Router Protocol Announces the Integration of Arbitrum and Optimism

What makes Optimism and Arbitrum Integrations special?

Optimism

Arbitrum

Difference between the two

Router’s Feature Developments

  • Mesh Network: Router Protocol is building a mesh network to connect siloed blockchain networks. Compared to the existing deployments of 1-to-1 bridges that function as dedicated links between two chains, a mesh network is much more extensible. With only a few lines of configuration, we can add any chain‌ to the Router infrastructure.
  • Settlement Engine: Router Protocol ensures no blocking for user funds and guarantees settlements of all transactions with its cross-chain settlement engine. Even in rare cases where Router is not able to provide users with the desired asset on the destination chain, it will provide them with an equivalent amount of USDC or RUSDC (that can be redeemed 1:1 for USDC).
  • AMM Fallback: To allow cross-chain asset transfers without creating any fragmentation, Router Protocol uses Dfyn AMM as a fallback reserve. Router can plug into any AMM or DEX, but it is optimized to work with their in-house DEX, Dfyn Exchange, to ensure the finality of a transaction.

Router’s Latest Efforts to Secure the Network

  1. Router Protocol uses on-chain validation as opposed to the off-chain validation mechanism being used by a lot of cross-chain bridges. Currently, Router Protocol is running three validators and two votes are required for the transaction to go through. Now that we have solved for the scalability and security side of things, we are in the process of adding more validators to ensure that we remain sufficiently decentralized.
  2. Router Protocol’s smart contract architecture is modular and we have different contracts for maintaining liquidity reserve, capturing fees, achieving a voting quorum, etc. as opposed to having a monolith architecture with a single contract handling everything.
  3. Router executes transactions on a stateless execution pallet that can avoid direct interaction with the bridge reserves. Keeping the reserves isolated from the execution environment will prevent any malicious entities from accessing the reserve funds. The isolated execution pallet provides a dedicated smart contract compiler, interpreter, executor, and other related components for other developers to run their code on. Since the pallet executes the call data on a stateless handler contract, the function calls are completely tamper-proof.
  4. By employing a dedicated proxy architecture, Router retains the option to update the contract in case of any contract vulnerability/bug. The latest proxy standard followed by Router makes it easier for the developers to deploy and maintain the proxy and logic contracts and also facilitates greater transparency by standardizing the methods for verifying the bytecode used by the proxy contract.
  5. Router has already completed security audits from Certik and Halborn, and is currently undergoing a third audit from Hacken. Since the security of cross-chain projects has been under scrutiny as a result of recent hacks, it was prudent to get multiple audits to cover all our bases and to ensure the highest security standards for the community.
  6. Router’s security testing is not limited to a few audit firms, but with our bug bounty program in collaboration with Immunefi, we have opened our code to be tested by an entire community of whitehat hackers, all of whom are eyeing bounties that go as high as $200,000.

About Router Protocol

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store