Point of Contact: Jack Melnick, TG: jackmelnick, email: jmelnick@polygon.technology
We propose to authorize Polygon Labs to deploy Uniswap’s protocol to the Polygon Zero Knowledge Ethereum Virtual Machine rollup known as “zkEVM” on behalf of the community.
We believe this is the right moment for Uniswap v3 to deploy on Polygon zkEVM, for several major reasons:
Polygon Labs is the leading platform for Ethereum scaling and infrastructure development. It is rapidly building a suite of protocols that will offer developers easy access to all major scaling and infrastructure solutions:
The Polygon network is by far the most adopted scaling effort in the Ethereum ecosystem, with 3,000+ applications hosted, 1B+ transactions processed, 100M+ unique user addresses and ~$5B+ in assets secured.
There’s significant value in Uniswap being available on an EVM compatible ZK rollup. Deploying early on zkEVM helps solidify Uniswap’s place as the number one DEX and a thought leader.
Importantly, it will help grow a large list of projects that can be built on Uniswap V3. Additionally, given the community and user uptake Uniswap has seen on Polygon PoS, it’s only natural to make its deployment on Polygon zkEVM a priority.
This proposal is being made by Jack Melnick, DeFi BD Lead, an employee of Polygon Labs. Polygon Labs is a legal entity focused on the ecosystem growth and maintenance of the suite of Polygon Networks.
The legal entity that is supporting this proposal is Polygon Labs Services (Switzerland) AG, a Swiss corporation known as “Polygon Labs”.
There is no delegate co-authoring or sponsoring this proposal. Instead, this is a proposal submitted by Jack Melnick of Polygon Labs to support the growth of Polygon as part of the overall Polygon community.
There are no existing financial or contractual relationships between Polygon Labs and any of Uniswap’s legal entities, including Uniswap Labs, UNI tokens, nor investments of Uniswap Labs Ventures.
There are generally 2 forms of projects:
Success Criteria: A successful zkEVM deployment will, in an organic and sustained manner, grow Uniswap’s Total Addressable Market across TVL, unique interacting wallet, volumes, and integration with partner dApps. As demand for zk-blockchains and proximity to Ethereum rises, users and builders will increasingly look to zkEVM solutions to build and trade.
Risk Profile: Deploying on zkEVM should pose minimal risks, relative to deploying on alternate blockchains. As an Ethereum Layer Two, it uses Zero Knowledge proofs to inherit Ethereum’s core safety, while allowing developers to easily deploy existing EVM codebases.
The bridge has been disintermediated, and Uniswap can expect reputable Oracle providers to be available as data providers from Day One. Polygon’s zkEVM testnet has been running for the past six months, and has accumulated over 84,000 wallets, 75,000 ZK proofs, and 300,000 blocks. Additionally, the deployment has been audited multiple times, by auditors including Spearbit and Hexens.
Primary risks, as always, include still unforeseen vectors, which can be mitigated through close work with Polygon developer support (whenever needed) and gradual deployment of liquidity on the new chain.
Please address the following questions if you’re proposing a cross-chain deployment:
Does the bridge support arbitrary message passing? Yes
Is the bridge secured by a trusted entity, by a multi sig, or a protocol/set of incentivized nodes? No trusted entity, multi-sig, or a protocol/set of incentivized nodes, only L1 and L2 security. Pure smart contract interactions only.
Does the bridge leverage the security of the source chain (e.g. Ethereum L1) or destination chain, or is security provided by another third party entity? All based on L1 and L2. L2 security is based on the L1.
Is it possible for a fraudulent message to be passed to the destination chain? If so, are there any recall mechanisms? There are two ways to use the bridge:
What are the ramifications of fraud to the malicious actor? Here we assume no possibility for fraud.
Has the bridge code been audited? By a third party? What attack vectors and vulnerabilities were identified, if any? Have the identified vulnerabilities been remedied? There is an ongoing audit process by a third party. We will not go to Mainnet without the results from the audit and vulnerabilities remedied.