Skip to content

Commit def4f9d

Browse files
committed
final
1 parent f871f61 commit def4f9d

File tree

6 files changed

+12
-114
lines changed

6 files changed

+12
-114
lines changed

src/config/sidebar/ccip-dynamic.ts

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -179,14 +179,8 @@ export const CCIP_SIDEBAR_CONTENT: SectionEntry[] = [
179179
},
180180
{
181181
title: "Offchain Architecture",
182-
url: "ccip/concepts/architecture/offchain",
182+
url: "ccip/concepts/architecture/offchain/overview",
183183
// Universal
184-
children: [
185-
{
186-
title: "Overview",
187-
url: "ccip/concepts/architecture/offchain/overview",
188-
},
189-
],
190184
},
191185
{
192186
title: "Cross-Chain Token (CCT)",

src/content/ccip/concepts/architecture/offchain/index.mdx

Lines changed: 0 additions & 16 deletions
This file was deleted.

src/content/ccip/concepts/architecture/offchain/overview.mdx

Lines changed: 1 addition & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ import { ClickToZoom } from "@components"
1717
CCIP's offchain architecture includes the following:
1818

1919
- **Decentralized Oracle Networks (DONs)**: Running offchain consensus using the Offchain Reporting Protocol (OCR).
20-
- **Interaction Components**: Managing communication between the CCIP DONs and the RMN.
20+
- **Interaction Components**: Managing communication between the CCIP DONs.
2121

2222
## Components
2323

@@ -35,30 +35,6 @@ With the CCIP v1.6 architecture, there is a single DON called the Role DON that
3535

3636
**Note**: For simplicity, we sometimes refer to the nodes running the Commit OCR Plugin as the Committing DON and those running the Executing OCR Plugin as the Executing DON. However, these are not separate oracle networks; they are subsets of the same Role DON, distinguished solely by their assigned roles.
3737

38-
## Role DON: Diagram and Explanation
39-
40-
<ClickToZoom
41-
src="/images/ccip/ccip-hl-v1.7.png"
42-
alt="CCIP Offchain Architecture"
43-
style="display: block; margin: 2rem auto; max-height: 60vh; width: auto;"
44-
/>
45-
46-
Let's take an example from the diagram above to understand the key components. The diagram shows a Commit OCR instance configured for a destination chain (Chain C). Key details include:
47-
48-
- **Commit Role DON**
49-
- Represents all participating nodes.
50-
- Within the Role DON, a specific group of nodes—sometimes called a "sub-committee"—may be assigned chain-specific roles.
51-
52-
- **Chain-Specific Roles** (as illustrated)
53-
- **Green Rectangle**: Nodes observe Chain A (i.e., they read from Chain A).
54-
- **Orange Rectangle**: Nodes observe Chain B.
55-
- **Blue Rectangle**: Nodes write commit reports to Chain C.
56-
- **Overlap**: Note that groups may overlap. For example, the four nodes in the bottom-left corner of the Role DON might not connect to Chain A or Chain C, demonstrating flexibility in node participation.
57-
- **Interaction with RMN**: The Commit OCR interacts with RMN nodes to receive RMN blessings. These blessings act as independent attestations of the validity of source chain observations and are used to form a consolidated set of merkle roots.
58-
- **Configuration and Role Validation**:
59-
- Node roles are configured on the Home Chain (i.e., Ethereum) through specific contracts.
60-
- The node software reads from the **CCIP Home** and **RMN Home** contracts to verify that each node is authorized for its role—whether for making observations or providing RMN blessings.
61-
6238
## High Level Flow
6339

6440
Below are the high-level steps for the Commit OCR process and the Executing OCR process.

src/content/ccip/concepts/architecture/offchain/risk-management-network.mdx

Lines changed: 0 additions & 58 deletions
This file was deleted.

src/content/ccip/concepts/cross-chain-token/overview.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Token developers retain complete ownership of their token contracts, token pools
4646

4747
#### Defense-in-Depth Security
4848

49-
The CCT standard leverages Chainlink's industry-standard oracle networks, which secure over $16 trillion in Total Value Enabled (TVE). This strong foundation is further enhanced by additional layers of protection, such as the Risk Management Network and configurable transfer rate limits, providing comprehensive security for cross-chain operations.
49+
The CCT standard leverages Chainlink's industry-standard oracle networks, which secure over $16 trillion in Total Value Enabled (TVE). This strong foundation is further enhanced by additional layers of protection, such as configurable transfer rate limits, providing comprehensive security for cross-chain operations.
5050

5151
#### Programmable Token Transfers
5252

src/content/ccip/index.mdx

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,10 @@ Given the [inherent risks of cross-chain interoperability](/resources/bridge-ris
3838

3939
CCIP provides several key security benefits:
4040

41-
- Multiple independent nodes run by independent key holders.
42-
- Two decentralized networks all executing and verifying every cross-chain transaction.
41+
- **Proven Decentralized Architecture**: CCIP uses multiple decentralized oracle networks (DONs) to validate each cross-chain transaction, leveraging the same time-tested infrastructure powering Chainlink Data Feeds which have been used by hundreds of DeFi applications to enable $26T in transaction value over a period of nearly 6 years of in-production operation.
42+
- **Rate Limiting**: CCIP offers a rate limiting feature that enables owners to establish and configure rate limiting policies for Cross-Chain Tokens, which are enforced at both the source and destination chains. This provides an enterprise-grade security feature to ensure operational continuity and limit blast radius in failure scenarios.
43+
- **Timelocked Upgrades**: All onchain security-critical configuration changes and upgrades to core CCIP infrastructure must pass through a Role-based Access Control Timelock contract, where CCIP node operators can veto the upgrade during the review period or explicitly approve the upgrade during time-sensitive circumstances.
44+
- **High-Quality, Sybil-Resistant Node Operators**: CCIP uses the same globally distributed, security-reviewed, public node operators that secure other services on the Chainlink platform, as well as validate leading blockchain networks and operate traditional Web2 telecommunication infrastructure. Each independent node in CCIP is run by an independent organization who have extensive DevOps expertise and robust security practices around private key management.
4345

4446
<ClickToZoom
4547
src="/images/ccip/ccip-hl-v1.7.png"
@@ -73,11 +75,11 @@ For example, a user could transfer tokens to a lending protocol with instruction
7375

7476
With CCIP, you send transactions with data (arbitrary messaging), tokens, or both data and tokens (programmable token transfer). The receiver of a CCIP transaction varies by blockchain family:
7577

76-
| CCIP capability | What is sent | Receiving account types |
77-
| --------------------------- | --------------- | --------------------------------------------------------------------------------------- |
78-
| Arbitrary Messaging | Data | EVM: Smart contracts only<br />SVM: Programs only |
79-
| Token Transfer | Tokens | EVM: Smart contracts and EOAs<br />SVM: User wallets or program-controlled PDAs |
80-
| Programmable Token Transfer | Data and tokens | EVM: Smart contracts only<br />SVM: Data to programs, tokens to program-controlled PDAs |
78+
| CCIP capability | What is sent | Receiving account types |
79+
| --------------------------- | --------------- | -------------------------------------------------------------------------------------------------------------------------------------------------- |
80+
| Arbitrary Messaging | Data | EVM: Smart contracts only<br />SVM: Programs only<br />Aptos: Modules only |
81+
| Token Transfer | Tokens | EVM: Smart contracts and EOAs<br />SVM: User wallets or program-controlled PDAs<br />Aptos: User accounts or modules deployed to resource accounts |
82+
| Programmable Token Transfer | Data and tokens | EVM: Smart contracts only<br />SVM: Data to programs, tokens to program-controlled PDAs<br />Aptos: Modules deployed to resource accounts |
8183

8284
**Note**: On EVM chains, EOAs cannot receive messages. On Solana (SVM), programs work with Program Derived Addresses (PDAs) to manage token reception.
8385

0 commit comments

Comments
 (0)