In an enshrined security model, the rules for validating the network's state are baked directly into the protocol layer. This contrasts with modular or layer-2 approaches where these functions are delegated to external systems. The canonical example is a monolithic blockchain like Bitcoin or Ethereum's execution layer, where the consensus mechanism (e.g., Proof-of-Work, Proof-of-Stake) and the rules for processing transactions are defined and enforced by the protocol's nodes. This creates a unified security model where the entire network's economic security is pooled to protect the single state.
Enshrined Security
What is Enshrined Security?
Enshrined security is a blockchain design philosophy where critical functions, such as consensus and transaction validation, are implemented as a native, immutable part of the core protocol.
The primary advantage of enshrined security is strong safety and liveness guarantees. Because the validation logic is uniform and non-upgradable without broad consensus (a hard fork), it minimizes trust assumptions and reduces systemic risk from bridge hacks or faulty external code. This design favors simplicity and robustness over flexibility, making the base layer a highly secure settlement and data availability foundation. However, it can limit innovation speed, as upgrading core functions is a slow, coordinated process.
Enshrined security is often discussed in contrast to modular blockchain designs. In a modular stack, functions like execution (via rollups), consensus, and data availability are separated. Here, security is often "borrowed" or derived from a base layer (e.g., Ethereum using enshrined rollups for consensus and data), but the execution environment's security is not natively guaranteed by the base protocol. The debate centers on the trade-off between the maximal security of enshrined designs and the scalability and specialization offered by modular, app-chain, and layer-2 ecosystems.
How Enshrined Security Works
Enshrined security is a blockchain design philosophy where critical security functions are embedded directly into the core protocol layer, rather than being delegated to external systems or applications.
Enshrined security is a blockchain design principle where critical network functions—such as consensus, transaction validation, and bridge operations—are natively integrated into the base layer protocol. This approach contrasts with modular architectures that outsource these functions to external, application-layer systems. By embedding security guarantees directly into the protocol's consensus rules, enshrined security aims to minimize trust assumptions and reduce systemic risk from third-party dependencies. It creates a unified security model where all participants rely on the same, cryptographically enforced set of rules.
The primary mechanism of enshrined security is the protocol-native execution of essential services. For example, in a blockchain with an enshrined bridge, the protocol itself validates and finalizes cross-chain messages, eliminating the need for a separate multisig council or federation. Similarly, enshrined rollup sequencing or data availability would be managed by validators as part of their core duties, secured by the same stake that protects the chain. This consolidation reduces attack vectors, as there is no separate economic or software surface to compromise outside the main chain's validator set.
Key benefits of this model include stronger sovereignty guarantees and simplified security reasoning. Users and developers interact with a single, coherent security boundary. However, it involves trade-offs in protocol complexity and evolution speed, as upgrading enshrined features requires broad consensus via hard forks. Prominent examples include Bitcoin's enshrined Proof-of-Work consensus and Ethereum's ongoing research into enshrined proposer-builder separation (PBS) and data availability sampling. The debate between enshrined versus modular security is central to blockchain scalability and decentralization roadmaps.
Key Features of Enshrined Security
Enshrined security refers to critical network functions, such as consensus, data availability, and bridging, that are built directly into a blockchain's core protocol rather than delegated to external, third-party systems.
Protocol-Native Consensus
The blockchain's consensus mechanism (e.g., Proof-of-Stake, Proof-of-Work) is an intrinsic, non-negotiable part of the base layer. This eliminates reliance on external committees or multi-signature schemes for validating the canonical chain, providing a single source of truth secured by the network's own economic security.
Guaranteed Data Availability
The protocol itself ensures that transaction data is published and verifiably accessible to all network participants. This is a cryptoeconomic guarantee, often enforced by core protocol rules and validator slashing conditions, preventing data withholding attacks that can compromise rollup security or light client verification.
Canonical Bridging
A trust-minimized bridge between the Layer 1 and its Layer 2 rollups is defined and secured by the L1 protocol. Messages (like deposits and withdrawals) are validated according to the L1's own consensus rules, removing the need for and risks associated with externally operated bridging contracts.
Elimination of Governance Risk
Critical security parameters and upgrade paths are hard-coded into the protocol with extremely high activation barriers. This reduces systemic risk from the potential failure or malicious action of a decentralized autonomous organization (DAO) or multi-signature governing an external component.
Unified Economic Security
All enshrined functions are secured by the same cryptoeconomic stake (e.g., the native token) that protects the base layer. There is no fragmentation of security across multiple tokens or external systems, creating a cohesive security model where an attack on one component is an attack on the entire network.
Reduced Complexity & Attack Surface
By minimizing external dependencies and moving critical logic into the verifiably correct protocol, the system's overall attack surface is reduced. This contrasts with modular designs that introduce additional trust assumptions and communication channels between independent components.
Enshrined vs. External Security
A comparison of two fundamental approaches to securing a blockchain's consensus and execution layers.
| Security Dimension | Enshrined Security | External Security |
|---|---|---|
Definition | Security mechanisms defined and enforced at the core protocol level. | Security provided by a separate, independent network or service. |
Architectural Layer | Layer 1 (Consensus/Protocol) | Layer 2 or Off-Chain Service |
Trust Assumption | Trust in the protocol's validators and cryptographic guarantees. | Trust in the external system's operators and its own security model. |
Upgrade Path | Requires coordinated protocol hard fork. | Independent, can upgrade without changing L1. |
Cost Model | Paid via native token (e.g., gas, staking rewards). | Paid via service fees, often in various tokens. |
Failure Mode | System-wide failure if protocol is compromised. | Isolated failure; main chain continues. |
Examples | Ethereum Beacon Chain validators, Bitcoin mining. | Optimistic Rollup fraud proofs, PoS sidechain validator sets. |
Examples of Enshrined Security
Enshrined security refers to critical functions, such as bridging, sequencing, or data availability, that are built directly into a blockchain's consensus layer rather than delegated to external, potentially vulnerable, systems.
Monolithic vs. Modular Enshrinement
Monolithic chains like Solana or early Ethereum enshrine execution, consensus, and data availability in one layer. Modular chains like Ethereum (post-Danksharding) or Celestia decouple these functions but still enshrine core guarantees (e.g., consensus for Ethereum L2s, data availability for Celestia rollups) at their base layer.
Etymology and Origin
The term 'enshrined security' emerged from blockchain protocol design to describe a fundamental architectural philosophy, contrasting with modular or outsourced security models.
The term enshrined security originates from constitutional law, where rights or principles are 'enshrined' in a foundational document, making them permanent and unalterable by ordinary processes. In blockchain context, it was adopted to describe core protocol functions—like consensus, data availability, and settlement—that are native, mandatory, and immutable components of a base layer, such as Ethereum or Bitcoin. This contrasts with modular designs where these functions can be provided by external, potentially less secure, systems. The 'enshrinement' implies these security properties are baked into the protocol's very constitution.
The concept gained prominence during debates on Ethereum's scaling roadmap, particularly concerning rollup security and data availability. Proponents argued that for a rollup to be truly secure, its ability to force transaction inclusion or verify state (via fraud proofs or validity proofs) must be an enshrined, trust-minimized property of the L1. This prevents reliance on external committees or oracles that could collude or fail. The term thus evolved from a general principle to a specific critique of modular blockchain designs that outsource critical security functions.
Etymology highlights a key tension in protocol design: integration vs. modularity. An enshrined approach prioritizes sovereignty and crypto-economic security guaranteed by the base layer's validators. Its origin story is intertwined with the development of Ethereum's danksharding and enshrined rollups, where core scaling features are proposed to be moved into the protocol itself. This mirrors how Bitcoin enshrines its 21 million coin supply or Ethereum enshrines its proof-of-stake consensus—these are not optional add-ons but foundational, unchangeable rules.
Ecosystem Usage
Enshrined security refers to consensus, execution, and data availability mechanisms that are natively built into a blockchain's protocol layer, as opposed to being provided by external, modular services. This section details its practical applications and trade-offs.
Consensus & Finality
Enshrined consensus provides native, protocol-level guarantees for transaction ordering and finality. This is the core security model of monolithic chains like Bitcoin and Ethereum.
- Examples: Proof-of-Work (Bitcoin), Proof-of-Stake (Ethereum).
- Key Property: Security is inseparable from the chain's economic incentives and validator set.
- Trade-off: Offers maximum liveness and censorship-resistance guarantees but can be less flexible than external consensus providers.
Execution & Settlement
Enshrined execution means the protocol defines and operates the single, canonical virtual machine (VM) for processing transactions.
- Primary Example: The Ethereum Virtual Machine (EVM) on Ethereum L1.
- Guarantee: All nodes validate execution identically, ensuring uniform state transitions and eliminating the need to trust external provers for correctness.
- Contrast: Contrasts with modular stacks where execution is handled by separate rollups or validiums.
Data Availability
Enshrined data availability (DA) ensures transaction data is published to and stored by the base layer's consensus participants.
- Mechanism: Full nodes and validators are required to store or make available the data for new blocks.
- Purpose: Enables trustless reconstruction of the chain state and is critical for the security of light clients and future L2 solutions.
- Example: Ethereum's proto-danksharding (EIP-4844) introduces a native DA layer via blob transactions.
Modular vs. Monolithic Trade-offs
The choice between enshrined and modular security involves fundamental trade-offs.
- Enshrined (Monolithic): Maximizes sovereignty and security cohesion but can limit scalability and innovation speed.
- Modular: Enables specialization and scalability (e.g., rollups) but introduces trust assumptions between layers (e.g., bridging, external DA).
- Hybrid Models: Chains like Celestia provide enshrined DA for other chains, while Ethereum is evolving towards an enshrined settlement and DA layer for modular rollups.
Validator Economics
Enshrined security is directly funded by the protocol's native token economics.
- Staking/Yield: Validators are incentivized through block rewards and transaction fees denominated in the native token (e.g., ETH, ATOM).
- Slashing: Protocol-defined penalties (slashing) for malicious behavior secure the network.
- Security Budget: The cost to attack the network is tied to the total value staked (TVS) or the hashrate, creating a measurable crypto-economic barrier.
Upgrade Governance
Changes to enshrined components require coordinated protocol upgrades, governed by the chain's social and technical processes.
- Process: Involves Ethereum Improvement Proposals (EIPs), client team coordination, and validator/node operator adoption.
- Challenge: Upgrades are slower and require broad consensus, reducing deployment agility but increasing stability and security review.
- Contrast: Modular components (e.g., an L2's sequencer) can upgrade independently, which is faster but can fragment security models.
Security Considerations
Enshrined security refers to critical consensus and safety mechanisms that are built directly into a blockchain's core protocol, offering fundamental guarantees that cannot be removed or altered without a network-wide upgrade.
Protocol-Level Guarantees
These are the immutable security primitives defined by the protocol's consensus rules. Key examples include:
- Slashing conditions for validator misbehavior in Proof-of-Stake networks.
- Block finality rules that prevent chain reorganizations beyond a certain depth.
- Maximum extractable value (MEV) mitigation techniques like proposer-builder separation (PBS). These rules are enforced by all honest nodes, providing a cryptoeconomic security floor for the entire network.
Contrast with Application Layer
Enshrined security differs fundamentally from security delegated to smart contracts or Layer 2s. For example:
- An enshrined bridge is part of the consensus protocol (e.g., Ethereum's Beacon Chain withdrawals), whereas a smart contract bridge relies on its own code and multi-sigs.
- Enshrined rollup sequencing would be mandated by L1, versus the current model where sequencers are appointed by L2 teams. This distinction highlights the trade-off between maximum security and development flexibility.
The Trust Minimization Spectrum
Not all protocol features are fully enshrined. Security exists on a spectrum:
- Fully Enshrined: Validator set selection, transaction ordering finality.
- Partially Reliant: Certain data availability solutions or light client protocols that depend on a subset of honest actors.
- Externally Dependent: Features like oracles or cross-chain messaging, which typically reside in smart contracts and introduce additional trust assumptions. The goal is to maximize enshrinement for core safety properties.
Upgrade Risks & Governance
While enshrined features are stable, changing them carries systemic risk. This involves:
- Hard forks: Required for any modification, demanding overwhelming consensus.
- Governance attacks: Attempts to influence protocol upgrades for malicious changes become high-value targets.
- Implementation bugs: A bug in an enshrined feature (e.g., a flaw in a slashing condition) can be catastrophic, as seen in early blockchain incidents. This contrasts with a buggy dApp, which has limited scope.
Economic Security & Staking
In Proof-of-Stake networks, enshrined security is quantifiable as economic security. It is a function of:
- Total Value Staked (TVS): The amount of native token locked in the consensus mechanism.
- Slashing penalties: The protocol-defined cost of attacking or deviating.
- Inactivity leaks: Automated mechanisms to reduce the stake of offline validators. This creates a cryptoeconomic barrier where attacking the network becomes financially irrational, as the cost exceeds potential profit.
Future Evolution: Enshrined Rollups
A major debate is whether to enshrine more Layer 2 functionality. Proposals include:
- Enshrined Data Availability: Using the L1 blockchain as a guaranteed data layer for rollups.
- Enshrined Sequencing: The L1 protocol ordering transactions for rollup blocks.
- Enshrined Proving: A native, protocol-level zero-knowledge verifier. Proponents argue this eliminates trust in L2 operator sets, while critics warn of protocol bloat and reduced innovation pace at the application layer.
Evolution in Modular Design
This section examines the architectural shift from isolated, monolithic blockchains to modular designs that leverage the foundational security of a primary chain, a concept known as enshrined security.
Enshrined security is a design paradigm in which a modular blockchain, such as a rollup or a specialized execution layer, inherits its cryptographic security guarantees directly from a more established, underlying blockchain, known as a settlement layer or Layer 1 (L1). This is achieved by posting transaction data and state commitments to the L1, allowing its decentralized validator set to act as a universal arbiter of truth. The security is 'enshrined' because it is a core, non-negotiable property of the system's architecture, not an optional add-on or a subjective social consensus.
The evolution toward this model addresses the security trilemma—the challenge of achieving scalability, security, and decentralization simultaneously. Early monolithic blockchains often forced trade-offs, while early modular experiments relied on external, often less secure, validator sets. Enshrined security allows new chains to bootstrap trust by leveraging the battle-tested economic security (e.g., the staked ETH in Ethereum's consensus) of the parent chain. This creates a hierarchy where security is a shared resource, enabling innovation in execution and data availability without starting from zero.
Key implementations of enshrined security include optimistic rollups and zk-rollups on Ethereum. An optimistic rollup posts batched transaction data to Ethereum and assumes validity unless challenged, relying on Ethereum's L1 to adjudicate fraud proofs. A zk-rollup provides validity proofs (ZK-SNARKs/STARKs) that are verified by an Ethereum smart contract, offering immediate finality. In both cases, the data availability of the transaction data on the L1 is critical, as it allows anyone to reconstruct the rollup's state and verify its integrity, ensuring the system remains trust-minimized.
The primary benefit is shared security, which reduces capital and coordination costs for new chains. However, it introduces dependencies, such as being subject to the base layer's congestion and fees for data posting. Furthermore, the security model is only as strong as its weakest link; a flaw in the bridge or verification contract on the L1 can compromise the entire system. This has led to rigorous formal verification of these core components and ongoing research into sovereign rollups and validiums, which offer different trade-offs between security and scalability.
Looking forward, enshrined security is becoming the gold standard for modular blockchain construction. It enables a vibrant ecosystem of interoperable, specialized chains—often called Layer 2s (L2s) or modular execution layers—that are secured by a common, robust foundation. This architectural pattern is fundamental to the vision of a modular blockchain stack, where security, data availability, consensus, and execution are separated into specialized layers, each optimized for its specific role while being cryptographically anchored to a root of trust.
Frequently Asked Questions
Enshrined security refers to core protocol-level protections that are native, immutable, and non-bypassable. This section answers common questions about its implementation, benefits, and trade-offs compared to modular or application-layer security models.
Enshrined security is a blockchain design principle where critical security functions, such as consensus, data availability, and bridging, are implemented as immutable, non-bypassable components of the core protocol layer. This contrasts with modular architectures where these functions are outsourced to external, potentially upgradeable systems. The primary goal is to provide a unified, cryptographically guaranteed security model for all applications built on the chain, eliminating trust assumptions in external providers. For example, in an enshrined rollup, the protocol itself guarantees the availability of transaction data and the validity of state transitions, rather than relying on a separate data availability committee or an external proof system that could be altered or censored.
Further Reading
Explore the core concepts, trade-offs, and real-world implementations of security models that are built directly into a blockchain's protocol.
Consensus Mechanisms
The foundation of enshrined security. These are the protocol-level rules that define how network participants agree on the state of the ledger.
- Proof of Work (PoW): Uses computational puzzles to secure the network (e.g., Bitcoin).
- Proof of Stake (PoS): Uses staked cryptocurrency to validate and secure the network (e.g., Ethereum).
- Delegated Proof of Stake (DPoS): Stakeholders elect a set of validators to produce blocks.
Modular vs. Monolithic
A key architectural debate impacting security.
- Monolithic Blockchains (e.g., Bitcoin, Solana) bundle execution, consensus, and data availability into a single layer, maximizing enshrined security but limiting flexibility.
- Modular Blockchains (e.g., Celestia, Ethereum with rollups) separate these functions. This introduces sovereignty and scalability but relies on the security of the underlying data availability and settlement layer.
The Appchain Thesis
The argument for building application-specific blockchains. Instead of a shared smart contract platform, an app deploys its own chain (e.g., using Cosmos SDK or Polygon CDK). This allows for:
- Customized security parameters (block time, validator set).
- Sovereign control over upgrades and governance.
- Maximized performance for a specific use case, but requires bootstrapping its own validator network and security.
Economic Security & Slashing
The cryptoeconomic component of enshrined security, primarily in PoS systems. Validators must stake a significant amount of the native token.
- Slashing is the protocol-enforced penalty for malicious or negligent behavior (e.g., double-signing, downtime), where a portion of the stake is burned.
- This creates a cost-of-attack that is economically prohibitive, directly tying the chain's security to the value and distribution of its staked assets.
Shared Security Models
Hybrid approaches that blend enshrined and borrowed security.
- Ethereum Rollups: Inherit security from Ethereum's consensus and data availability while executing transactions off-chain.
- Cosmos Interchain Security: Allows a parent chain (e.g., Cosmos Hub) to provide its validator set to secure a consumer chain, for a fee.
- Polygon Avail: Provides a robust data availability layer that other chains can use as a security primitive.
Real-World Example: Bitcoin
The canonical example of maximal enshrined security. Every rule is defined by the protocol:
- Fixed supply of 21 million BTC is hard-coded.
- Consensus changes require overwhelming miner/node adoption (hard forks).
- No governance tokens or councils – security is purely from PoW and decentralized node operation. This creates extreme credible neutrality and predictability but limits programmability and upgrade speed.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.