website logo
ConnextBlogBridgeAcademy
⌘K
🚀CONNEXT WIKI
What is Connext?
Connext Bridge
NEXT Token
Supported Chains
Connextscan
FAQs
💢CONNEXT ECOSYSTEM
Connext Team
Backers
🤖ECOSYSTEM ROLES
Community Leaders
Amarok Pilot Dev
Ecosystem
Router Operator
Subgraph Provider
Testers
Connextooor
Bridgooor
Developer
Contributors
Quarantine
Status
🏅ROUTERS
What is a Router?
Router Requirements
Revenue Streams of Routers
Slashing Mechanism
Staking Mechanism
✨TECHNICAL DOCUMENTATION
Introduction
Connext Network
nxtp
🧁PROTOCOL UPDATES
Amarok
💥CONNEXT DAO
💫RESOURCES
Important Links
Brand Kit
Events
Telegram Groups
Newsletter
Docs powered by archbee 
2min

Security Model

Connext’s underlying core security model follows the same approach as other locking systems like HTLCs. All interactions across blockchains are provided with 1:1 bridging of assets (e.g. USDC on ETH to USDC on Polygon).  

Risks 

Loss of Funds 

Barring a protocol hack or a user error, users cannot lose funds in the Connext system.

Transfers will either be routed through the “fast liquidity” track immediately or will be subject to the 30-minute lasting “slow liquidity” mechanism provided via Nomad.  

Updated 22 Apr 2022
Did this page help you?
Yes
No
UP NEXT
nxtp
Docs powered by archbee 
TABLE OF CONTENTS
Risks 
Loss of Funds