Security Model and Verification
Last updated
Last updated
The Across plus the provide the fundamental rules of the Across Protocol. The ACROSS-V2
price in and extended by precisely define the constraints and rules of the system. Actors in the system (relayer, dataworker) must behave in accordance to these rules. The system is secured by optimistic verification of relayer repayments and rebalance instructions by , requiring only a single honest actor to dispute invalid proposals to keep the system secure.
Please refer to and for detailed information about system architecture, security model and verificaiton.