Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
the-ethereum-roadmap-merge-surge-verge
Blog

ZK Rollups Move Compute, Not Responsibility

The 'Surge' is about scaling execution, not abdicating security. This analysis deconstructs the core architectural bargain of ZK Rollups: they inherit Ethereum's data availability and consensus, making them a sovereign execution layer, not a separate chain.

introduction
THE SHIFT

Introduction

ZK rollups are not just scaling solutions; they are a fundamental re-architecture of trust and execution responsibility.

ZK rollups move compute, not responsibility. They execute transactions off-chain but rely on Ethereum for final settlement and data availability, creating a new trust model where the L1 enforces correctness but does not perform the work.

This separates execution from verification. Unlike optimistic rollups like Arbitrum or Optimism, which assume honesty and have long challenge periods, ZK rollups like StarkNet and zkSync use validity proofs to provide instant, cryptographic finality to the L1.

The user's security guarantee shifts. Your assets are not secured by the rollup's validators but by the mathematical soundness of its ZK circuit and the liveness of Ethereum's data availability layer, a concept pioneered by Validiums like Immutable X.

Evidence: StarkEx processes over 300 TPS for dYdX, finalizing trades on Ethereum in minutes, not days, demonstrating the latency and capital efficiency advantage of this model.

thesis-statement
THE TRUST BOUNDARY

The Core Architectural Bargain

ZK rollups shift computational burden off-chain but keep the ultimate responsibility for security and data availability on the base layer.

The core bargain is trust minimization. A ZK rollup executes transactions off-chain and posts a validity proof to Ethereum, but it does not outsource trust. The L1 is the final arbiter of state correctness, not a committee of sequencers.

This separates compute from responsibility. Unlike optimistic rollups which rely on a fraud-proof challenge window, ZK validity proofs provide cryptographic finality. The L1's role shifts from re-executing transactions to verifying a single, succinct proof.

Data availability remains non-negotiable. Protocols like zkSync Era and Starknet post transaction data as calldata to Ethereum. If this data is withheld, the rollup halts, proving that off-chain compute requires on-chain data.

Evidence: The security model is why Polygon zkEVM and Linea can inherit Ethereum's security without its throughput limits. The L1 verifies a proof in ~45k gas, while the rollup processes thousands of transactions off-chain.

ZK-ROLLUP SECURITY MODEL

The Responsibility Matrix: Who Does What?

ZK-Rollups shift computation off-chain but distribute core responsibilities differently. This matrix compares the security and operational duties between the protocol, users, and sequencers.

Responsibility / CapabilityZK-Rollup Protocol (e.g., zkSync, StarkNet)User / DAppSequencer (L2 Operator)

State Validity & Finality

Guaranteed via ZK-proof verification on L1

Assumed via trust in proof system

Must submit valid proof to finalize state

Data Availability

Posts compressed calldata to L1 (ZK-Rollup) or Validium data committee

Relies on posted data for self-custody exit

Responsible for posting data to designated layer

Censorship Resistance

✅ via forced L1 inclusion (if data on L1)

Can force tx via L1 if sequencer censors

Can censor L2 mempool; user recourse is L1

Sequencer Liveness

Protocol defines rules; liveness not required for safety

User funds safe; requires L1 interaction if sequencer down

Must be live for user experience; downtime halts L2 progress

Upgrade Control

Multisig / DAO (e.g., 5/8) controls prover keys & bridge

No control; subject to governance decisions

No control; follows protocol upgrade

Withdrawal Security

Trustless via L1 proof verification & challenge period (~1 hr)

Self-custody; user initiates proof-of-funds

Cannot steal funds; can delay via censorship

MEV Capture

Defines auction mechanism (e.g., PBS); can be permissioned

Exposed to L2 sequencer MEV

Primary extractor of L2 block space MEV

Prover Failure Risk

If prover fails, chain halts; no invalid state

Funds safe but chain unusable

Cannot produce blocks without valid proof

deep-dive
THE DATA

Why Data Availability is the Linchpin

ZK rollups shift computational burden off-chain, but the security model remains tethered to the availability of transaction data.

ZK rollups are not trustless. The validity proof guarantees execution correctness, but a sequencer withholding transaction data creates a censorship attack. Users cannot reconstruct the chain state or prove fraud without this data.

Data availability is the security floor. The L1 becomes a bulletin board, not a computer. This is the core innovation separating rollups from sidechains. Without guaranteed data posting, a ZK rollup reverts to a permissioned system.

Ethereum's calldata is the gold standard but expensive. Alternatives like EigenDA and Celestia offer cheaper data layers, trading Ethereum's full security for economic assurances. The trade-off defines the rollup's security model.

Evidence: A sequencer posting only state roots and proofs, but not the underlying data, creates a black box. Validium modes on StarkEx demonstrate this model, relying on Data Availability Committees for liveness.

risk-analysis
ZK ROLLUP LIABILITY GAP

The Bear Case: Where the Model Breaks

ZK-rollups excel at moving compute off-chain, but the decentralization of responsibility for state execution and data availability creates systemic risk.

01

The Sequencer Monopoly Problem

Users must trust a single, centralized sequencer for transaction ordering and inclusion. This creates a single point of censorship and creates a liability vacuum for L1s like Ethereum.

  • Censorship Risk: A malicious or compliant sequencer can block transactions.
  • L1 Liability: Ethereum inherits the rollup's security but not its liveness, creating a fragmented security model.
  • Centralization Pressure: High-performance sequencing is capital-intensive, favoring incumbents like StarkWare and zkSync.
1
Active Sequencer
~0s
User Recourse
02

Data Availability is the Real Bottleneck

ZK validity proofs are meaningless without guaranteed access to the transaction data. Relying on a centralized Data Availability Committee (DAC) or a costly L1 calldata posting reintroduces the trust assumptions ZK promised to eliminate.

  • DAC Trust: Models used by zkSync and StarkEx require trusting a multisig.
  • Cost Anchor: ~80% of rollup cost is L1 data posting, limiting scalability.
  • Fragmented Security: Solutions like EigenDA and Celestia create new modular trust layers.
80%
L1 Cost
7/10
DAC Signers
03

Prover Centralization & Hardware Risks

Generating ZK proofs requires specialized, expensive hardware (GPUs, ASICs). This creates a high barrier to entry, leading to prover centralization and new attack vectors.

  • Oligopoly Risk: Proof generation dominated by a few entities (e.g., Ulvetanna).
  • Hardware Trust: Must trust the integrity of proprietary proving stacks.
  • Liveness Risk: If major provers fail, the chain halts, violating decentralization promises of Polygon zkEVM or Scroll.
> $10k
Prover Setup
Handful
Major Provers
04

The Upgrade Key Control Dilemma

Most ZK-rollups use upgradable contracts controlled by a multisig. This creates a persistent backdoor, making the system's security equal to the multisig's, not the ZK-proof's.

  • Security Ceiling: The 4/6 multisig is the weakest link, not the cryptographic proof.
  • Governance Illusion: "Decentralization later" is a systemic risk for Arbitrum and Optimism too.
  • Time-Lock Theater: Long delay upgrades offer limited protection against determined multisig signers.
4/6
Multisig Rule
Attack Window
05

Cross-Chain Liquidity Fragmentation

ZK-rollups create isolated liquidity silos. Bridging between them via trusted bridges like LayerZero or Wormhole reintroduces the very custodial risk L1 was meant to solve.

  • Bridge Risk: ~$2B+ in bridge hacks since 2021.
  • Capital Inefficiency: Locked liquidity reduces capital efficiency across Arbitrum, zkSync Era, and Base.
  • User Experience: Moving assets requires navigating multiple, risky bridge interfaces.
$2B+
Bridge Hacks
7 Days
Withdrawal Delay
06

The Verifier's Dilemma & L1 Load

While L1 verifies a tiny proof, it must still re-execute transactions if fraud is suspected (e.g., during a censorship challenge). This failsafe mechanism can suddenly dump massive computational load onto Ethereum.

  • Worst-Case Load: A dispute forces L1 to replay a batch, spiking gas costs.
  • Economic Attack: An attacker can force this scenario to destabilize the rollup and L1.
  • Complexity Risk: Adds a complex, rarely-tested security fallback path to otherwise "simple" validity proofs.
1000x
Compute Spike
High
Attack Cost
future-outlook
THE FINAL ABSTRACTION

The Verge Completes the Loop

ZK rollups abstract compute and data, but the Verge's recursive proofs are the final abstraction, moving verification responsibility to the base layer.

ZK rollups are compute abstractions. They execute transactions off-chain and post a validity proof, but the L1 still holds the canonical state and must verify the proof. This is a partial abstraction.

The Verge abstracts verification. By using recursive proofs (e.g., zkVM circuits), the L1 verifies a single proof of a proof, not the proof of every transaction. The L1's job becomes checking a single signature.

This moves responsibility, not just data. Unlike Optimistic Rollups that move dispute responsibility, or Validiums that move data availability, the Verge moves the computational burden of verification off-chain.

Evidence: StarkWare's SHARP prover aggregates thousands of Cairo program proofs into one STARK for Ethereum. Polygon zkEVM uses recursive SNARKs via Plonky2. The L1 cost is constant, regardless of L2 transaction volume.

takeaways
ZK ROLLUP REALITY CHECK

Architectural Imperatives

Zero-Knowledge proofs move computation off-chain, but the security and data availability burden remains a core L1 responsibility.

01

The Data Availability Dilemma

ZK validity proofs are useless if the input data is unavailable for reconstruction. This creates a critical dependency on the underlying L1's data layer.\n- Ethereum charges ~$0.10-$1.00 per KB for calldata, a primary cost driver.\n- Solutions like EigenDA, Celestia, and Avail compete to reduce this cost by >90%.\n- The security model degrades to a multi-sig if the DA layer is not sufficiently decentralized.

>90%
Cost Reduction
~$0.01/KB
Alt-DA Cost
02

Sequencer Centralization is a Time Bomb

Most ZK rollups (zkSync Era, Starknet, Polygon zkEVM) rely on a single, permissioned sequencer. This creates a massive liveness and censorship vulnerability.\n- Users cannot force transaction inclusion without the sequencer's cooperation.\n- Shared sequencer projects like Espresso Systems and Astria aim to decentralize this role.\n- The endgame is a proof-of-stake validator set for sequencing, mirroring L1 security.

1
Active Sequencer
~0s
User Escape Hatch
03

Prover Monopolies vs. Permissionless Proving

Early ZK rollups use centralized provers, creating a single point of failure and potential for maximal extractable value (MEV). The architectural imperative is a competitive proving market.\n- zkSync's Boojum and Starknet's Stone Prover are steps toward client diversity.\n- Risc Zero and SP1 enable general-purpose ZK-VMs for anyone to build provers.\n- A healthy market reduces costs and aligns with crypto's credibly neutral ethos.

1000x
Proving Speedup
Multi-Prover
Target Architecture
04

Upgrade Keys are Still a Thing

Despite 'verification' being on-chain, the rollup's smart contract logic can be changed by a multi-sig. This places ultimate trust in a handful of entities, not cryptography.\n- Most major rollups have 3-8 of N multi-sigs with timelocks.\n- The path to irrevocable verification requires either a long timelock (e.g., Optimism's 1-year delay) or on-chain governance.\n- This is the final, non-technical bridge to true decentralization.

3-8 of N
Typical Multi-sig
1 Year+
Safety Delay
05

Cross-Rollup Liquidity Fragmentation

Every new ZK rollup creates a new liquidity silo. Native bridging is slow and capital-inefficient, forcing reliance on third-party bridges with their own trust assumptions.\n- LayerZero, Axelar, and Wormhole act as connective tissue but introduce new external dependencies.\n- Shared liquidity layers like Chainlink CCIP and intent-based architectures (UniswapX, Across) abstract this away.\n- The winning stack will make liquidity omnipresent, not bridged.

$10B+
Bridged TVL
~3-20 min
Bridge Latency
06

The L1 as the Supreme Court

The L1's final role is as the arbiter of last resort. It does not execute, but it verifies proofs and settles disputes. This makes L1 data bandwidth and verification cost the ultimate bottlenecks.\n- EIP-4844 (Proto-Danksharding) is a ~10-100x scalability increase for rollup data.\n- Verkle Trees and SNARKed L1 consensus (e.g., Succinct's SP1) are next.\n- The L1 evolves into a high-security settlement and data availability hub.

10-100x
EIP-4844 Gain
Settlement Hub
L1's New Role
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
ZK Rollups: They Move Compute, Not Responsibility | ChainScore Blog