Avalanche Subnets
Custom blockchain networks with independent validator sets and sovereign control.
What are Avalanche Subnets?
Avalanche subnets are independent blockchain networks that run on the Avalanche infrastructure. Each subnet has its own validator set, rules, and governance, allowing organizations to create custom blockchains tailored to their specific needs.
Unlike Ethereum Layer 2 rollups that inherit Ethereum's security, subnets operate with independent security models. This design choice prioritizes flexibility and sovereignty over shared security, making subnets ideal for applications requiring custom validator requirements or regulatory compliance.
How Subnet Security Works
Independent Validator Sets
Each subnet chooses its own validators, hardware requirements, and validator count. Two subnets can have radically different security guarantees based on their validator configurations.
Primary Network Requirement
All subnet validators must also validate Avalanche's Primary Network (X, C, and P chains). This creates economic alignment through AVAX staking requirements but does not provide automatic security inheritance.
Security is Opt-In, Not Inherited
Subnets must actively recruit validators and design for decentralization. A subnet with fewer validators will be faster and cheaper to operate but will have a lower security threshold compared to one with many validators.
Important: Subnets are not like Ethereum Layer 2 solutions.
They operate with independent security while leveraging Avalanche's validator requirements, tooling, and economic alignment. Security varies from subnet to subnet based on validator participation.
What Avalanche Provides to Subnets
Consensus Framework
Proven consensus protocol and network infrastructure for reliable operation.
Development Tooling
Complete SDK and tools for building and deploying custom blockchain networks.
Economic Alignment
Validators stake AVAX on the Primary Network, creating shared economic incentives.
Interoperability
Built-in mechanisms for cross-subnet communication and asset transfers.
What Avalanche Does NOT Provide
- ×Automatic security inheritance or protection from attacks
- ×Guaranteed full validator participation across all subnets
- ×Cross-subnet slashing or unified validator enforcement
Why Choose Subnets?
Customization
Define your own validator requirements, gas tokens, transaction formats, and virtual machine implementations.
Compliance
Implement KYC/AML requirements for validators or users, meeting regulatory needs for enterprise or institutional applications.
Performance
Optimize for your specific use case with custom parameters, avoiding network congestion from unrelated applications.
Sovereignty
Maintain complete control over your blockchain's governance, upgrades, and operational parameters.