Skip to main content

Modular Security

Hyperlane is secured by Interchain Security Modules (ISMs). ISMs are smart contracts that are responsible for verifying that interchain messages being delivered on the destination chain were actually sent on the origin chain.

Core Concepts

Default vs Custom ISM

Developers can either use the Mailbox's default ISM or specify their own application-specific ISM.

Application-specific ISM can be:

  • Configured: Use pre-built ISMs with custom parameters
  • Composed: Combine multiple ISMs together like security "legos"
  • Customized: Create entirely new ISMs tailored to specific needs
info

The "default ISM" refers to the pre-configured security module on the Mailbox contract (that is the Multisig ISM) which is used when applications don't specify their own custom ISM.

Configure

Hyperlane defines a set of pre-built ISMs. Developers can deploy any of these contracts "off-the-shelf" and configure them with their own parameters.

For example, application developers that want increased sovereignty over interchain security could deploy a Multisig ISM configured with validators sourced from their own community.

Compose

ISMs act as "security legos". Developers can mix and match different ISMs together to encode a security model that best fits their needs.

For example, application developers that want additional security could deploy an Aggregation ISM that requires verification by both a Multisig ISM configured with validators from the Hyperlane community, and a Wormhole ISM that verifies that a quorum of the Wormhole validator set verified the message.

Customize

ISMs are fully customizable. Developers can write their own ISMs, tailoring them to the needs of their application.

For example, application developers can build ISMs that adjust security models based on message content. High value and infrequent messages (e.g. governance) could be verified by a security model that prioritizes safety over latency and gas costs. Lower value and more frequent messages could be verified by a security model that prioritizes latency and gas costs over safety.

tip

Learn how to Create your own ISM

Available ISMs

Standard ISMs

Standard ISMs are pre-built modules developed by the AW team.

ISM TypeDescriptionType
Multisig ISMVerifies messages through validator consensusStandard
Routing ISMRoutes verification to different ISMs based on origin chain or message contentStandard
Aggregation ISMCombines multiple ISMs to require verification from several sourcesStandard
CCIP-Read ISMVerifies messages using off-chain data sourcesStandard

Community ISMs

Community ISMs are developed and maintained by the community to extend ISM capabilities.

ISM TypeDescriptionType
Wormhole ISMVerifies messages using attestations from Wormhole's guardian networkCommunity
Polygon PoS ISMUses Polygon's state sync mechanism for secure message passing between Ethereum ↔ Polygon PoSCommunity
Optimistic ISMImplements an optimistic verification model with a fraud window where watchers can flag fraudulent messagesCommunity
OP Stack ISMUses OP Stack rollup's settlement layer security for messages between Ethereum ↔ OP Stack rollupsCommunity
Arbitrum L2 to L1 ISMUses Arbitrum rollup's security properties for messages sent from Arbitrum L2 ↔ EthereumCommunity