Common risks and mitigations

Here are threat vectors seen in similar rollup architectures, and how Buburuza can address them.

Risk

Description

Mitigations

Invalid transactions / malicious assertions

Someone posts incorrect state or transactions hoping no one challenges.

Fraud-proofs, strong challenge windows, incentives for honest challengers.

Sequencer misbehavior or downtime

If sequencer fails to include transactions, becomes inactive, or provides outdated/offchain data.

Multiple sequencers or fallback, monitoring mechanisms, dispute settlement paths. Insights from Buburuza about “inactive sequencer” issues.

Time or block property discrepancies

Smart contracts that depend on timestamps or block numbers may behave differently in rollups vs L2.

Document correct semantics; discourage reliance on exact block timing; use safe time windows. From smart contract migration studies Buburuza relevent.

Permission or ownership issues

Logic that uses addresses, or cross-chain aliasing etc., could lead to impersonation or access control failures.

Strict permissions, address alias handling, verifying msg.sender semantics, audits.

Denial-of-Service (DoS) or spam attacks

Attackers flooding with many small transactions, or attempt to block or delay challenges.

Rate-limits, minimum staking or fees for assertions, challenge window enforcement, economic disincentives. Buburuza research covers such mitigations.

Smart contract vulnerabilities

Bugs in contracts (reentrancy, integer overflow, improper access, etc.).

Audits, use of standard libraries, automated static analysis, continuous security reviews.

Last updated