You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/ccip/concepts/architecture/offchain/overview.mdx
+1-25Lines changed: 1 addition & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ import { ClickToZoom } from "@components"
17
17
CCIP's offchain architecture includes the following:
18
18
19
19
-**Decentralized Oracle Networks (DONs)**: Running offchain consensus using the Offchain Reporting Protocol (OCR).
20
-
-**Interaction Components**: Managing communication between the CCIP DONs and the RMN.
20
+
-**Interaction Components**: Managing communication between the CCIP DONs.
21
21
22
22
## Components
23
23
@@ -35,30 +35,6 @@ With the CCIP v1.6 architecture, there is a single DON called the Role DON that
35
35
36
36
**Note**: For simplicity, we sometimes refer to the nodes running the Commit OCR Plugin as the Committing DON and those running the Executing OCR Plugin as the Executing DON. However, these are not separate oracle networks; they are subsets of the same Role DON, distinguished solely by their assigned roles.
Let's take an example from the diagram above to understand the key components. The diagram shows a Commit OCR instance configured for a destination chain (Chain C). Key details include:
47
-
48
-
-**Commit Role DON**
49
-
- Represents all participating nodes.
50
-
- Within the Role DON, a specific group of nodes—sometimes called a "sub-committee"—may be assigned chain-specific roles.
51
-
52
-
-**Chain-Specific Roles** (as illustrated)
53
-
-**Green Rectangle**: Nodes observe Chain A (i.e., they read from Chain A).
54
-
-**Orange Rectangle**: Nodes observe Chain B.
55
-
-**Blue Rectangle**: Nodes write commit reports to Chain C.
56
-
-**Overlap**: Note that groups may overlap. For example, the four nodes in the bottom-left corner of the Role DON might not connect to Chain A or Chain C, demonstrating flexibility in node participation.
57
-
-**Interaction with RMN**: The Commit OCR interacts with RMN nodes to receive RMN blessings. These blessings act as independent attestations of the validity of source chain observations and are used to form a consolidated set of merkle roots.
58
-
-**Configuration and Role Validation**:
59
-
- Node roles are configured on the Home Chain (i.e., Ethereum) through specific contracts.
60
-
- The node software reads from the **CCIP Home** and **RMN Home** contracts to verify that each node is authorized for its role—whether for making observations or providing RMN blessings.
61
-
62
38
## High Level Flow
63
39
64
40
Below are the high-level steps for the Commit OCR process and the Executing OCR process.
Copy file name to clipboardExpand all lines: src/content/ccip/concepts/cross-chain-token/overview.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ Token developers retain complete ownership of their token contracts, token pools
46
46
47
47
#### Defense-in-Depth Security
48
48
49
-
The CCT standard leverages Chainlink's industry-standard oracle networks, which secure over $16 trillion in Total Value Enabled (TVE). This strong foundation is further enhanced by additional layers of protection, such as the Risk Management Network and configurable transfer rate limits, providing comprehensive security for cross-chain operations.
49
+
The CCT standard leverages Chainlink's industry-standard oracle networks, which secure over $16 trillion in Total Value Enabled (TVE). This strong foundation is further enhanced by additional layers of protection, such as configurable transfer rate limits, providing comprehensive security for cross-chain operations.
Copy file name to clipboardExpand all lines: src/content/ccip/index.mdx
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,8 +38,10 @@ Given the [inherent risks of cross-chain interoperability](/resources/bridge-ris
38
38
39
39
CCIP provides several key security benefits:
40
40
41
-
- Multiple independent nodes run by independent key holders.
42
-
- Two decentralized networks all executing and verifying every cross-chain transaction.
41
+
-**Proven Decentralized Architecture**: CCIP uses multiple decentralized oracle networks (DONs) to validate each cross-chain transaction, leveraging the same time-tested infrastructure powering Chainlink Data Feeds which have been used by hundreds of DeFi applications to enable $26T in transaction value over a period of nearly 6 years of in-production operation.
42
+
-**Rate Limiting**: CCIP offers a rate limiting feature that enables owners to establish and configure rate limiting policies for Cross-Chain Tokens, which are enforced at both the source and destination chains. This provides an enterprise-grade security feature to ensure operational continuity and limit blast radius in failure scenarios.
43
+
-**Timelocked Upgrades**: All onchain security-critical configuration changes and upgrades to core CCIP infrastructure must pass through a Role-based Access Control Timelock contract, where CCIP node operators can veto the upgrade during the review period or explicitly approve the upgrade during time-sensitive circumstances.
44
+
-**High-Quality, Sybil-Resistant Node Operators**: CCIP uses the same globally distributed, security-reviewed, public node operators that secure other services on the Chainlink platform, as well as validate leading blockchain networks and operate traditional Web2 telecommunication infrastructure. Each independent node in CCIP is run by an independent organization who have extensive DevOps expertise and robust security practices around private key management.
43
45
44
46
<ClickToZoom
45
47
src="/images/ccip/ccip-hl-v1.7.png"
@@ -73,11 +75,11 @@ For example, a user could transfer tokens to a lending protocol with instruction
73
75
74
76
With CCIP, you send transactions with data (arbitrary messaging), tokens, or both data and tokens (programmable token transfer). The receiver of a CCIP transaction varies by blockchain family:
75
77
76
-
| CCIP capability | What is sent | Receiving account types |
| Arbitrary Messaging | Data | EVM: Smart contracts only<br />SVM: Programs only<br />Aptos: Modules only |
81
+
| Token Transfer | Tokens | EVM: Smart contracts and EOAs<br />SVM: User wallets or program-controlled PDAs<br />Aptos: User accounts or modules deployed to resource accounts|
82
+
| Programmable Token Transfer | Data and tokens | EVM: Smart contracts only<br />SVM: Data to programs, tokens to program-controlled PDAs<br />Aptos: Modules deployed to resource accounts |
81
83
82
84
**Note**: On EVM chains, EOAs cannot receive messages. On Solana (SVM), programs work with Program Derived Addresses (PDAs) to manage token reception.
0 commit comments