This repository has been archived by the owner on Jan 24, 2024. It is now read-only.
Backup if users mistakenly send ETH/tokens to system contract addresses #229
Unanswered
protolambda
asked this question in
Design Decisions
Replies: 1 comment
-
I think maybe this is more of an implementation concern. We could just keep the terminology "address" and add a comment to the effect that the address could reference an EOA/contract controlled by the team if they want to support token rescue, and not otherwise. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
If a user transfers ETH or a token, then the funds may be lost forever if we do not prepare system contracts.
However, it may be better to not deploy code if we cannot support such rescue missions.
For the deposit-rollup phase we do not run it in production, so users are not affected.
In the future, we may want to secure:
Also, a common mistake is to sign and submit a transaction for the wrong network. Addresses that we use in production, or in open testnets, should be secured in both L1 and L2. Another mistake is locking up NFTs and such in fungible-only bridges.
We may also just adopt the current optimism approach once this specification gets closer to a production deployment, or collect feedback based on that.
Beta Was this translation helpful? Give feedback.
All reactions