Get Started
How it works
The V8 bridge deployment system follows a series of automated steps to establish a secure, trustless bridge between networks. Deployed on the Layerswap V8 Protocol, the bridge leverages advanced Atomic Swaps for seamless and secure cross-chain transactions. Learn more about the protocol here.
Deployment Steps
- Validates Network Parameters (e.g., chain IDs, RPCs)
- Bootstraps Solver (LP) with initial liquidity from the canonical bridge
- Deploys V8 Contracts on your network
- Configures Routes for all existing networks and supported assets
- Adds Your Network to the V8 Bridge UI
Security Note: The V8 Protocol ensures trustless asset exchange via atomic swaps, eliminating counterparty risk and third-party reliance.
For API endpoints and a detailed explanation of each, check the API documentation.