Skip to content

Adapters in Centrifuge #794

@BZAghalarov

Description

@BZAghalarov

Hi team!
I’m trying to better understand the adapter logic in the Centrifuge protocol, especially from a security perspective.
I’ve reviewed the official documentation but couldn’t find detailed information on this topic

I would appreciate it if you could answer the following questions to clarify this.

  1. There are currently three implemented adapters in the Centrifuge repository. As I understand, they are (or were during the Sherlock contest) considered in scope. However, in M-7, the bug title suggests that an attacker could deploy a malicious custom adapter, potentially introducing vulnerabilities — and this scenario was also considered in scope. My question is whether custom-made adapters are acceptable in Centrifuge, or if users should use one of the existing adapters.

  2. Could you please mention any test where we really test adapters not mock it? I want to fully understand how message cross-chain with adapter.

If you’re able to share, I would greatly appreciate any resources or documentation the team referenced when integrating the adapters. It would help me better understand the development and security considerations behind the design.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions