-
Notifications
You must be signed in to change notification settings - Fork 21
Description
Hi team!
I’m trying to better understand the adapter logic in the Centrifuge protocol, especially from a security perspective.
I’ve reviewed the official documentation but couldn’t find detailed information on this topic
I would appreciate it if you could answer the following questions to clarify this.
-
There are currently three implemented adapters in the Centrifuge repository. As I understand, they are (or were during the Sherlock contest) considered in scope. However, in M-7, the bug title suggests that an attacker could deploy a malicious custom adapter, potentially introducing vulnerabilities — and this scenario was also considered in scope. My question is whether custom-made adapters are acceptable in Centrifuge, or if users should use one of the existing adapters.
-
Could you please mention any test where we really test adapters not mock it? I want to fully understand how message cross-chain with adapter.
If you’re able to share, I would greatly appreciate any resources or documentation the team referenced when integrating the adapters. It would help me better understand the development and security considerations behind the design.