<aside> đź’ˇ Assessment conclusion

The analysis of Wormhole concluded it satisfies the requirements of the Uniswap DAO's cross-chain governance use case as outlined in the assessment framework above. The set of validators includes many reputable entities, and both the number of validators and security thresholds are set at satisfactory levels.

Moreover, the implementation of the protocol and operational security practices are well considered, with significant improvements to their DevSecOps practices and incident response procedures since its exploit incident that occurred in February 2022.

The Committee has identified some areas of improvement and recommends periodical monitoring of any material changes that may affect the protocol’s security profile.

</aside>

Architectural Considerations

Technical Summary

Wormhole is a general-purpose cross-chain messaging protocol that includes a token bridge for asset transfers. The protocol relies on an external validator set for security and employs a Proof-of-Authority validation model. The security of the protocol depends on the trustworthiness of the members of the validator set. The protocol assumes that validators are reputable businesses who will behave honestly and adhere to the protocol to maintain their reputation. Additionally, the protocol assumes that stakeholders can pursue legal action in the event of malicious behaviour, as validators are known legal entities.

Wormhole's validator set is composed of 19 validators, each operated by a distinct legal entity. Most of these entities are established and reputable businesses that operate core blockchain infrastructure as part of their primary business. Each validator operates a full node for every network to which Wormhole links.

Validators observe cross-chain messages originating from a source, sign them, and then gossip their signed messages over a peer-to-peer network. The validator network provides API endpoints, which anyone can use to query for signed messages and submit them to the destination chain.

A cross-chain message is considered valid on the destination chain only if it has at least 2/3 of the validators’ signatures. This means that if 13 validators collude or are compromised, the safety of the protocol can be compromised, and invalid messages could be sent across the bridge. Similarly, if more than 1/3 of validators (i.e., 7 validators) are offline, the protocol's liveness is impacted. The same number of validators can also choose to censor messages. The protocol offers a good level of public accountability and auditability regarding the actions of validators, making attributing faults to specific validators possible.

Risks and Concerns

Implementation Considerations

Technical Summary

The Committee carefully reviewed the implementation of the protocol, which included smart contracts for EVM chains and validator code. The implementation appears to be sound and in alignment with the protocol's specification and technical documentation. The internal design of the components appears to be well thought out and in accordance with best practices. Overall, the observations are indicative of a mature codebase. Other observations of the protocol's implementation include: