FAQs
FAQs
General
Is there a token for Sygma?
There are no plans for a Sygma token. Please be aware of scams and impersonators that suggest otherwise.Where can I find help if I have further questions?
You can join the Sygma Discord and ask in any support-related channels. Sygma engineers are generally very responsive to technical queries, and someone will usually be on-call to answer more general questions.Do you have any live integrations?
Sygma is live on Phala's SubBridge, allowing native token transfers between Ethereum's Mainnet and Phala/Khala. Additionally, with Polkadot's capability for Cross-Consensus Messaging (XCM) between parachains, users can bridge in and out of Astar Network.Sygma is also currently being used as a proof-of-concept for the Holesky Validator Launchpad. This dApp enables quick testing of an Ethereum validator setup on the Holesky testnet. A small deposit of testnet ether (3.3 testnet eth) from other testnets (e.g. Sepolia, Amoy, Moonbeam Alpha) can be bridged and exchanged for 32 holeskyETH.
Sygma is also the current backend integration for a proof-of-concept dApp called
multichain-deploy
. This dApp allows testnet developers to deploy to the same contract addresses across multiple blockchains while paying only source chain gas and fees. There is a Hardhat implementation and a Foundry implementation.How can I make contributions to Sygma?
You can submit an application to Sygma's Contributor Program or Builder Program for medium-to-large effort contributions.
Sygma is eager for developers to jump into the GitHub and help test the code and submit issues.
Sygma invites engaged participants with high initiative to begin making smaller contributions, whether that's to the Discord, to the documentation or by creating content. Make sure to check out the Contribute page for contributions related to Sygma's documentation.
General Support
Is my ecosystem/blockchain/token supported?
Sygma is currently built to support EVM and Substrate-based chains. The Solidity contracts and custom-built pallets can be adapted to most ecosystems built in these environments, whether that's mainnet Ethereum, an EVM L2, a Polkadot/Kusama parachain, or a standalone Substrate chain.If your ecosystem/blockchain/token is not supported (e.g. Tendermint), support could be provided in the near-future. It depends on engineering resources and network demand. If you would like to move ahead with an engineering/product consultation, please contact Sygma on Discord or fill out this form.
Can I add my own networks/tokens?
The addition of new networks and tokens to the Sygma protocol is currently a permissioned process that must go through the Sygma team. Engineering is already well underway to enable permissionless additions of networks and tokens by the end of 2023. For further inquiries, please contact Sygma on Discord or fill out this form.Can you build an integration for my project?
It depends. Please take a look at the documentation for Adding A New Token and Adding A New Network. When you are ready, please contact Sygma on Discord or fill out this form.
Protocol
Is the Sygma protocol decentralized?
As with all projects in the crypto space, there will always be some trust assumptions. It is important to understand where these trust assumptions may fall. Research and engineering is underway to enable a decentralized and trust-minimized Sygma bridging protocol, which includes governance of the respective governance controls.Under secure multi-party computation, the Sygma protocol uses a distributed set of offchain relayers operating under a trusted federation model. Adding a proper incentivization model as well as permissionless relay is on the roadmap for MPC relay.
Under Spectre verification, in theory, anyone can submit step, rotation, and inclusion proofs. However, should a Spectre relayer go down, it could temporarily affect liveness.
Who are the relayers and what do they do?
You can find a list of Sygma's current relaying partners in Becoming A Relayer Partner.The Sygma protocol relies on a network of trusted offchain operators that listen for events on a source chain, parse these events, and following the selected verification mechanism (either MPC, Spectre, or Zipline relay), either perform attestations of events or submit zero-knowledge proofs. These are then posted to the destination chain bridge contract.
Can I become a relayer for Sygma? Sygma is currently looking for credible entities that can meet the acceptance criteria for becoming a relayer. Please see Becoming A Relayer Partner for more information.
What happens when a relayer entity drops off? Under MPC, this would be handled by Sygma's "key reshare" sub-protocol. The "Key Reshare" mechanism allows parties from the old set to rotate key shares with new participants without changing the underlying public/private key. This is useful for onboarding new members into the signing committee, recalibrating threshold requirements, and more importantly preventing hackers from corrupting parties one after another, potentially in the course of many sessions (known as proactive adversaries).
What are the mechanisms for token bridging? Are bridged tokens wrapped or synthetic assets?
Depending on the integration of the specific token route, bridged tokens can follow either a lock/release (1:1 backed, wrapped asset) mechanism or a burn/mint (pegged synthetic asset) mechanism.How is Sygma currently secured? Sygma interoperability is secured by 3 different verification mechanisms.
Under MPC, threshold signature schemes (TSS) are used to strengthen security and communication within the relayer network.
Under Spectre, the protocol is secured by cryptographic proofs. Rotation proofs are submitted to follow consensus of the Altair light client protocol and the rotation of the sync committees every 27 hours. Upon detection of a cross-chain event, a step proof is submitted to prove the state root/block header. A final inclusion proof of the finalized source chain block is submitted. If and only if these conditions are satisfied would an execution of a cross-chain interaction be posted to the destination chain.
For Zipline security, you can read more in Introducing Zipline Casper.
Widget
- Why do I need two token approvals to confirm a transaction?
When initiating a cross-chain transaction using the Sygma widget on EVM-compatible chains, you will encounter two separate prompts for token approvals, followed by a final confirmation request for the transfer. The reason for the two approvals is due to how the Sygma protocol orchestrates fee management and bridging operations across different sets of smart contracts. A deeper look into the two approvals:
- Fee Approval: The first approval is directed towards a set of smart contracts that manages fee calculations. This approval grants the fee handling contracts permission to spend up to the necessary amount of fee tokens, which represents the service charge for executing the cross-chain operation. The user does not have to specify the fee amount as the interface will automatically calculate this. The user only needs to approve the specified amount.
- Bridging Transaction Approval: The second approval is directed towards the bridging smart contract, which oversees the cross-chain transfer of tokens. This approval grants this contract permission to spend (and transfer) up to the specified amount of the given token, less previously calculated fees. Similar to the fee approval, the interface will automatically calculate the amount that needs to be approved for the net token amount to be transferred. The user only needs to approve the specified amount.
Following the two approvals, the user will need to finalize the cross-chain transaction by clicking on “Transfer” within the Sygma widget interface.
This two-step approval process ensures 1) appropriate fees are calculated and 2) on the correct amount of tokens to be transferred during a cross-chain execution. You can read more about token approvals and their role in web3 here and here. As token allowances may represent a potential attack vector for improperly secured smart contracts, it is recommended to periodically practice good token hygiene by revoking permissions.