Description
Investigate established patterns on how others are using/implementing EIP-7888, particularly when it comes to proving or validating the L2 anchored block hashes were valid on L1
Motivation
Prevent rebuilding patterns and overcomplicating it
Tasks
Acceptance criteria
Risks
Description
Investigate established patterns on how others are using/implementing EIP-7888, particularly when it comes to proving or validating the L2 anchored block hashes were valid on L1
Motivation
Prevent rebuilding patterns and overcomplicating it
Tasks
Acceptance criteria
Risks