You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In my opinion the main purpose of this repository is to provide an index of StandardBridge compatible tokens. That is, tokens compatible with the IOptimismMintableERC20 or IL2StandardERC20 interfaces.
What we have instead is many 3rd party bridge tokens (Layer Zero OFTs, Wormhole NTTs, etc) that are not compatible with the native StandardBridge contracts but specify a bridge override. In my opinion these should be specify the nobridge: true flag so they don't show up in the generated optimism.tokenlist.json file.
If bridge frontends relying on this generated file correctly interpret the bridge override, the UX is that tokens show up but are not bridgeable
If bridge frontends relying on this generated file don't account for the bridge override, losses can occur. Here are a few examples of this happening,
Neither of these cases are desirable so I'd prefer if these were just automatically filtered out. I believe the CI checks used to enforce this, but they've been slightly altered and now if a bridge override is present it still allows adding tokens with a warning.
The text was updated successfully, but these errors were encountered:
In my opinion the main purpose of this repository is to provide an index of
StandardBridge
compatible tokens. That is, tokens compatible with theIOptimismMintableERC20
orIL2StandardERC20
interfaces.What we have instead is many 3rd party bridge tokens (Layer Zero OFTs, Wormhole NTTs, etc) that are not compatible with the native StandardBridge contracts but specify a bridge override. In my opinion these should be specify the
nobridge: true
flag so they don't show up in the generated optimism.tokenlist.json file.If bridge frontends relying on this generated file correctly interpret the bridge override, the UX is that tokens show up but are not bridgeable
If bridge frontends relying on this generated file don't account for the bridge override, losses can occur. Here are a few examples of this happening,
Neither of these cases are desirable so I'd prefer if these were just automatically filtered out. I believe the CI checks used to enforce this, but they've been slightly altered and now if a bridge override is present it still allows adding tokens with a warning.
The text was updated successfully, but these errors were encountered: