Skip to content

Proof of Exploit Consensus (PoE)


Since the computation of the Firewall EVM is zkVM compatible, users will be able to prove if a transaction should have been identified as an exploit or if it was improperly censored.

Exploit Censorship

The Safe Sequencer can censor transactions (a requirement to censor exploits) and therefore needs to have its power checked by proofs from third-parties.

Users will be able to prove if the Safe Sequencer performed invalid censorship by using the L1 inbox. Transactions submitted to the L1 inbox must be included in the chain, unless the Firewall EVM identifies the transaction as an exploit.