Skip to main content

Multibridge Version 3.1

The breaking change completely removes the major bottleneck without compromising security - the native contract whitelisting.

Most attacks involve smart contracts due to the nature of the blockchain environment. In the previous versions of the bridge, we meticulously scanned the original contract before allowing the bridge contract to interact with it.

In version 3.1, this is no longer required. We deploy an intermediary contract for holding the locked tokens and releasing them in case someone returns them to the original chain.

Fully supported chains

When writing this document, ten chains are integrated with complete v3.1 support. They are:

#IconBlockchainBridge chain IDProtocol
1BSC4EVM
2Ethereum5EVM
3Avalanche6EVM
4Polygon7EVM
5Fantom8EVM
6Gnosis14EVM
7Fuse16EVM
8Velas19EVM
9IoTeX20EVM
10Aurora21EVM
11Godwoken22EVM
12GateChain23EVM
13Solana25Solana
14NEAR31NEAR
15Moonbeam32EVM
16ABEYCHAIN33EVM
17Caduceus35EVM
18Arbitrum (Nova)37EVM

Before the change

Before we removed the limitations, the NFTs whose contracts had not been manually whitelisted by the team members we visible in the bridge UI; however, the bridge contract and the bridge UI would refuse interaction with an untrusted contract to prevent potential attempts of the bridge contract attacks. The warning "NFT is not Whitelisted" can still be encountered on chains where version 3.1 of the bridge has not been implemented yet, for example, Tron. Once all chain support is upgraded to version 3.1, no such bottlenecks will prevent users from free token transfers without compromising the users' or the bridge's security.

Whitelisting limitations

A shot video introduction to v3.1