CCIP Best Practices

Before you deploy your cross-chain dApps to mainnet, make sure that your dApps follow the best practices in this document. You are responsible for thoroughly reviewing your code and applying best practices to ensure that your cross-chain dApps are secure and reliable. If you have a unique use case for CCIP that might involve additional cross-chain risk, contact the Chainlink Labs Team before deploying your application to mainnet.

Verify destination chain

Before calling the router's ccipSend function, ensure that your code allows users to send CCIP messages to trusted destination chains.

Example: For an example of how to verify the destination chain, refer to the Transfer Tokens with Data - Defensive example.

Verify source chain

When implementing the ccipReceive method in a contract residing on the destination chain, ensure to verify the source chain of the incoming CCIP message. This verification ensures that CCIP messages can only be received from trusted source chains.

Example: For an example of how to verify the source chain, refer to the Transfer Tokens with Data - Defensive example.

Verify sender

When implementing the ccipReceive method in a contract residing on the destination chain, it's important to validate the sender of the incoming CCIP message. This check ensures that CCIP messages are received only from trusted sender addresses.

Note: Depending on your use case, this verification might not always be necessary.

Example: For an example of how to verify the sender of the incoming CCIP message, refer to the Transfer Tokens with Data - Defensive example.

Verify router addresses

When you implement the ccipReceive method in the contract residing on the destination chain, validate that the msg.sender is the correct router address. This verification ensures that only the router contract can call the ccipReceive function on the receiver contract and is for developers that want to restrict which accounts are allowed to call ccipReceive.

Example: For an example of how to verify the router, refer to the Transfer Tokens with Data - Defensive example.

Using extraArgs

The purpose of extraArgs is to allow compatibility with future CCIP upgrades. To get this benefit, make sure that extraArgs is mutable in production deployments. This allows you to build it offchain and pass it in a call to a function or store it in a variable that you can update on-demand.

If extraArgs are left empty, a default of 200000 gasLimit will be set.

Setting gasLimit

The gasLimit specifies the maximum amount of gas CCIP can consume to execute ccipReceive() on the contract located on the destination blockchain. It is the main factor in determining the fee to send a message. Unspent gas is not refunded.

To transfer tokens directly to an EOA as a receiver on the destination blockchain, the gasLimit should be set to 0 since there is no ccipReceive() implementation to call.

To estimate the accurate gas limit for your destination contract, consider the following options:

Example: For an example of how to estimate the gas limit, refer to the Optimizing Gas Limit Settings in CCIP Messages guide.

Setting allowOutOfOrderExecution

The allowOutOfOrderExecution parameter enables you to control the execution order of your messages on the destination blockchain. This parameter is part of EVMExtraArgsV2 and is available only on lanes where the Out of Order Execution property is set to Optional or Required. Refer to the CCIP Directory to determine if your target lane supports this feature.

Best Practices

  • When allowOutOfOrderExecution is Optional:

    • You can set allowOutOfOrderExecution to either true or false, depending on your application's requirements.
      • true: Messages can be executed in any order relative to other messages from the same sender. If a previous message has not yet been executed on the destination chain, it does not block the execution of subsequent messages.
      • false: Messages are executed in order. CCIP ensures that preceding messages are processed before executing the current message.
  • When allowOutOfOrderExecution is Required:

    • You must set allowOutOfOrderExecution to true. This setting acknowledges that messages may be executed out of order. If set to false, the message will revert and will not be processed.
    • This requirement is enforced on lanes where technical constraints necessitate out-of-order execution, such as mitigating issues related to zero-knowledge proof limitations. For more information, see the proof overflow problem.

Decoupling CCIP Message Reception and Business Logic

As a best practice, separate the reception of CCIP messages from the core business logic of the contract. Implement 'escape hatches' or fallback mechanisms to gracefully manage situations where the business logic encounters issues. To explore this concept further, refer to the Defensive Example guide.

Evaluate the security and reliability of the networks that you use

Although CCIP has been thoroughly reviewed and audited, inherent risks might still exist based on your use case, the blockchain networks where you deploy your contracts, and the network conditions on those blockchains.

Review and audit your code

Before securing value with contracts that implement CCIP interfaces and routers, ensure that your code is secure and reliable. If you have a unique use case for CCIP that might involve additional cross-chain risk, contact the Chainlink Labs Team before deploying your application to mainnet.

Soak test your dApps

Be aware of the Service Limits and Rate Limits for Supported Networks. Before you provide access to end users or secure value, soak test your cross-chain dApps. Ensure that your dApps can operate within these limits and operate correctly during usage spikes or unfavorable network conditions.

Monitor your dApps

When you build applications that depend on CCIP, include monitoring and safeguards to protect against the negative impact of extreme market events, possible malicious activity on your dApp, potential delays, and outages.

Create your own monitoring alerts based on deviations from normal activity. This will notify you when potential issues occur so you can respond to them.

Best Practices for Cross-Chain Token (CCT) Administration

When managing your tokens and token pools, it's critical to follow best practices to ensure the security and integrity of your cross-chain operations. This includes proper handling of admin roles and safeguarding against unauthorized access.

Securely Manage Admin Roles

The token admin is responsible for configuring token pools across blockchains and enabling cross-chain operations. This role allows the token admin to set the token pool for a token on each supported CCIP blockchain. To ensure security, follow these guidelines:

  • Understand the Responsibilities of a Token Developer: Review Token Developer Responsibilities.
  • Assign Admin Roles with Caution: Only trusted EOAs or smart accounts should be assigned the token admin role.
  • Use Multi-Signature Smart Accounts: For added security, consider assigning the token admin role to a multi-signature smart account. This ensures that multiple approvals are required for critical operations.

Protect Against Unauthorized Admin Actions

  • Monitor Admin Activity: Implement monitoring systems to track any actions taken by token admins, token pool owners, and rate limit admins. This helps detect unauthorized attempts to modify configurations or execute cross-chain transfers.

  • Limit Admin Privileges When Possible: For example, instead of giving the full owner access to manage rate limits, consider assigning the rate limit admin role, which is specifically responsible for updating rate limits.

  • Leverage Smart Contract Audits: Ensure your tokens and token pools are audited and follow secure development practices.

Best Practices for Token Pool Owners and Rate Limit Admins

  • Token Pool Owner Responsibilities: The token pool owner can enable remote chains, set remote pool addresses for a given chain selector, and configure rate limits. Ensure that this role is assigned to a trusted EOA or smart account, and monitor activity regularly.

  • Set Rate Limits Appropriately: Ensure that you set appropriate rate limits for outbound and inbound token transfers when configuring token pools.

  • ** Delegate Rate Limit Admin Role **: The rate limit admin is an optional role that the token pool owner can assign to another trusted entity using the setRateLimitAdmin () function. The rate limit admin can only manage rate limits, so this role provides a way to delegate responsibility without giving full access to the token pool configuration.

Best Practices for Liquidity Management

Effective liquidity management is crucial for ensuring the smooth operation of token pools, especially in Lock and Release token pools. The most critical aspect is ensuring that the token pool has enough liquidity available when it is acting in reception mode (on the destination blockchain), allowing tokens to be released to the receiver. Failure to manage liquidity will result in a degraded user experience and can result in user funds being ‘stuck’ in transit.

Ensure Sufficient Liquidity

When a LockReleaseTokenPool operates in reception mode (on the destination blockchain), it releases the tokens locked in the token pool. The pool must have sufficient liquidity to ensure that tokens can be released to the receiver. If the pool lacks liquidity, the release operation will fail and user funds will not be available on the destination blockchain until sufficient liquidity is replenished and manual execution is performed.

  • Best Practice: Estimate expected volume when preparing to add and manage liquidity to ensure sustainable operations.
  • Best Practice: Regularly monitor the liquidity available in your token pool and ensure that there is always enough liquidity to support the release of tokens to the receiver when the pool acts as the destination.

Avoid Fragmented Liquidity with Multiple Issuing Blockchains

Using a Lock and Unlock mechanism across multiple issuing blockchains can lead to fragmented liquidity, making it more difficult to maintain sufficient liquidity in each pool.

  • Best Practice: Where possible, avoid using the Lock and Unlock mechanism across multiple issuing blockchains. Fragmented liquidity increases operational overhead and complicates liquidity management.

Monitor Liquidity Health and Automate Alerts

Monitoring the health of your token pool’s liquidity is essential for ensuring the liveness of cross-chain transfers. Automated alerts can notify you if liquidity falls below a certain threshold, allowing you to take action before transfers fail.

  • Best Practice: Calculate the amount of time required to deplete your token pool to various threshold levels (ie: Low: 50% [Warning], Very Low [Critical] 30%) and utilize automated alerting and pre-defined operational procedures to ensure adequate preparedness to respond by replenishing the pool before users are impacted. For this calculation, be sure to assume users will utilize max capacity transfers paired with token pool’s refill rate.

Use the provideLiquidity and withdrawLiquidity Functions Properly

In pools like the LockReleaseTokenPool, liquidity providers can add and remove liquidity using the provideLiquidity and withdrawLiquidity functions.

  • Best Practice: Only trusted entities, such as a designated rebalancer, should be allowed to manage liquidity. Make sure to configure liquidity controls securely to prevent unauthorized liquidity manipulation.

Set and Manage the Rebalancer Role

The rebalancer is responsible for managing the liquidity of the pool and ensuring that there is always sufficient liquidity when needed. They can rebalance liquidity between different pools or pool versions if necessary.

  • Best Practice: Assign the rebalancer role to a trusted entity and ensure they understand the responsibilities, such as maintaining liquidity in the pool to support token releases.

Multi-Signature Contracts

Multi-signature contracts, such as Safe Smart Accounts, enhance security for managing token pools by requiring multiple signatures to authorize transactions.

Threshold configuration

Set an optimal threshold for signers based on the trust level of participants and the required security.

Role-based access control

Assign roles with specific permissions to different signers, limiting access to critical operations to trusted individuals.

Hardware wallet integration

Use hardware-backed keys for signers to safeguard private keys from online vulnerabilities. Ensure that these devices are secure and regularly updated.

Regular audits and updates

Conduct periodic audits of signer access and contract settings. Update the multisig setup as necessary, especially when personnel changes occur.

Emergency recovery plans

Implement procedures for recovering from lost keys or compromised accounts, such as a predefined recovery multisig or recovery key holders.

Transaction review process

Establish a standard process for reviewing and approving transactions, which can include a waiting period for large transfers to mitigate risks and verifying data on a hardware wallet before signing to protect against front-end compromises.

Security tooling

Tools such as Tenderly or Hypernative can provide additional layers of security related to transaction simulation, risk monitoring, and alerting.

Documentation and training

Maintain thorough documentation of multisig operations and provide training for all signers to ensure familiarity with processes and security protocols.

What's next

Get the latest Chainlink content straight to your inbox.