In a rapidly diversifying blockchain environment, protocols that promise seamless cross-chain communication are in high demand.
Currently, the Web3 landscape is extremely fragmented, which makes cross-chain functionality a pivotal concept. It’s clear that cross-chain interoperability – the ability of different blockchain networks to communicate and interact seamlessly – is not just a convenience but has become a necessity.
What is Concero Protocol?
Concero is a decentralized protocol designed to facilitate both value transfer and message passing across different blockchains. As described in the Concero V1 whitepaper, the protocol initially focused on migrating assets between chains. It also enables arbitrary data messages. This approach was supported by integrations with Chainlink CCIP for settlement and Chainlink Functions for off-chain computation and verification.
With security and speed as guiding principles, the V1 architecture featured a layered model. A “top layer” that handled intent (user transactions or dApp requests), an “execution layer” to handle on-chain orchestration to ensure finalized cross-chain asset transfers. By anchoring these interactions in decentralized oracle networks, Concero sought to remove single points of failure and reduce reliance on trusted intermediaries.
How Does Concero Scale Cross-Chain Messaging?
While many interoperability solutions concentrate on bridging tokens, Concero underscored how critical secure messaging is for verifying and executing cross-chain operations. According to the V1 whitepaper, it uses a modular approach that leverages existing infrastructure like Chainlink’s decentralized off-chain compute. This design offers two main benefits for scaling:
Optimistic Execution Layer: In V1, Concero relies on Chainlink Functions for rapid message verification. Multiple nodes in a decentralized oracle network confirm on-chain events through diverse RPC endpoints. Concero disperses risk and increases throughput without compromising on security using consensus mechanism.
Tiered Security and Liquidity: Concero’s architecture decouples messaging from asset bridging by delegating direct liquidity provision to specialized pools. Concero’s fallback mechanism, where a user’s assets default to a slower settlement path if instant liquidity is unavailable, allows the messaging component to remain lightweight.
This separation means Concero can handle large volumes of messages quickly, as it does not have to manage all bridging functions itself.
From Cross-Chain Bridging to Messaging
Concero V1 offers decentralized asset transfers via Chainlink CCIP and Chainlink Functions. However, it recognized that coupling bridging functionality directly within the protocol limited flexibility and modularity. The next iteration, Concero V2, strips away the built-in bridging mechanism, concentrating on secure and verifiable messaging across any blockchain.
For users and developers who need cross-chain asset transfers, Concero V2 points to integrators such as Lanca. By decoupling the protocols in this way, Concero V2 can remain specialized, while Lanca leverages Concero’s infrastructure to securely move assets between different networks.
Core Architecture

Concero V2 retains key elements from its predecessor, but reconfigures them around message passing rather than native liquidity pools or token transfers. The protocol’s architecture includes:
Router Contracts
Deployed on multiple chains to accept incoming messages. These routers record user transactions and emit events for further processing by relayers and verification modules.
Chainlink Functions
Acting as the central verifier, ‘Chainlink Functions’ checks if a transaction actually occurred on the source chain by gathering confirmations from multiple RPC endpoints. Its decentralized oracle network then signs a report, which requires at least three out of four node signatures, before sending it back on-chain.

Relayer Nodes
Relayer A
It orchestrates the core message flow. Relayer A listens about events from the source router, sends the relevant data to the Chainlink Functions–enabled network (Base), and forwards the resulting verification report to the destination chain’s router contract.
Relayer B & Existing Messaging Protocols
It is an optional node that offers an additional verification layer if developers want extra assurance for messages that might indirectly relate to value or other high-stakes actions.
Symbiotic Restaking
Node operators must stake collateral through the Symbiotic protocol, facing potential slashing if they propagate incorrect data. This economic penalty mechanism discourages malicious behaviour and aligns operator incentives with the overall security of the network.
Message Types
While Concero V2 can still handle different categories of cross-chain communications, its primary job is messaging rather than direct asset bridging. Concero outlines three broad message types of the protocol:
Non-Value Bearing Messages
Ideal for quick data transfers, such as sending instructions, commands, or proofs across chains. These can rely on standard verification through Relayer A and Chainlink Functions.
Value-Bearing Messages
It refers to the messages that may trigger a follow-up action on another protocol. Developers often configure more rigorous verification, such as adding Relayer B if the message’s outcome involves financial consequences.
Pure Arbitrary Data
V2 can also handle larger payloads, around 1.875 MB on EVM-based networks, useful for any scenario that requires bulk data migration without tying up network resources.
V2 doesn’t lock or unlock funds itself. Instead, protocols like Lanca leverage Concero’s message passing capabilities to facilitate the actual token or asset movement. This compartmentalization is intended to offer a cleaner division of responsibilities: Concero for verifiable messaging, Lanca for bridging.
Security Layers and Risk Management
Two main pillars sustain Concero V2’s security model:
Economic Penalties
Operators have to register through Symbiotic and stake assets as collateral. If a node submits false claims or manipulates transaction data, it faces slashing—a direct financial loss that strongly discourages misconduct.
Cryptographic Verification
Even if relayers are compromised, final approval resides in a cryptographically verifiable report from Chainlink Functions. Since data must be signed by a majority of DON (Decentralized Oracle Network) nodes, no single relayer can finalize or forge a cross-chain transaction.
Additionally, a challenge period of roughly between 10 and 20 seconds provides a quick window for disputes. If the network identifies any discrepancies in relayer-reported data during this interval, the operators can be penalized before any downstream protocols act on the message.
Integration with Lanca
Although Concero V2 is devoted to messaging, Oleg Kron, Co-Founder & CTO of Concero & Lanca acknowledges that cross-chain users often want seamless value transfers. That’s where Lanca comes in. As an integrator built on top of Concero, Lanca listens for Concero V2 messages that indicate a transfer request.
It uses the same optional relayers, economic security, and Chainlink Functions validations, plus potentially its own layers of verification, to confirm that assets can be unlocked on the destination chain.
Lanca also manages liquidity pools, lock-and-mint functionalities, or other bridging mechanics independent of Concero, but relies on Concero’s message confirmations to ensure trustless execution.
Conclusion
Concero V2 is a messaging protocol that can slot into any blockchain environment and communicate arbitrary data without imposing direct bridging features. The shift away from built-in asset transfers may not only simplify Concero’s role but can also encourage a broader ecosystem of integrators to develop bridging or other cross-chain applications on top of its messaging capabilities.
And as blockchain projects continue to specialize, more emphasis on focus is required to scale securely.