![Network Highlight: Cycle](/content/images/size/w960/2025/02/caps-raised--9-.png)
Network Highlight: Cycle
Cycle Network is now live on Symbiotic mainnet, enabling cross-chain transactions through Verifiable State Aggregation (VSA). By combining their state aggregation technology with Symbiotic's economic security, Cycle creates a more efficient alternative to traditional bridge architectures, enabling chain abstraction.
Cross-Chain State Security
Cycle's integration leverages Symbiotic's vaults to enforce correct state verification across chains. Cycle's architecture divides functionality into three distinct layers:
- Security Layer: Operators stake collateral through Symbiotic vaults, facing slashing for incorrect state proofs
- Extended Layer: Manages interactions with source and destination chains
- Cycle Layer: Aggregates verified state from cross-chain transactions
This design allows users to interact with liquidity across Non-EVM and EVM networks without relying on traditional bridge infrastructure. When operators submit state proofs, their staked collateral enforces honest behavior through well-defined slashing conditions.
Capital-Efficient Security
Cycle's implementation showcases how Symbiotic's security model can adapt to complex verification requirements. Rather than each chain maintaining isolated security, operators stake collateral that secures state verification across the entire network. This reduces capital requirements while maintaining strong economic guarantees.
The platform currently supports transactions across more than 20 blockchain networks, with each new chain integration inheriting the same security model through Symbiotic's shared security mechanics. This unified approach simplifies cross-chain interactions for both users and developers.
Building on Mainnet
With the mainnet deployment, Cycle is focused on improving user experience by expanding supported networks and improving their developer tools. Their growing ecosystem demonstrates how protocols can leverage Symbiotic's modular security primitives while maintaining control over their core infrastructure.
For technical details about Cycle's implementation, visit their documentation or follow them on X. To learn more about securing your protocol with Symbiotic, reach out to us here.