Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
the-ethereum-roadmap-merge-surge-verge
Blog

Rollup Security Without Active Watchers Fails

The industry's reliance on passive, trust-based security models for optimistic rollups is a systemic risk. This analysis deconstructs why active, economically-aligned watchers are the only viable defense against state fraud, and why the current ecosystem is failing to incentivize them.

introduction
THE WATCHER GAP

The Security Mirage

Rollup security models that rely on passive, permissionless watchers create a systemic failure point.

Rollup security is reactive. The core promise—users can force a correct withdrawal—depends on a watcher submitting a fraud proof. Without an active, economically-aligned watcher, this fails.

Permissionless watching is a mirage. The economic model for running a full node and submitting proofs is broken. Projects like Arbitrum and Optimism rely on altruism or their own sequencers for liveness.

The watcher is a single point of failure. If the sole active watcher goes offline, the entire fraud proof system is inert. This centralizes security more than advertised.

Evidence: The 2022 Optimism 'fault proof' bug went unchallenged for weeks. No external party submitted a proof, demonstrating the watcher incentive gap in practice.

thesis-statement
THE L1 FALLACY

The Core Argument: Watchers Are the Liveness Assumption

Rollup security is not inherited from Ethereum; it is enforced by active, economically-aligned watchers.

Rollups are not secured by L1 alone. A rollup's state is only as valid as its last posted commitment. The L1 only verifies the format of data, not its semantic correctness. Without a watcher to challenge invalid state transitions, a malicious sequencer can steal funds.

The watcher is the liveness assumption. The security model of optimistic rollups like Arbitrum and Optimism collapses if no honest party is watching. The 7-day challenge window is a vulnerability, not a feature, without active monitoring.

Passive L1 reliance is a dangerous myth. Comparing this to Bitcoin or Ethereum's own consensus is flawed. Those networks have thousands of active validators; a rollup often has one sequencer and a handful of watchers. The liveness requirement shifts from the protocol to the user.

Evidence: The Ethereum Foundation's rollup roadmap explicitly lists 'ensuring liveness' as a key unsolved problem. Real-world exploits on early optimistic chains like Metis and Boba demonstrated that inactive watchers enable theft.

ROLLUP SECURITY MODELS

The Incentive Mismatch: Security Cost vs. Protocol Revenue

Compares the economic viability of different models for securing rollup state transitions, focusing on the cost of honest watchers versus protocol revenue.

Security MechanismOptimistic Rollup (Status Quo)Active Watcher NetworkZK-Rollup (Validity Proofs)

Core Security Assumption

1-of-N honest actor

Economic quorum of watchers

Cryptographic proof

Time to Finality (Challenge Period)

7 days

< 4 hours

< 20 minutes

Watcher Operational Cost (Annual)

$50k - $200k+ (per entity)

$5k - $15k (per node, subsidized)

~$0 (Prover cost only)

Protocol Revenue Available for Subsidy

~$0 (Sequencer profit)

Up to 30% of sequencer fees

Sequencer covers prover cost

Incentive Mismatch Risk

Requires Live Monitoring

Capital at Risk for Watchers

Unbounded (fraud proof bond)

Capped (slashing stake)

None

Example Protocols

Arbitrum One, Optimism

Espresso, Astria, AltLayer

zkSync Era, Starknet, Polygon zkEVM

deep-dive
THE WATCHER GAP

Deconstructing the Failure Modes

Rollup security is a false promise without a robust, incentivized network of active watchers.

Passive validation is insufficient. A rollup's security inherits from L1 only if someone actively monitors and challenges fraud. Without watchers, a malicious sequencer can steal funds with impunity.

Economic incentives are misaligned. Users assume security is automatic, creating a tragedy of the commons. Protocols like Arbitrum rely on altruistic watchdogs, a model that fails under stress.

The failure is silent. Unlike a chain halt, a successful fraud proof requires a watcher to be online, funded, and paying attention. Most users are not.

Evidence: Optimism's early 'Cannon' fraud proof system was never used in production, highlighting the practical gap between theoretical safety and live defense.

case-study
WHY PASSIVE WATCHERS ARE NON-NEGOTIABLE

Historical Precedents and Near-Misses

History shows that rollup security models relying solely on economic incentives or optimistic assumptions fail catastrophically when active watchdogs are absent.

01

The Optimism Fraud Proof Saga

The original Optimism OVM 1.0 launched with a 7-day challenge window but no functional fraud proof system for over a year. This created a single-point-of-failure where the sole sequencer could have stolen funds with impunity. The entire security model was theoretical until live watchers were operational.

  • Key Lesson: A fraud proof you can't execute is worthless.
  • Key Metric: ~$1B+ TVL secured by a promise, not a mechanism.
365+ days
Vulnerable Period
1
Active Sequencer
02

The Near-Miss: Arbitrum's BOLD Compromise

Arbitrum's BOLD (Bounded Liquidity Delay) design initially proposed allowing validators to post bonds and exit without watching, creating a free option on liveness. This could lead to coordinated shutdowns where watchers vanish during an attack, as their capital isn't locked. The design was revised to require stake locking for any validator, forcing economic skin in the game.

  • Key Lesson: Watchdog incentives must be aligned and sticky.
  • Key Entity: EigenLayer restaking faces similar watchdog apathy risks.
0% Lock
Initial Bond Design
100% Lock
Revised Requirement
03

The Poly Network Heist & Bridge Parallel

While not a rollup, the $611M Poly Network hack exemplifies the failure of multi-sig guardians who were not actively monitoring. Rollup security councils or multi-sig upgrades are analogous; they are passive by default. Without active, adversarial watchers scanning every state root, a malicious sequencer can exploit the delay between fraud and reaction.

  • Key Lesson: Passive committees cannot catch real-time fraud.
  • Key Precedent: Nomad Bridge suffered a similar $190M failure from inactive watchfulness.
$611M
Exploited Value
~Hours
Detection Lag
04

ZK-Rollup Prover Centralization Risk

Even validity-proof systems are not immune. If a single prover holds the proving key and fails (maliciously or accidentally), the rollup halts. Active watchers in this context are the entities monitoring the chain for proof submission liveness and ready to trigger a prover switch via governance. Without them, you trade sequencer centralization for prover centralization.

  • Key Lesson: Liveness requires watchdogs, even with validity proofs.
  • Key Metric: ~0ms tolerance for proof submission failure before chain halts.
1
Default Prover
Downtime Cost
counter-argument
THE DECOUPLING

Steelman: "But Sequencer Decentralization Solves This!"

Decentralizing the sequencer does not eliminate the fundamental requirement for active, independent watchers to secure user funds.

Sequencer decentralization is orthogonal to the watcher requirement. A decentralized sequencer set, like Espresso Systems proposes, prevents a single entity from censoring or reordering transactions. It does not, however, prevent the entire set from colluding to submit a fraudulent state root to L1. The security guarantee remains probabilistic without an independent verifier.

The liveness assumption shifts but does not disappear. With a single sequencer, you need one honest watcher. With a decentralized set of N sequencers, you need N+1 honest parties watching. The economic security model changes from a single point of failure to a cartel problem, which is harder to detect but equally catastrophic.

Proof systems are not a panacea. Even with a validity proof (ZK-Rollup) or a fraud proof (Optimistic Rollup), the system requires at least one honest actor to initiate a challenge or generate a proof. Without active watchers, a malicious sequencer cartel can simply withhold the data or proof needed for verification, creating a liveness failure.

Evidence: The Espresso Sequencer design explicitly acknowledges this, stating its role is sequencing, not data availability or settlement. Final security still depends on the underlying rollup's verification layer and watcher network, which must remain active and funded regardless of sequencer architecture.

future-outlook
THE FLAW

The Path Forward: From Passive to Active Security

Rollups that rely solely on passive fraud proofs or optimistic assumptions are fundamentally insecure.

Passive security is broken. A rollup with a 7-day challenge period and no active watchers is a honeypot. The economic security model fails because the cost to monitor exceeds the reward for catching fraud.

Active watchers are mandatory. The only functional security is a live network of entities, like Chorus One or Figment, with skin in the game. This shifts the model from probabilistic safety to Byzantine Fault Tolerance.

Proof-of-Stake for Rollups. The end-state is a dedicated validator set staking the rollup's native token. This aligns incentives directly, unlike the indirect slashing of L1 stakers in Optimism's initial design.

Evidence: The Ethereum community's skepticism of 'soft commitments' forced Arbitrum to accelerate its BOLD fraud proof rollout, validating that passive models lack credible defense.

takeaways
ROLLUP SECURITY WITHOUT ACTIVE WATCHERS FAILS

TL;DR for Protocol Architects

A rollup's security is only as strong as its most passive user. This is the liveness assumption, and ignoring it is a critical design flaw.

01

The Liveness Assumption is Non-Negotiable

Optimistic rollups require at least one honest actor to watch the chain and submit fraud proofs. If no one is watching, a malicious sequencer can steal all funds with impunity. This creates a systemic risk where security degrades with user apathy.

  • Core Failure: Security ≠ cryptography alone; it requires constant, active participation.
  • Real Consequence: A silent chain is a vulnerable chain, regardless of its 7-day dispute window.
1
Honest Actor Required
100%
Funds at Risk if Idle
02

Watcher Economics Are Broken

The public good problem: watching and challenging is costly, but the rewards are diffuse. Why would a rational actor spend gas to protect others' funds? Current models rely on altruism or centralized watchdogs, creating a single point of failure.

  • Incentive Misalignment: Cost is private, benefit is public.
  • Centralization Vector: Leads to reliance on entities like Arbitrum's Bounded Liquidity Delay or dedicated watchtower services.
$0
Direct Reward
High
Gas Cost
03

ZK-Rollups Invert the Security Model

Validity proofs shift the security burden from liveness to computation. A single prover can post a proof that anyone can verify instantly and cheaply. Security becomes a function of cryptographic soundness, not a race against time.

  • Paradigm Shift: From "watch and challenge" to "prove and verify".
  • Architectural Imperative: Eliminates the liveness assumption, making zkSync, StarkNet, Scroll fundamentally safer under user inactivity.
~0s
Verification Time
Passive
User Security
04

Force Inclusion: A Stopgap, Not a Solution

Mechanisms like Arbitrum's force inclusion path allow users to bypass a censoring sequencer by posting directly to L1. This mitigates censorship but does not solve fraud. A malicious sequencer can still steal if unwatched.

  • Limited Scope: Only protects availability, not validity.
  • High Latency: Forces a multi-day delay for user transactions, destroying UX.
Days
Delay Incurred
Censorship-Only
Protection Scope
05

DACs & Watchtowers Re-Centralize

Data Availability Committees (DACs) and commercial watchtower services emerge to fill the liveness gap. This recreates the trusted intermediary problem rollups were meant to solve. You now trust AltLayer, Espresso Systems, or a consortium to be honest and online.

  • Trust Regression: Shifts from trust in L1 to trust in a new committee.
  • Brittle Security: Becomes a high-value attack/coordination target.
N-of-M
Trust Assumption
New Attack Surface
Result
06

The Architect's Mandate: Minimize Liveness

Design systems where security is cryptographically enforced, not socially enforced. Prioritize validity proofs. For optimistic designs, embed economic incentives for watching (e.g., bonded challenger rewards) directly into the protocol's tokenomics. Treat passive security as a first-class requirement.

  • First-Principle: Security must be verifiable, not hopeful.
  • Actionable Path: Audit your stack's liveness dependencies; model failure under 0 active users.
Cryptographic > Social
Security Primitive
Protocol-Level
Incentive Design
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline