You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One of the most valuable applications of these hooks is that they complete the Modular Security storyline, they make leveraging any other security model like canonical rollup bridges or external bridges a native experience. This ticket tracks all the hooks that can be created with their corresponding ISMs.
The content you are editing has changed. Please copy your edits and refresh the page.
For some of these Hooks/ISMs, the underlying transport layer automatically delivers the message on the destination chain (most rollup bridges L1 to L2). For others, it will require someone running a Hyperlane relayer to collect some off-chain information to pass alongside the message to pass verification on the ISM, like a merkle inclusion proof for L2-L1 rollup bridge transactions or external bridge validator signatures. For these cases, we highly recommend to inherit from CCIP-read ISM https://docs.hyperlane.xyz/docs/protocol/ISM/ccip-read-ISM. It allows the ISM developer to only have to build a simple off-chain service and not require integration and operation of a Hyperlane relayer with that specific ISM in mind. You can see examples of that ISM in the wild either at https://github.com/Accio-labs/permissionless-cctp or https://github.com/AlexBHarley/permissionless-chainlink-feeds/
The text was updated successfully, but these errors were encountered:
Hey, who could I DM on telegram about all this work? We actually worked on some very similar things in the past, and would love to contribute to Hyperlane - possibly working on nearly all of these bounties.
V3 introduced
IPostDispatch
hooks which allow arbitrary post-dispatch logic to be executed.You can hear more about hooks under https://medium.com/hyperlane/hooking-up-the-chains-introducing-hyperlane-hooks-7986d350b16d
One of the most valuable applications of these hooks is that they complete the Modular Security storyline, they make leveraging any other security model like canonical rollup bridges or external bridges a native experience. This ticket tracks all the hooks that can be created with their corresponding ISMs.
Rollup bridges
External bridges
ZK Light Clients
For some of these Hooks/ISMs, the underlying transport layer automatically delivers the message on the destination chain (most rollup bridges L1 to L2). For others, it will require someone running a Hyperlane relayer to collect some off-chain information to pass alongside the message to pass verification on the ISM, like a merkle inclusion proof for L2-L1 rollup bridge transactions or external bridge validator signatures. For these cases, we highly recommend to inherit from CCIP-read ISM https://docs.hyperlane.xyz/docs/protocol/ISM/ccip-read-ISM. It allows the ISM developer to only have to build a simple off-chain service and not require integration and operation of a Hyperlane relayer with that specific ISM in mind. You can see examples of that ISM in the wild either at https://github.com/Accio-labs/permissionless-cctp or https://github.com/AlexBHarley/permissionless-chainlink-feeds/
The text was updated successfully, but these errors were encountered: