step of a fraud proof.

    Implementation used in:

    Value Locked is calculated based on these smart contracts and tokens:

    Main entry point for users depositing ERC20 tokens. Upon depositing, on L2 a generic, “wrapped” token will be minted.

    Main entry point for users depositing ERC20 tokens that require minting custom token on L2.

    Contract managing Inboxes and Outboxes. It escrows ETH sent to L2.

    Can be upgraded by:

    Upgrade delay: No delay

    Implementation used in:

    Escrow for WETH sent to L2.

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).