Meta Yield NFT
  • Meta Yield
    • Welcome to Meta Yield
  • White Paper
    • Welcome to Meta Yield
    • Meta Yield Introduction
      • What is Meta Yield?
      • Why Meta Yield
  • Meta Yield Protocol
    • Inside Meta Yield
    • Gas Fees
    • Fraud Proofs
  • Tokenomics
  • $MY Token Utility
  • Roadmap
  • Referral Commission Mechanism— Meta Yield (MY)
  • Backers and ECO Partners
  • Ecosystem
    • Airdrop
  • Brick touch game
  • Meta Yield Pools
    • Token Flow Diagram
    • ROI Projection Table
    • Dashboard UX Mockup Idea
  • BOX Meta Yield
  • Blind box + NFT
  • developer
    • Deploy contract on Meta Yield mainnet
      • Foundry
      • Hardhat
      • Remix
  • Deploy contract on Hal Testnet
    • Foundry
    • Hardhat
    • Remix
  • support
    • Official Links
Powered by GitBook
On this page
  1. Meta Yield Protocol

Fraud Proofs

Fraud Proofs on Meta Yield ($MY) Chain

Meta Yield Chain utilizes Fraud Proofs that are isomorphic to the ones employed by Base. This mechanism ensures that Meta Yield is capable of providing a high level of security and trust, relying on robust fraud detection and validation processes.

Fraud proofs are designed to detect and prevent invalid state transitions in the blockchain. If a malicious actor attempts to submit an invalid transaction, these fraud proofs provide a method to challenge and prove that the transaction is incorrect. This ensures that the integrity of the Meta Yield ecosystem is maintained, even in the presence of malicious actors attempting to manipulate the state.

How Fraud Proofs Work on Meta Yield ($MY) Chain:

  1. Transaction Submission: A transaction is submitted to Meta Yield Chain, which includes a state transition and other relevant data.

  2. Challenge Period: Once the transaction is posted, there is a designated challenge period where users can submit fraud proofs if they believe the transaction is invalid.

  3. Fraud Proof Detection: If a fraud proof is submitted, it will be evaluated by validators and the network. If the proof is valid, the transaction will be rejected, and the malicious actor will be penalized.

  4. Security Assurance: By utilizing fraud proofs in this manner, Meta Yield Chain ensures the security of its Layer 2 transactions. Even if an invalid transaction is posted, it can be contested and rejected, preventing malicious behavior from affecting the network.


Isomorphism with Base’s Fraud Proofs

Meta Yield Chain’s fraud proofs are designed to be isomorphic to the fraud proofs used by Base. The fraud proofs on both chains are based on similar principles and algorithms, ensuring that Meta Yield inherits the same level of security and scalability that Base provides. This similarity allows Meta Yield to maintain compatibility with established standards in the blockchain industry while leveraging advanced fraud proof mechanisms to secure the ecosystem.

For more detailed information about how fraud proofs function on Base and their underlying technology, we recommend reviewing the Base Fraud Proof Documentation.

By adopting this mechanism, Meta Yield Chain continues to prioritize trustlessness, decentralization, and security, enabling a stable and reliable blockchain environment for NFTs, DeFi, and beyond.


This updated version ensures that Meta Yield ($MY) is aligned with the technology from Base, maintaining a secure, scalable, and decentralized platform for its users.

PreviousGas FeesNextTokenomics

Last updated 1 month ago