Attacks on layer 2 blockchains
Some of the attacks are similar to layer 1 attacks; however, some are novel and specific to layer 2:
- Transaction censoring: In layer 2 systems, if a rollup provider is centralized, that could result in transaction censoring.
- Attacks on a rollup provider: There can be several attacks against a rollup provider, including DoS, and any other usual attacks that could be carried out against a node, including viruses/malware and network attacks.
- Data availability attacks: There are two options available for data availability. One is to store the data on a chain to ensure its availability and the other is to store it off-chain with third-party entities, which will make it available when required. Usually, economic incentives are applied to reward off-chain entities to store data. However, badly designed incentive mechanisms or centralized service providers could censor the data, which can lead to unintended consequences. Also, in the...