// trustless, permissionless cross-chain bridging

From the first day of designing the TRAIN protocol every step we've taken and every design decision we've made has been guided by two fundamental rails:

Trustless

Users should be able to transfer assets between chains without ever losing control of their funds.

Permissionless

Networks should be able to join the protocol without approvals or gatekeepers.

The TRAIN Protocol uses an intent/solver based system secured by Atomic Swaps and Local Verification (e.g. Light Client running inside a browser). This ensures uniform, trustless security across all chains. The architecture allows any network to integrate under the same security framework, enabling infinite scalability.

// all our work is open-source under the MIT license: protocol contracts, bridging dApp, solver agent