Bell Curve cover image

 The Rollapp Stacks | Sovereign Labs, Slush

Bell Curve

00:00

What if You Have a Bridge to a Malicious Smart Contract?

On a system level, you have to stick first to a trusted virtual machine. And then on top of those, you can put any proof inside the EVM. So as most already does this exact same thing and it works extremely well. Users who aren't bridging their tokens onto the malicious chain have no risk from that malicious bridge. As a user, if you bridge to a chain that says like, hey, burn all my funds, yeah, you lost your funds because you talked to a malicious smart contract, that's the same risk you have on theEVM.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app