๐Ÿ”ญ Votemarket Overview
๐Ÿ›๏ธ How it Works

Building the Future of Vote Incentivization

A Deep Dive into Votemarket's Architecture

๐ŸŒŸ Introduction

Votemarket's new architecture brings a whole new level of vote incentivization through a cross-chain architecture powered by storage proofs and oracles. This evolution maintains the trustless, on-chain nature of V1 while solving its core limitations.

By leveraging oracle networks and block-level proofs, we eliminate the need for weekly claims while expanding to Layer 2 networks.

๐Ÿ” Proof-Based Verification System

The new version of Votemarket now leverages the Ethereum stack, quite similar to how light nodes verify blockchain data via just block headers (opens in a new tab), using storage proofs to validate gauge contract states:

  • โœ… Block headers contain Merkle roots that enable verification of gauge states, votes, and voting power
  • ๐Ÿ” Proofs are cryptographically secure - any tampering invalidates verification
  • ๐Ÿ”‘ Anyone can validate data without permission or trust requirements
  • ๐Ÿ“ฆ Historical vote data now stored and verifiable efficiently through proofs mechanisms.

This proof system, tested in V1 (opens in a new tab), has been optimized to enable more flexible data to be passed, and so reducing size and complexity.

โšก Vote Checking Architecture

โš ๏ธ

Important: All operations (claims, managing campaigns, etc.) require epochs to be updated sequentially. For instance, if the last update occurred at epoch 100 and the current epoch is 103, the updates must proceed in the following order: 101 โ†’ 102 โ†’ 103.

VS

๐Ÿ”‘ Key Features

  • ๐Ÿ“ฆ Multi-week claim periods
  • ๐Ÿ”Œ Hook system for custom implementations (e.g. Liquidity Mining)
  • โšซ๏ธโšช๏ธ Blacklist/Whitelist for campaigns
โš ๏ธ

This architecture resolves the core limitations of the first version, while enabling a more flexible and dynamic incentive distribution system. The design allows Votemarket to be deployed on any sidechain with an Ethereum bridge, significantly expanding its reach and utility. By moving core operations to L2 while maintaining L1 security through storage proofs, V2 achieves both scalability and trustlessness.

๐Ÿ’ซ User & Project Flows

Following diagrams illustrate the flows for users and projects on Votemarket.

Token transfers between Layer 1 and Layer 2 networks are handled through our built-in LaPoste bridge system, enabling secure cross-chain operations

๐Ÿ›ก๏ธ Security

Audit

Votemarket V2 contracts have been audited by Trust (opens in a new tab).