[Core Protocol] <One quick question about Challenger-node config set-up> #684
-
Did you check the documentation and specs?
Was there anything unclear or missing?
In the provided Devnet setup for the challenger node, the OP_CHALLENGER_UNSAFE_ALLOW_INVALID_PRESTATE: 'true' configuration essentially bypasses the verification of the prestat.. If we use the same setup in the mainnet, could it cause any issues? From what I can see, if this check is disabled, the next proposed output root seems to directly become the anchor state. If the proposer submits a valid output root, there shouldn't be any issues. However, is there any reason I might be overlooking? Did you check for duplicate questions?
Similar Questions or Issues FoundNo response Please select the type of request
Steps to ReproduceNo response Expected vs. Actual BehaviourNo response Software VersionsNo response Operating SystemNo response Hardware ResourcesNo response Configuration Files, Startup Flags & Environment VariablesNo response Error Messages / LogsNo response Feature DescriptionNo response Purpose and BenefitsNo response Relevant Context or ExamplesNo response |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
You need to be using a valid absolute prestate for production networks i.e. Sepolia Testnets and Ethereum Mainnet
The issue is in a permissionless system, anyone can submit an output root. If an invalid root is posted and accepted; an attacker could drain the whole bridge. |
Beta Was this translation helpful? Give feedback.
You need to be using a valid absolute prestate for production networks i.e. Sepolia Testnets and Ethereum Mainnet
The issue is in a permissionless system, anyone can submit an output root. If an invalid root is posted and accepted; an attacker could drain the whole bridge.