
Security Guide
Security Guide for DApps CTOs, Lead Developers, and Security Enthusiasts This forthcoming resource cuts straight to the point, delivering practical, effective security strategies without […]
Operators face the risk of losing rewards on the default L2 and also jeopardize
subsequent rewards on the non-default L2.
The AVSGovernance
contract on Layer 1 (L1) can interface with multiple AttestationCenter
contracts located on various Layer 2 (L2) networks. For any cross-chain communication initiated from these L2s that requires confirmation, it is essential to send the confirmation back to the specific AttestationCenter
that originated the communication.
In the current rewards distribution implementation, when an AttestationCenter
on any L2 requests rewards distribution, it awaits confirmation from L1 to complete the process (which includes updating payment status and the fee to claim value).
However, the AVSGovernance
contract on L1 incorrectly routes the confirmation to the AttestationCenter
contract associated with a default L2, identified by the lzEid
variable, regardless of the original request’s source.
The scenario unfolds as follows:
AVSGovernance
contract supporting Arbitrum and Optimism via their respective AttestationCenter
contracts, with Arbitrum designated as the default.feeToClaim
updated on both L2s).AttestationCenter
contract on Optimism sends a rewards distribution request to L1.AVSGovernance
contract on L1 redistributes rewards but mistakenly sends confirmation to the AttestationCenter
contract on Arbitrum.HIGH – Operators face the risk of losing rewards on the default L2 and also jeopardize subsequent rewards on the non-default L2.
The AVSGovernance
contract must be updated to accurately read the lzEid
of the chain that submits the rewards distribution request. This information should then be used to correctly send back the BATCH_CLEAR_SIG
message to the corresponding AttestationCenter
.
Meet Composable Security
Get throughly tested by the creators of Smart Contract Security Verification Standard
Let us help
Get throughly tested by the creators of Smart Contract Security Verification Standard