Chuỗi

BNB Smart Chain

Build web3 dApps effortlessly

BNB Beacon Chain

Sunset soon

Lớp quản trị & stake của hệ sinh thái BNB Chain

Tài liệuGitHubFaucetStake BNBBscScanBSCTraceDev ToolsLearn more about FusionTài liệuTrình khám phá Beacon ChainTài liệuGitHubFaucetCầu nốiGreenfieldScanDCellarDev ToolsTài liệuGitHubFaucetCầu nốiopBNBScanDev ToolsTài liệuGitHub

Nhà phát triển


Submit dApps

BNB Smart ChainBNB GreenfieldopBNBzkBNBBNB HackBNB Incubation Alliance (BIA)Chương trình tăng tốc MVBBNB Chain GrantsKhởi độngGas GrantsTVL Incentive ProgramMEME Coins InnovationXem tất cả các chương trình

Hệ sinh thái

Staking

Earn BNB and rewards effortlessly

Tokenization Solutions

Get Your Business Into Web3

Native StakingLiquid StakingCompany TokenizationReal World Assets TokenizationNFT Loyalty Program

Cộng đồng

Liên hệ ngayGet Started
Liên hệ ngayGet Started

BNB Chain Fusion

BNB Chain

Fusion


The BNB Chain Fusion is a strategic shift to migrate the BNB Beacon Chain’s functionalities to BNB Smart Chain (BSC) and retire BNB Beacon Chain. This move aims to streamline the network, improve efficiency, reduce security risks, and align BNB Chain's architecture with the current technological demands and future growth.

15 April 2024

BNB Beacon Chain First Sunset Fork

18 April 2024

BNB Smart Chain Feynman Hardfork

14 July 2024

BNB Beacon Chain Second Sunset Fork

19 November 2024

BNB Beacon Chain Final Sunset Fork

03 December 2024

Post Fusion

Shutdown BNB Beacon Chain validator nodes

Publish BNB Beacon Chain balance dump

Enable token recovery for bound BEP2/BEP8 assets

How to Recover

What shall Stakeholders Do?

BEP2/BEP8 Token Issuers

Action

  • Bind their valuable tokens and notify users for transfer them to BSC

Risk if Action is not Taken

The tokens not binded will be lost and cannot recover anymore

Estimated Deadline

Jun 2024

Read More

BEP2/BEP8 Token Holders

Action

  • Cross-transfer their tokens to BSC

Risk if Action is not Taken

Although after the final sunset users still can recover tokens if binded, it will be much more difficult and incur lock duration

Estimated Deadline

Jun 2024

Read More

Validators

Action

  • Create new validator and migrate delegations

Risk if Action is not Taken

Lose the validator seat for voting power will be migrated to BSC

Estimated Deadline

Apr 2024

Read More

Delegators

Action

  • Migrate staking to BSC native staking

Risk if Action is not Taken

Less or no further income for voting power will be migrated to native BSC staking

Estimated Deadline

Apr 2024

Read More

Atomic Swap Projects

Action

  • Disable atomic swap feature in their apps

Risk if Action is not Taken

Impact the apps’ functionalities for atomic swap is disabled on Beacon Chain

Estimated Deadline

Apr 2024

Read More

CEXs (Central Exchanges)

Action

  • Disable deposit for assets not binded
  • Finally sunset the deposits & withdrawals of Beacon Chain

Risk if Action is not Taken

The deposited tokens not binded will be lost and cannot recover anymore

Estimated Deadline

Jun 2024

Read More

Staking Pools

Action

  • Migrate staking to BSC native staking

Risk if Action is not Taken

Less or no further income for voting power will be migrated to native BSC staking

Estimated Deadline

Jun 2024

Read More

Wallets

Action

  • Support cross-chain transfer if possible
  • Sunset the support of Beacon Chain

Risk if Action is not Taken

-

Estimated Deadline

Jun 2024

All Communities

Action

  • Verify their accounts after the balance dump is published

Risk if Action is not Taken

Invalid dump will lead to fund lost

Estimated Deadline

Aug 2024

Other Projects

Action

  • Adjust their projects for Beacon Chain sunset accordingly

Risk if Action is not Taken

-

bug bounty
program

Secure the Ecosystem and Get Double Rewards!

We invite the security research community to rigorously examine the designated codebase and uncover potential vulnerabilities. During the BNB Chain Fusion process, we are providing the Double Bounty Rewards at our discretion for validly submitted security vulnerabilities.

Submit

Further Reading