The Hibiscus V7 celestia upgrade, taking place in mid-March, aims to refine interoperability and sovereignty for networks built on the modular data availability layer.
Key features of the Hibiscus V7 release
The Hibiscus (V7) release for Celestia is scheduled for mid-March and addresses a long-standing trade-off between sovereignty and interoperability. By tightening the interaction between networks, rollups and app chains built on Celestia feel more unified while maintaining their independence.
Additionally, the upgrade introduces two important capabilities to improve cross-chain operations. First a new one forwarding module focuses on user-friendly token routing via Hyperlane. Secondly, a ZK Interchain security module (ZK ISM) provides cryptographic authentication for cross-chain messages, designed for high-performance operations with minimum trust.
CIP-45: Forwarding module for streamlined token routing
CIP-45 provides a forwarding module that makes this possible single-signature token transfers about chains via Hyperlane. Previously, users often had to sign multiple transactions when sending assets from one chain, via Celestia, to a final destination chain, creating additional friction and operational risks.
Now users send tokens to deterministically derived forwarding addresses that cryptographically bind to a specific destination and recipient. However, the actual transfer is carried out by execution without the relayer’s permissionwhich forwards money to the pre-specified address. This gives Hyperlane routes the same multi-hop convenience as IBC‘s Packet Forward Middleware already provides IBC-based transfers.
That said, this design maintains no-custodial guarantees and hides routing complexity from end users. It is especially relevant for applications that expect frequent cross-chain movements but want to keep the signing flow simple and predictable.
CIP-46: ZK Interchain Security Module
CIP-46 introduces a zero-knowledge proof-based system Hyperlane Interchain Security Module (x/zkism), adding cryptographic security to cross-chain messaging. It is currently using Groth16 authentication to support the trust-minimized validation of messages instead of relying solely on trusted multisig validators.
This module allows networks to configure their own proof-based security using SP1 prover programs, with planned future support for other ZK virtual machines such as Risk0. Additionally, this flexibility enables verification of consensus proofs, TEE-based attestations, or full ZK execution proofs for interchain transfers passed through Celestia.
With the new ZK ISM, applications can choose between multisig-based or cryptographically proof-based authentication, depending on their risk profile. While proof generation may be more expensive and introduce additional latency compared to a multisig ISM, it provides stronger guarantees suitable for high-value transfers, institutional flows, or ecosystems that value trust over speed.
In this context, the Celestia upgrade strengthens Hyperlane as a foundation for secure, programmable cross-chain messaging and helps align security assumptions for interconnected rollups.
CIP-44: Adjust commission limits for validators
CIP-44 focuses on validator economics. It increases the validator’s maximum commission rate from 25% Unpleasant 60%while also increasing the minimum commission enforced by the protocol 10% Unpleasant 20%. This adjustment follows the reduction in protocol inflation associated with the previous network upgrade.
Consequently, the new limits are intended to allow validators to perform more sustainable activities as the rewards diminish over time. Validators currently charging less than 20% commission will automatically be migrated to one 20% at the time of upgrade, ensuring consistent base economy across the entire active set.
Improvements in consensus pruning for node operators
The Hibiscus release (V7) also revises the block saving rules for consensus nodes. Now operators can use the pruning window for consensus nodes as low as 3,000 blockswhich corresponds to approximately the last five hours of the chain’s history under normal conditions.
Previously, the minimum storage requirement was approximately 14 days’ worth of blocks, which entailed heavier storage needs and maintenance costs. However, the bottom window gives node operators more flexibility to manage disk usage, especially for high-throughput chains that generate large amounts of block data.
Deployment across testnets and mainnet
The V7 release is being rolled out in phases in different countries Celestia-based networks. The Arabic network is already live with the upgrade and serves as an early environment for testing real-world behavior.
Meanwhile, the mocha testnet is soon undergoing an upgrade, which means a next step before the mainnet implementation. The Mainnet activation is scheduled for mid-March, subject to the usual checks and operational readiness among validators, infrastructure providers and application builders.
Who should pay attention to Hibiscus V7
Teams building high-throughput, low-latency exchanges or payment-oriented chains will benefit most from Hibiscus. Furthermore, protocols that rely heavily on cross-chain flows can combine multi-hop-like Hyperlane routing and zk interchain security particularly attractive.
Developers looking for a more scalable infrastructure are encouraged to contact Celestia’s ecosystem team, including the Head of Partnershipsknown as @0xNorocto explore how these new capabilities can support production-ready deployments.
Overall, Hibiscus (V7) marks a meaningful evolution in Celestia’s modular stack, combining more flexible economics, leaner node operations, and stronger interoperability guarantees for the next wave of on-chain applications.
