Search

Search for projects by name or address

Taiko Alethia logo
Taiko Alethia

Badges

About

Taiko Alethia is an Ethereum-equivalent rollup on the Ethereum network. Taiko aims at combining based sequencing and a multi-proof system through SP1, RISC0 and TEEs.


  • Total Value SecuredTVS
    $21.37 M5.25%
  • Past day UOPSDaily UOPS
    0.6115.1%
  • Gas token
    ETH
  • Type
    Other

  • Purpose
    Universal
  • Chain ID
    167000

  • Tokens breakdown

    Sequencer failureState validationData availabilityExit windowProposer failure

    Badges

    About

    Taiko Alethia is an Ethereum-equivalent rollup on the Ethereum network. Taiko aims at combining based sequencing and a multi-proof system through SP1, RISC0 and TEEs.

    Why is the project listed in others?

    The proof system isn't fully functional

    Consequence: projects without a proper proof system fully rely on single entities to safely update the state. A malicious proposer can finalize an invalid state, which can cause loss of funds.

    Learn more about the recategorisation here.


    Total
    Canonically BridgedCanonically Bridged ValueCanonical
    Natively MintedNatively Minted TokensNative
    Externally BridgedExternally Bridged ValueExternal

    ETH & derivatives
    Stablecoins
    BTC & derivatives
    Other

    2025 Apr 10 — 2026 Apr 10

    Past Day UOPS
    0.61
    Past Day Ops count
    52.64 K
    Max. UOPS
    57.89
    2024 Nov 04
    Past day UOPS/TPS Ratio
    1.00

    The section shows the operating costs that L2s pay to Ethereum.


    2025 Apr 10 — 2026 Apr 10


    Total cost
    $721.84 K
    Avg cost per L2 UOP
    $0.003458
    Avg cost per day
    $2.16 K

    This section shows how much data the project publishes to its data-availability (DA) layer over time. The project currently posts data toEthereumEthereum.


    2026 Apr 02 — 10


    Data posted
    237.75 MiB
    Avg size per day
    23.77 MiB
    Avg size per L2 UOP
    554.65 B

    This section shows how "live" the project's operators are by displaying how frequently they submit transactions of the selected type. It also highlights anomalies - significant deviations from their typical schedule.

    No ongoing anomalies detected

    Avg. tx data subs. interval
    Avg. state updates interval
    Past 30 days anomalies
    100% normal uptime

    Preconfs introduction

    2025 Aug 11th

    Taiko implements preconfs - whitelisted actors provide fast soft confirmations for L2 txs.

    Learn more

    Plonky3 vulnerability patch

    2025 Jun 4th

    SP1 verifier is patched to fix critical vulnerability in Plonky3 proof system (SP1 dependency).

    Learn more
    Sequencer failureState validationData availabilityExit windowProposer failure
    Sequencer failure
    Self sequence

    In the event of a sequencer failure, users can force transactions to be included in the project’s chain by sending them to L1. There can be up to a 1d 1h delay on this operation.

    State validation
    Multi-proofs

    A multi-proof system is used. There are four verifiers available: SGX (Geth), SGX (Reth), SP1 and RISC0. Two of them must be used to prove a proposal range, and SGX (Geth) is mandatory. The end state root is supplied during the prove call and is checked against the accompanying SGX/zkVM proof. Proving is currently gated by ProverWhitelist, which has 1 whitelisted prover in discovery, and becomes permissionless only after an unproven proposal is > 5d old.

    Data availability
    Onchain

    All of the data needed for proof construction is published on Ethereum L1.

    Exit window
    None

    There is no window for users to exit in case of an unwanted upgrade since contracts are instantly upgradable.

    Proposer failure
    Self propose

    Anyone can propose after 1d 1h if forced inclusions are ignored, and proving becomes permissionless after 5d if a proposal remains unproven.

    Taiko Alethia
    Taiko Alethia is not even a
    Stage 0
    project.

    Learn more about Rollup stages
    Please keep in mind that these stages do not reflect rollup security, this is an opinionated assessment of rollup maturity based on subjective criteria, created with a goal of incentivizing projects to push toward better decentralization. Each team may have taken different paths to achieve this goal.

    All data required for proofs is published on chain

    All the data that is used to construct the system state is published on chain in the form of blobs. This ensures that it will be available for enough time.

    Learn more about the DA layer here: Ethereum logoEthereum
    Validity proofs

    Taiko uses a multi-proof system to validate state transitions. The system requires two proofs among four available verifiers: SGX (Geth), SGX (Reth), SP1, and RISC0. The use of SGX (Geth) is mandatory, while the other three can be used interchangeably. This means that a proposal range can be proven without providing a ZK proof if SGX (Geth) and SGX (Reth) are used together. New proposals target a proof submission cadence of 4h. Proving is currently centralized behind ProverWhitelist with 1 whitelisted prover. Non-whitelisted actors must wait 5d before the whitelist is dropped, and MainnetInbox currently sets minBond=0 and livenessBond=0. The multi-proof system allows detecting bugs in the verifiers if they produce different results for the same proposal range. If such a bug is detected, the system gets automatically paused.

    • Funds can be stolen if a malicious block is proven by compromised SGX instances.

    1. MainnetInbox.sol - Etherscan source code, getConfig function
    2. MainnetInbox.sol - Etherscan source code, prove function
    3. ProverWhitelist.sol - Etherscan source code

    Program Hashes

    Name
    Hash
    Repository
    Verification
    Used in
    0x0026...06e7
    Taiko Alethia logo
    0x137f...06e7
    Taiko Alethia logo
    0x008e...bfe7
    Taiko Alethia logo
    0x4712...bfe7
    Taiko Alethia logo
    0x0079...82f8
    Taiko Alethia logo
    0x3cb4...82f8
    Taiko Alethia logo
    0x0002...0c7c
    Taiko Alethia logo
    0x0156...0c7c
    Taiko Alethia logo
    0x779c...2544
    Taiko Alethia logo
    0x26ab...cee7
    Taiko Alethia logo
    0x46ef...727b
    Taiko Alethia logo
    0xdfbc...039e
    Taiko Alethia logo

    Past upgrades

    The metrics include upgrades on the currently used proxy contracts. Historical proxy contracts and changes of such are not included.

    Count of upgrades
    41
    Last upgrade
    11d 8h ago
    Avg upgrade interval
    3mo 16d

    The system uses whitelist-based sequencing and proving

    The system uses a whitelist-based sequencing mechanism to allow for fast preconfirmations on the L2. On the L1, whitelisted preconfirmers can propose Taiko L2 data to the MainnetInbox contract. The whitelist is managed by the PreconfWhitelist contract, which currently has 2 active operators registered. Forced inclusions become mandatory after 9m 36s and proposing becomes permissionless after 1d 1h if the queue is still ignored. Proving is controlled separately by ProverWhitelist, which currently has 1 whitelisted prover. Non-whitelisted actors must wait 5d after an unproven proposal before the whitelist is dropped. MainnetInbox currently sets minBond=0 and livenessBond=0. Currently, proving a proposal requires SGX (Geth), plus either SGX (Reth), SP1, or RISC0.

    • MEV can be extracted if the operator exploits their centralized position and frontruns user transactions.

    1. MainnetInbox.sol - Etherscan source code, propose function
    2. MainnetInbox.sol - Etherscan source code, prove function
    3. PreconfWhitelist.sol - Etherscan source code
    4. ProverWhitelist.sol - Etherscan source code

    Users can force any transaction via L1

    Users can submit a blob reference containing a standalone transaction by calling the saveForcedInclusion() function on the MainnetInbox contract. Once any forced inclusion has been queued for 9m 36s, whitelisted proposers cannot submit new proposals unless they process all due forced inclusions. If the oldest queued forced inclusion is still ignored for 1d 1h, proposing becomes permissionless and anyone can include it.

    1. MainnetInbox.sol - Etherscan source code, saveForcedInclusion function
    2. MainnetInbox.sol - Etherscan source code, propose function

    Regular exit

    The user initiates the withdrawal by submitting a regular transaction on this chain. When the block containing that transaction is finalized the funds become available for withdrawal on L1. Finally the user submits an L1 transaction to claim the funds. This transaction requires a merkle proof.

    A dashboard to explore contracts and permissions
    Go to Disco
    Disco UI Banner

    Ethereum

    Roles:

    Sequencer (2)EOA 1EOA 2

    Allowed to commit transactions from the current layer to the host chain.

    Actors:

    The main contract and entrypoint of the Aragon-based DAO governance framework. Fine-grained DAO permissions, proposals, voting and thresholds are configured here.

    • Can upgrade with no delay
      • AutomataDcapV3Attestation
      • Taiko Token
      • TaikoDAOController
      • AutomataDcapV3Attestation
      • QuotaManager
      • MainnetERC20Vault
      • SignalServiceForkRouter
      • MainnetBridge
      • ProverWhitelist
      • L1SharedAddressManager
      • TaikoDAOController
      • PreconfWhitelist
    • Can interact with TaikoRisc0Verifier
      • update the trusted image ids
    • Can interact with SgxVerifier
      • can add new instances without a DCAP attestation
    • Can interact with AutomataDcapV3Attestation
      • can update the program being verified
    • Can interact with AutomataDcapV3Attestation
      • can update the program being verified
    • Can interact with TaikoSP1Verifier
      • manage trusted program hashes
    • Can interact with SgxVerifier
      • can add new instances without a DCAP attestation
    • Can interact with ProverWhitelist
      • manage the prover whitelist
    • Can interact with L1SharedAddressManager
      • can update the contract address for a given name
    • Can interact with PreconfWhitelist
      • pause/unpause, manage operator and ejector roles

    A Multisig with 2/4 threshold.

    • Can upgrade with no delay
      • MainnetInbox
    • Can interact with MainnetInbox
      • pause and unpause the rollup system
    Taiko Multisig0x9CBe…9C7F

    A Multisig with 4/6 threshold.

    • Can interact with ProverWhitelist
    • Can interact with PreconfWhitelist
      • manage the ejecter role
    SP1VerifierGatewayMultisig0xCafE…6878

    A Multisig with 2/3 threshold.

    • Can interact with SP1VerifierGateway
      • affect the liveness and safety of the gateway - can transfer ownership, add and freeze verifier routes
    Used in:
    Taiko Foundation Treasury Multisig0x363e…B3Da

    A Multisig with 2/3 threshold.

    A Multisig with 1/2 threshold.

    Participants (2):

    0x39cc…6E6DGattaca Agent
    EOA 1 and EOA 2 (2)0x000c…3DE70xCbeB…9e9d
    • Can interact with TimelockController
      • cancel queued transactions
      • execute transactions that are ready
      • manage all access control roles with 3d delay
      • propose transactions
    • Can interact with RiscZeroVerifierRouter
      • add/remove verifiers and the selectors they are mapped to with 3d delay
    • Can interact with RiscZeroVerifierEmergencyStop
    Used in:

    Taiko Alethia

    Actors:

    • Can interact with SignalService
      • pause and unpause proofs and verification
    A dashboard to explore contracts and permissions
    Go to Disco
    Disco UI Banner
    A diagram of the smart contract architecture
    A diagram of the smart contract architecture

    Ethereum

    TaikoRisc0Verifier0x059d…Cd8b

    Gating router contract to verify batches using RISC Zero.

    • Roles:
      • owner: TaikoDAOController; ultimately DAO

    The core Layer 1 entrypoint for the Taiko rollup where L2 block batches are proposed and their corresponding state transitions are proven. It manages bonds, validates batch parameters, and acts as the state machine for the L2.

    • Roles:
      • admin: Safe
      • owner: Safe
    Can be upgraded by:
    TaikoSP1Verifier0x9633…05f6

    Gating router contract to verify batches using SP1.

    • Roles:
      • owner: TaikoDAOController; ultimately DAO
    MainnetVerifier0x9cAa…665d

    Enforces the Taiko Multiprover policy and routes to the downstream router contracts.

    Defines the whitelist of addresses allowed to prove proposals. Non-whitelisted provers must wait for the permissionless proving delay before they can submit proofs.

    • Roles:
      • admin: TaikoDAOController; ultimately DAO
      • owner: TaikoDAOController; ultimately DAO
      • proverManager: Taiko Multisig
    Can be upgraded by:

    Shared vault for Taiko chains for bridged ERC20 tokens.

    • Roles:
      • admin: TaikoDAOController; ultimately DAO
    Can be upgraded by:

    Middleware contract that maintains ownership of DAO-controlled assets and contracts. Its token weight does not count towards the DAO quorum. Member of Taiko Foundation Treasury Multisig.

    • Roles:
      • admin: DAO
      • owner: DAO
    Can be upgraded by:

    Middleware contract that maintains ownership of DAO-controlled assets and contracts. Its token weight does not count towards the DAO quorum.

    • Roles:
      • admin: DAO
      • owner: DAO
    Can be upgraded by:
    SP1Verifier0x0459…C459

    Verifier contract for SP1 proofs (v5.0.0).

    Implementation used in:
    SgxVerifier0x0856…97F1

    Verifier contract for SGX proven blocks.

    • Roles:
      • owner: TaikoDAOController; ultimately DAO
    TimelockController0x0b14…b711

    A timelock with access control. The current minimum delay is 3d.

    • Roles:
      • canceller: EOA 3
      • defaultAdmin: TimelockController; ultimately EOA 3
      • executor: EOA 3
      • proposer: EOA 3
    Implementation used in:

    A signer list for registering agents, similar to a Multisig.

    Contract managing SGX attestation certificates.

    • Roles:
      • admin: TaikoDAOController; ultimately DAO
      • owner: TaikoDAOController; ultimately DAO
    Can be upgraded by:

    ERC20 contract implementing the TAIKO token. It defines a list of addresses designated as non-voting.

    • Roles:
      • admin: TaikoDAOController; ultimately DAO
    Can be upgraded by:
    RiscZeroGroth16Verifier0x2a09…a84D

    Verifier contract for RISC Zero Groth16 proofs (version 3.0.0).

    Implementation used in:

    Modular Governance contract allowing for proposing, voting on and executing encrypted proposals (e.g. for Security Council emergency proposals).

    EncryptionRegistry0x2eFD…42d1

    A registry for signers (of the Security Council) to appoint agents to operate on their behalf. These agents can also register their encryption keys for encrypted emergency proposal support.

    SP1VerifierGateway0x3B60…185e

    This contract is the router for zk proof verification. It stores the mapping between identifiers and the address of onchain verifier contracts, routing each identifier to the corresponding verifier contract.

    • Roles:
      • owner: SP1VerifierGatewayMultisig
    Implementation used in:
    SP1Verifier0x8a0f…Fc5C

    Verifier contract for SP1 proofs (v6.0.0).

    Implementation used in:

    Contract managing SGX attestation certificates.

    • Roles:
      • admin: TaikoDAOController; ultimately DAO
      • owner: TaikoDAOController; ultimately DAO
    Can be upgraded by:
    RiscZeroVerifierRouter0x8EaB…D319

    A router proxy that routes to verifiers based on selectors. The mapping can be changed by a permissioned owner (TimelockController).

    • Roles:
      • owner: TimelockController; ultimately EOA 3
    Implementation used in:

    Defines withdrawal limits per token.

    • Roles:
      • admin: TaikoDAOController; ultimately DAO
    Can be upgraded by:

    An optimistic governance module. Proposals pass and can be executed unless 10% of votable TAIKO veto them within 7d.

    RiscZeroVerifierEmergencyStop0x9F99…e696

    A verifier wrapper for the RiscZeroGroth16Verifier that allows pausing (emergency stop) the verifier by its owner.

    • Roles:
      • owner: EOA 3
    Implementation used in:
    SgxVerifier0xa101…68F6

    Verifier contract for SGX proven blocks.

    • Roles:
      • owner: TaikoDAOController; ultimately DAO
    SignalService0xBC44…8752

    Facilitates secure cross-chain message passing by storing signals (messages) and state root checkpoints. It allows applications to prove that a specific L2 signal or state transition occurred via Merkle proofs.

    Shared bridge for Taiko chains for bridged ETH.

    • Roles:
      • admin: TaikoDAOController; ultimately DAO
    Can be upgraded by:

    Modular Governance contract allowing for proposing, voting on and executing proposals (e.g. for Security Council standard proposals).

    Maps contract names to contract addresses. Changes in this mapping effectively act as contract upgrades.

    • Roles:
      • admin: TaikoDAOController; ultimately DAO
      • owner: TaikoDAOController; ultimately DAO
    Can be upgraded by:

    Contains the whitelist of addresses allowed to propose batches on L1 and issue preconfirmations. It dynamically selects a single operator for a given epoch using the Ethereum beacon block root as a source of randomness.

    • Roles:
      • _ejectorManager: Taiko Multisig
      • admin: TaikoDAOController; ultimately DAO
      • operatorMapping: EOA 1, EOA 2
      • owner: TaikoDAOController; ultimately DAO
    Can be upgraded by:

    Taiko Alethia

    Immutable L2 contract that anchors L1 block details to L2 for cross-layer communication and manages EIP-1559 gas pricing for L2 operations.

    Middleware contract that maintains ownership of DAO-controlled assets and contracts. Its token weight does not count towards the DAO quorum.

    • Roles:
      • admin: DelegateController
      • owner: DelegateController
    • Roles:
      • admin: DelegateController

    Maps contract names to contract addresses. Changes in this mapping effectively act as contract upgrades.

    • Roles:
      • admin: DelegateController
      • owner: DelegateController
    SignalService0x18B2…fE28

    Facilitates secure cross-chain message passing by storing signals (messages) and state root checkpoints. It allows applications to prove that a specific L2 signal or state transition occurred via Merkle proofs.

    • Roles:
      • owner: EOA 4

    The current deployment carries some associated risks:

    • Funds can be stolen if a contract receives a malicious code upgrade. There is no delay on code upgrades (CRITICAL).

    Program Hashes

    Name
    Hash
    Repository
    Verification
    Used in
    0x0026...06e7
    Taiko Alethia logo
    0x137f...06e7
    Taiko Alethia logo
    0x008e...bfe7
    Taiko Alethia logo
    0x4712...bfe7
    Taiko Alethia logo
    0x0079...82f8
    Taiko Alethia logo
    0x3cb4...82f8
    Taiko Alethia logo
    0x0002...0c7c
    Taiko Alethia logo
    0x0156...0c7c
    Taiko Alethia logo
    0x779c...2544
    Taiko Alethia logo
    0x26ab...cee7
    Taiko Alethia logo
    0x46ef...727b
    Taiko Alethia logo
    0xdfbc...039e
    Taiko Alethia logo