The Data Availability Risk Framework

Building upon the original framework outlined in our previous post, the L2BEAT research team has updated the risk categories and their respective scoring methodology, incorporating community feedback.

To provide a clearer analysis, we have divided the risks into two main categories: DA Layer Security and DA Bridge Security. This separation allows for a more focused evaluation of the specific risks and security considerations inherent to each component.

DA Layer Security

1. Economic Security

Economic security measures the level of trust in the majority consensus of the DA layer, quantified by the amount of funds the DA layer committee would need to burn to perform a successful data withholding attack. We have updated this category to distinguish more clearly between cryptoeconomic security and reputational factors, considering the nature and amount of slashable assets.

  • :green_circle: Green
    • Sufficient Slashable Funds: Bribery risk is quantifiable onchain, and the total slashable funds exceed the total value secured.
  • :yellow_circle: Yellow
    • Limited Slashable Funds: Total slashable funds are less than the total value secured, meeting a minimum threshold of 1/3 of the total value secured.
    • Indirect Economic Security through Reputational Risk: If there is no direct economic security in the form of a stake, but the bribery risk is publicly verifiable off-chain (i.e., based on the reputational risk of well-known entities). There are a minimum of 5 external actors as part of the committee.
  • :red_circle: Red
    • Insufficient Slashable Assets: Committee members hold less than 1/3 of the total value secured in slashable assets bonded to the DA layer.
    • Minimal Reputational Deterrent: The committee members are not fully publicly disclosed, reputational risk is insufficient to deter malicious behaviour.

2. Fraud Detection Mechanism

This category assesses how effectively users can protect themselves against a malicious majority of DA validators or committee members. It evaluates the mechanisms in place for detecting data-withholding attacks and invalid erasure-coded data on the DA layer.

  • :green_circle: Green
    • Robust Detection: Data withholding attacks and invalid erasure-coded data can be detected on the DA layer. Data Availability Sampling (DAS) is available with robust block reconstruction for erasure coding fraud proofs (if applicable), and a minimum number of light nodes are present on the network to be able to detect invalid blocks and reconstruct the data collectively.
  • :yellow_circle: Yellow
    • Basic Detection: DAS without robust block reconstruction, no erasure-coding validity proofs, or lacking the minimum number of light nodes on the network to allow full data reconstruction.
  • :red_circle: Red
    • No Detection Mechanism: Lacks any fraud detection mechanism on the DA layer.

DA Bridge Security

1. Committee Security

Committee security evaluates the committee attesting to the DA bridge concerning its size, member diversity, and data availability attestation and retrievability threshold. The scoring follows the Stages framework committee requirements, with adjustments to make it applicable to DA public networks.

  • :green_circle: Green
    • Robust and Diverse Committee: The committee requires that the minimum proportion of honest members (or the network stake) necessary to safely attest to the availability of the data does not exceed 1/3. Entering the operators set is permissionless, subject only to stake requirements and an honest majority of committee members (or a decentralized governance process).
  • :yellow_circle: Yellow
    • Limited Committee Security: The committee requires the minimum proportion of honest members to not exceed 1/3, with a minimum of 5 external actors. The entering or exiting of committee members from the active operators set can be triggered or vetoed by a centralized entity.
  • :red_circle: Red
    • No Committee Security: The committee does not meet essential security requirements due to inadequate size, lack of diversity, or threshold parameters. This is also the case if no effective DA bridge exists, making the system rely on an honest sequencer assumption.

2. Upgradability

This category examines the upgradeability of the DA bridge and its dependencies, focusing on mechanisms that allow users sufficient time to exit in case of an upgrade. It is important to note that the immutability of the DA bridge is a desirable property only when the bridge has achieved the defined level of security. An immutable bridge with no committee security (i.e., scoring Red above) will score Red in this dimension, to emphasize that mutable insecure systems are better than immutable insecure systems due to their ability to improve over time.

  • :green_circle: Green
    • Secure Upgradeability: The bridge should have at least a 30-day delay on upgrades, regardless of who initiates the upgrade. Immediate upgrades from a Security Council should be limited to onchain provable bugs.
  • :yellow_circle: Yellow
    • Moderate Upgradeability Security: The bridge should have at least a 7-day delay on upgrades. Immediate (0-day delay) upgrades are allowed through a decentralized governance process or a properly set up Security Council as defined in the Stages framework.
  • :red_circle: Red
    • Uncontrolled Upgradeability: A smart contract (e.g., multisig) without a timelock or an EOA can upgrade the bridge. Upgrade delay is below 7 days. If no delay exists due to the lack of a DA bridge, the system is insecure as it relies on an honest sequencer assumption.

Note: While user exit cannot be guaranteed (as it also depends on individual L2 designs), the aim is to provide users with enough time to be aware of an upgrade and try to exit the system if they choose. Users should also check the specific exit window of the individual project of interest.


3. Relayer Failure

The relayer is the entity responsible for forwarding DA commitments from the DA layer to the DA bridge on Ethereum. A permissioned relayer poses a liveness risk to the DA bridge if users cannot independently post DA commitments in case of relayer failure or misbehavior.

  • :green_circle: Green
    • Self-propose: Users can self-propose DA commitments permissionlessly if the centralized relayer fails to do so.
  • :yellow_circle: Yellow
    • Governance Rotation: There exists a Security Council or a decentralized governance system able to rotate the permissioned relayer in case of relayer failure or misbehavior. If the system allows a whitelist for relayers, it should comprise at least 5 external actors.
  • :red_circle: Red
    • No Mechanism: The DA bridge halts in case of failure of the permissioned relayer.

FAQ

  1. What assets count towards economic security?

Slashable native assets explicitly bonded by committee members to the DA layer’s social contract on a public network are counted towards economic security. Non-native assets do not count towards economic security unless purposefully created for intersubjective faults, with the possibility for slashing (e.g., through forking) and explicitly bonded to the DA layer’s social contract.

  1. How can a committee satisfy the “public members” requirement?

Committee members must be publicly announced through any public channel available to the project. The full list of entities belonging to the committee should be disclosed with respective public keys or addresses.

  1. Is there a difference between erasure-coding validity proofs and invalidity proofs?

Validity proofs such as KZG polynomial commitments allow sampling light nodes to verify the sample integrity by checking the openings against the commitments with each sample. In a fraud-proof-based scheme, light nodes need to wait for the full length of the fraud-proof window before considering a block finalized. Checking the integrity of the data is usually performed by full nodes, which need to collect sufficient data to attempt block reconstruction and generate erasure-coding fraud proofs should reconstruction fail. Due to this requirement, block reconstruction time in worst-case scenarios (i.e., selective disclosure attacks) being less than the fraud-proof window becomes necessary to achieve a robust fraud detection mechanism.

  1. Are the DA Layer Committee and the DA Bridge Committee always the same?

Typically, the DA layer committee and the DA bridge are the same, but this is not always the case. For example, a DA bridge could receive data availability attestations from Celestia via an external oracle, such as Chainlink CCIP. In this scenario, the DA bridge’s security would be provided by the external oracle committee, while the economic security of the DA layer would remain with the DA layer validators.


2 Likes

Hey Vincenzo, overall this seems like a good update to the framework. The removal of “accessibility” makes sense since only Ethereum itself could be green. Distinguishing between the DA Layer and Bridge mostly makes sense but I have some concerns.

I have a few questions on the following sections.

Economic Security

  • Indirect Economic Security through Reputational Risk: If there is no direct economic security in the form of a stake, but the bribery risk is publicly verifiable off-chain (i.e., based on the reputational risk of well-known entities). There are a minimum of 5 external actors as part of the committee.

Is there a threshold for what constitutes an entity with enough reputation to have meaningful reputational risk if they cheat? This seems hard to define.

Committee security

  • :green_circle: Green
    • Robust and Diverse Committee: The committee requires that the minimum proportion of honest members (or the network stake) necessary to safely attest to the availability of the data does not exceed 1/3. Entering the operators set is permissionless, subject only to stake requirements and an honest majority of committee members (or a decentralized governance process).
  • :yellow_circle: Yellow
    • Limited Committee Security: The committee requires the minimum proportion of honest members to not exceed 1/3, with a minimum of 5 external actors. The entering or exiting of committee members from the active operators set can be triggered or vetoed by a centralized entity.

I understand the 1/3 threshold, but perhaps there should be some other metric that relates to committee size e.g. the number of committee members that would have to collude to attest to unavailable data. In other words, the minimum number of committee members required to reach 2/3 + 1 voting power. Otherwise a 5/7 multisig would be treated the same as a validator set of 100 with even stake distribution. Or am I missing something?

It also seems that this item does not care if the Bridge committee is not the same as the DA layer committee. Isn’t it important they are the same committee? Otherwise the economic security and fraud detection mechanism of the DA layer are irrelevant to the security of the bridge.

Upgradability

  • :green_circle: Green
    • Secure Upgradeability: The bridge should have at least a 30-day delay on upgrades, including upgrades initiated by a DAO. Upgrades from a Security Council should be limited to onchain provable bugs.

What defines a DAO in this framework and why is it important that only a DAO can upgrade the bridge as compared to a Security Council if the delay is as long as 30 days?

How do you define “onchain provable bugs”? Does that mean that in order for the security council to trigger the upgrade mechanism they must prove to the bridge that there’s some flaw in the bridge itself? Does such a mechanism exist? I would imagine that most bugs are not provable onchain.

Relayer Failure

  • :green_circle: Green
    • Self-propose: Users can self-propose DA commitments permissionlessly if the centralized relayer fails to do so.
  • :yellow_circle: Yellow
    • Governance Rotation: There exists a Security Council or a decentralized governance system able to rotate the permissioned relayer in case of relayer failure or misbehavior. If the system allows a whitelist for relayers, it should comprise at least 5 external actors.

So if relaying is permissionless then this would be green? What about fallback mechanisms that allow the bridge to fallback to Ethereum DA if necessary?

Hey Nick, great questions and thanks for your feedback.

Yes indeed we can’t set a threshold for reputation as reputational risk is hard to quantify and it may not correlate with the willingness to act maliciously - there may be members for which no amount is enough to corrupt them. I believe the best we can do is to score it at warning level and explicitly show who the public members are so that the users can decide for themselves.

Multisigs won’t be able to reach the green level as they are not permissionless. A 5/7 would be scored as red as you would need a total of 3 honest members (3/7 > 1/3) that won’t sign an unavailable commitment. To your point a 5/6 meets the 33% threshold and would be scored yellow, but can’t be green as it is not permissionless.

The honest majority of committee members assumption applies to public blockchains that need an honest majority of validators to prevent censorship of the joining validator transaction, other solutions would need a decentralized governance process. I will specify the difference as that last sentence may have been confusing.

This category scores the bridge committee security irrespective of the layer committee, to get the full picture of security, you would consider them in tandem. In my view, the fraud detection mechanism is still relevant as it allows the end-user to independently verify whether the data behind the bridge commitment is available. In a way the economic security of the DA layer would determine the max “weight” of the commitment, and a smaller bridge committee could capture only a subset of it. Smaller bridge committee could be yellow/green depending on their composition, and maybe I’m wrong but I don’t expect green-level committee (e.g., Celestia validators) to attest to the availability of data on another chain (e.g., Avail).

Yes the timelock is what matters, immediate security council upgrades are allowed if related to onchain provable bugs. Added the missing word thanks. And yes you are right an onchain provable bugs seem very unlikely, but it could be the case for example with a zk proof that proves a different root given the same batches (there is an example of it in this Polygon ZkEVM contract).

Yes permissionless relaying would be green. We consider the fallback mechanisms a characteristic of the scaling project (the sequencer determines where to post) not of the DA bridge. We plan to surface the fallback information but we don’t see it impacting the DA framework assessment.

Thanks for answering my questions, Vincenzo. Most things are clear to me now but I have a few remaining questions.

1. Committee Security

  • :green_circle: Green
    • Robust and Diverse Committee: The committee requires that the minimum proportion of honest members (or the network stake) necessary to safely attest to the availability of the data does not exceed 1/3. Entering the operators set is permissionless, subject only to stake requirements and an honest majority of committee members (or a decentralized governance process).

I find the wording of this section a bit confusing. Is it fair to say this is equivalent to “the committee requires that the minimum number of colluding members is greater than 2/3 to attest to unavailable data”?

Aside from that, shouldn’t there be some minimum size of the committee to be green? Even if it’s permissionless to join, you could have a tiny committee of 4/5 that is permissionless to join that gets marked as green. Or you could have a chain with extreme stake weight centralization where it only takes 4 validators to reach 66% stake and attest to unavailable data.

2. Upgradability

  • :green_circle: Green
    • Secure Upgradeability: The bridge should have at least a 30-day delay on upgrades, including upgrades initiated by a DAO. Upgrades from a Security Council should be limited to onchain provable bugs.

I’m still unclear on what counts as a DAO here? And why does it matter if it’s a DAO vs a decentralized multisig that triggers upgrades if the delay is 30 days?

Thanks!

Yes that’s equivalent, and probably clearer :slight_smile: thanks.

There is a minimum of 5 members. Realistically I am not sure how a tiny permissionless committee could work by staying that small as we have no examples of that, but I would expect it to become fairly big pretty quickly. Regarding stake concentration, that makes a lot of sense. It is a parameter we are considering for a future iteration but currently it would not impact any of the existing solutions.

Sorry maybe my answer above was not clear, it doesn’t matter as it’s the timelock that counts. I removed the reference to DAO in the OP to avoid confusion :slight_smile:

Thanks everything makes sense.

In the committee security section, it only mentions a minimum size of the committee in the yellow category not the green one which is why I was confused. You might want to clarify that.

1 Like