Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

V3: All the hooks #2843

Open
5 of 20 tasks
nambrot opened this issue Oct 25, 2023 · 3 comments
Open
5 of 20 tasks

V3: All the hooks #2843

nambrot opened this issue Oct 25, 2023 · 3 comments

Comments

@nambrot
Copy link
Contributor

nambrot commented Oct 25, 2023

V3 introduced IPostDispatch hooks which allow arbitrary post-dispatch logic to be executed.

You can hear more about hooks under https://medium.com/hyperlane/hooking-up-the-chains-introducing-hyperlane-hooks-7986d350b16d

One of the most valuable applications of these hooks is that they complete the Modular Security storyline, they make leveraging any other security model like canonical rollup bridges or external bridges a native experience. This ticket tracks all the hooks that can be created with their corresponding ISMs.

Rollup bridges

  1. bounty hooks medium modular-security
  2. bounty extra-small hooks modular-security
  3. bounty hooks medium modular-security protocol
    aroralanuk
  4. bounty hooks medium modular-security
  5. bounty hooks medium modular-security
  6. bounty hooks medium modular-security
  7. modular-security optimism rollups
    ltyu

External bridges

  1. bounty hooks large modular-security
  2. bounty hooks medium modular-security
  3. bounty hooks medium modular-security
  4. bounty hooks medium modular-security
    ltyu

ZK Light Clients

  1. bounty hooks medium modular-security
    ltyu
  2. bounty hooks medium modular-security
  3. bounty medium modular-security
  4. bounty medium modular-security
  5. bounty hooks medium modular-security

For some of these Hooks/ISMs, the underlying transport layer automatically delivers the message on the destination chain (most rollup bridges L1 to L2). For others, it will require someone running a Hyperlane relayer to collect some off-chain information to pass alongside the message to pass verification on the ISM, like a merkle inclusion proof for L2-L1 rollup bridge transactions or external bridge validator signatures. For these cases, we highly recommend to inherit from CCIP-read ISM https://docs.hyperlane.xyz/docs/protocol/ISM/ccip-read-ISM. It allows the ISM developer to only have to build a simple off-chain service and not require integration and operation of a Hyperlane relayer with that specific ISM in mind. You can see examples of that ISM in the wild either at https://github.com/Accio-labs/permissionless-cctp or https://github.com/AlexBHarley/permissionless-chainlink-feeds/

@jommi9
Copy link

jommi9 commented Oct 27, 2023

Hey, who could I DM on telegram about all this work? We actually worked on some very similar things in the past, and would love to contribute to Hyperlane - possibly working on nearly all of these bounties.

My telegram is @Jommi if needed!

@LucasETrigo
Copy link

Been trying to figure out support on arbitrary Arb Orbit bridges

@nambrot
Copy link
Contributor Author

nambrot commented Jul 23, 2024

@LucasETrigo can you expand on this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: No status
Development

No branches or pull requests

5 participants