Security

North Star's security model is designed for fast finality without sacrificing correctness. It combines three innovations adapted from Cartesiarrow-up-right and Fuel Ignitionarrow-up-right research:

Layer
Mechanism
Reference

1. Dispute Game

O(log n) binary search bisection to isolate a single disputed tx

2. ZK Finality

Single-transaction ZK proof — small, cheap, instant to verify

Novel

3. Accelerated Challenges

Checkpoint Bonds every ~30s, dynamic challenge windows

North Star Security Integrity

Dispute Game (Bisection Protocol)

Adapted from Cartesi's dispute resolutionarrow-up-right. When a challenger disagrees with a posted state hash:

  1. Challenger posts a bond and identifies a checkpoint they dispute

  2. Binary search begins: the L1 contract asks "which half of the execution trace do you disagree with?"

  3. In O(log n) rounds (e.g., 20 rounds for 1M transactions), the protocol isolates the single transaction where disagreement occurred

  4. Only ~20 on-chain interactions required regardless of rollup throughput — dramatically cheaper than replaying the entire trace

ZK Finality

Once the bisection protocol isolates the disputed transaction, a ZK proof is generated for that single SVM instruction:

  • Proof scope: 1 transaction (not the entire batch) — small, fast to generate

  • Verification: Constant-time on-chain verification via a Solana verifier program

  • Outcome: If the sequencer's state transition was incorrect, the proof is cryptographically irrefutable → slash the sequencer's bond, correct the state

Accelerated Challenges (Checkpoint Bonds)

Inspired by Fuel Ignition's researcharrow-up-right on fast-finality optimistic rollups:

  • Sequencers post a Checkpoint Bond every ~30 seconds alongside the state hash

  • Bond amount is calibrated to exceed the maximum extractable value from a single checkpoint window

  • Challenge windows are dynamic — as more validators post checkpoints at higher frequency, the window shrinks. The security assumption: if uncensored validators can submit fraud proofs but do not, the state transitions are valid. Unchallenged checkpoints finalize automatically.

  • Bisection + ZK verification resolves disputes in minutes, not the 7-day window of traditional optimistic rollups

⏱️ Finality timeline: ~30s checkpoint intervals → dynamic challenge window → dispute resolution in minutes via bisection + ZK. Compare: Ethereum optimistic rollupsarrow-up-right = 7 days.

Invariant Enforcement

  • Non-delegated accounts are never writable on the ER — enforced at the SVM runtime level

  • Delegated accounts are locked on L1 — no L1 transaction can modify them until the session closes

  • State hashes are computed only over delegated accounts — deterministic and verifiable

  • Session timeout: if a session exceeds its max duration, the Portal allows forced undelegation

Last updated