Ethereum stands at an inflection point. While the Ethereum Virtual Machine (EVM) has powered a decade of blockchain innovation—creating the foundation for DeFi and NFTs—it’s becoming increasingly clear that this custom-built execution layer wasn’t designed for the computational future that’s now arriving. The shift toward zero-knowledge (ZK) verification and the emergence of a general machine structure in system programming standards are forcing a reckoning: Can Ethereum’s aging architecture adapt, or does it need a complete reimagining?
According to technical researchers and Ethereum Foundation leadership, the answer is becoming unmistakable. The protocol is charting a course toward replacing the EVM with RISC-V, an open-source instruction set architecture that promises to unlock scalability, reduce complexity, and align Ethereum with the broader ecosystem of verifiable computing.
The Performance Crisis No One Talks About: Why EVM Can’t Keep Up with ZK
The bottleneck isn’t immediately obvious, but it’s fundamental. When Ethereum begins proving its state transitions through zero-knowledge proofs—an essential pathway for scaling L1—the current zkEVM implementation creates a crushing performance penalty.
Here’s the technical reality: Today’s zkEVM doesn’t directly prove EVM execution. Instead, it proves an interpreter that has been compiled into RISC-V code. This extra abstraction layer is the culprit. The performance cost? Estimates range from 50 to 800 times slower than native execution. Even after optimizing other components—such as switching to more efficient hashing algorithms—block execution remains the bottleneck, accounting for 80-90% of all proof generation time.
As Vitalik Buterin succinctly framed the issue: If the zkVM ultimately compiles everything into RISC-V anyway, why force smart contract developers to work through an EVM intermediary that adds nothing but overhead?
This isn’t theoretical. The performance gap translates directly into economics. Eliminating this interpretive layer could improve execution efficiency by roughly 100 times—a difference that separates viable scaling from continued congestion.
Technical Debt Buried in the Protocol
The EVM’s design choices made perfect sense in 2015, but they’ve calcified into limitations. Consider three specific problems:
Precompiled contracts as a patch that failed. When the EVM couldn’t efficiently handle certain cryptographic operations, Ethereum added hardcoded functions—precompiled contracts. This seemed pragmatic temporarily. Today, it’s created what Vitalik calls a “bad” situation: these modules have bloated Ethereum’s trusted codebase to unsustainable levels and introduced repeated security risks that have come dangerously close to causing consensus failures.
Adding new precompiles requires contentious hard forks and involves wrapper code more complex than entire RISC-V implementations. Vitalik’s conclusion: the protocol should stop adding precompiles entirely.
256-bit architecture for the wrong use case. The EVM’s 256-bit stack was designed for cryptographic values, but most smart contracts operate with 32 or 64-bit integers. This mismatch creates a cruel efficiency equation: smaller numbers save no resources while doubling or quadrupling complexity. In ZK proof systems, this inefficiency is magnified.
Stack vs. registers. The EVM’s stack-based architecture requires more instructions than RISC-V’s register model to perform identical operations, complicating compiler optimization and increasing proof generation load.
These accumulated design choices aren’t bugs—they’re architectural constraints that made sense once but have become incompatible with Ethereum’s future.
RISC-V: Why an Open Standard Beats Custom Design
RISC-V isn’t proprietary technology. It’s an open-source instruction set standard—essentially a freely available blueprint for processor design. Its adoption for this role is neither arbitrary nor experimental.
Why simplicity is strength. RISC-V’s foundational instruction set contains approximately 47 instructions. This radical minimalism is intentional. Fewer instructions mean a smaller trusted codebase—easier to audit, formally verify, and prove secure. As Jeremy Bruestle emphasized at industry conferences, this design is “almost perfect for the super-minimal general machine we need.”
Ecosystem maturity through LLVM. By choosing an established standard, Ethereum gains access to decades of compiler infrastructure. Through LLVM support, developers can use any mainstream programming language—Rust, C++, Go, Python—and compile directly to RISC-V. This eliminates the need to rebuild an entire development ecosystem from scratch. Justin Drake articulated the strategic advantage: “We get all high-level languages supported by LLVM for free.”
zkVM convergence is already happening. The market has already voted. Among the ten most advanced zkVM implementations capable of proving Ethereum blocks, nine have chosen RISC-V. This isn’t speculation—it’s practical validation. The zero-knowledge ecosystem has standardized on RISC-V as the execution target, making Ethereum’s adoption not a gamble but an alignment with where the industry is heading.
Formal verification becomes possible. Unlike the EVM’s Yellow Paper specification—written in natural language and prone to ambiguity—RISC-V has an official SAIL specification that’s machine-readable. This mathematical rigor enables zkVM circuits to be verified directly against the specification, creating a path toward provable correctness that the EVM could never offer.
Hardware security boundaries built in. RISC-V includes a privileged architecture with user mode and supervisor mode. Smart contracts run in user mode and cannot directly access blockchain state; instead, they issue ECALL requests to a trusted kernel. This creates a security boundary enforced by the processor architecture itself—far more robust than software-only sandboxing. As Diego from Cartesi explained, “All these protection mechanisms are part of the RISC-V standard.”
The Three-Phase Transition: Risk Mitigation Through Gradualism
Ethereum isn’t planning a sudden switchover. The migration follows a deliberately conservative roadmap:
Phase 1: RISC-V as a precompile replacement. Initially, the protocol stops adding new EVM precompiles. Instead, new cryptographic functionality is implemented through whitelisted RISC-V programs. This allows the new architecture to undergo mainnet testing in a controlled, low-risk environment before broader adoption.
Phase 2: Dual virtual machine coexistence. Smart contracts gain the ability to declare whether their bytecode targets EVM or RISC-V. Crucially, contracts in both environments can call each other through standardized ECALL system calls. This creates a hybrid period where both architectures operate together, validating interoperability before full migration.
Phase 3: EVM as a simulated contract. The endgame treats the EVM as a high-level language—a formally verified smart contract running natively on RISC-V L1. Legacy applications remain permanently supported, but the protocol’s core execution layer becomes pure RISC-V, drastically simplifying client development and maintenance.
This phased approach transforms a potentially catastrophic migration into a manageable evolution.
The Ecosystem Realignment: Winners and Losers
The shift doesn’t affect all Layer 2s equally—it creates winners and losers.
Optimistic Rollups face architectural challenges. Projects like Arbitrum and Optimism rely on fraud proofs: disputing a transaction requires re-executing it on L1. If L1’s VM changes from EVM to RISC-V, this security model collapses. These projects face a choice: undertake massive engineering efforts to redesign fraud proofs for the new architecture, or decouple from Ethereum’s security model entirely. Both options are expensive.
ZK Rollups gain massive strategic advantage. Projects like Polygon, zkSync, and Scroll have already standardized on RISC-V internally. An L1 that “speaks their language” eliminates translation layers. What Ethereum Foundation calls “native Rollups” becomes possible: L2 becomes a specialized instance of L1’s execution environment, sharing tools, compilers, and formal verification infrastructure. The practical outcome: L2 teams no longer build bridges between incompatible VMs, development costs plummet, and gas economics align more rationally.
Developer experience transforms. Instead of learning Solidity exclusively, developers write in Rust, Go, or any LLVM-supported language. Contracts can use mature libraries from the broader software ecosystem. Vitalik compares it to Node.js: on-chain and off-chain code unified in the same language, with the same tooling. This barrier reduction will likely reshape who can participate in blockchain development.
User economics improve dramatically. Proof costs drop by approximately 100-fold. Transaction fees for L1 and L2 settlement decline correspondingly. This unlocks “Gigagas L1”—roughly 10,000 transactions per second—enabling complex applications that require both throughput and security.
Succinct Labs and SP1: Proving the Vision Works Today
The transition isn’t purely theoretical. Succinct Labs has already demonstrated RISC-V’s practical advantages through SP1, an open-source zkVM that proves the architectural thesis works.
SP1’s innovation: it adopts a “precompile-centric” design that solves EVM’s cryptographic bottleneck without creating the complexity problem. Intensive operations like Keccak hashing run in specialized ZK circuits, called through standard ECALL instructions. This combines custom hardware performance with software flexibility.
The practical impact is immediate. Succinct’s OP Succinct product gives Optimistic Rollups zero-knowledge capabilities. The result: instead of waiting seven days for final confirmation and withdrawal, transactions finalize in approximately one hour. For the entire OP Stack ecosystem, this speed improvement addresses a critical pain point.
Succinct also operates a decentralized Prover Network, creating a market for proof generation. This isn’t a proof of concept—it’s a blueprint for the economic model that will govern verifiable computing at scale.
The Hidden Risks: What Can Still Go Wrong
Despite RISC-V’s advantages, the transformation introduces novel risks:
Gas measurement complexity. Assigning a fair, deterministic gas cost to general-purpose instructions is an unsolved problem. Simple instruction counting is vulnerable to denial-of-service attacks. An attacker could design programs that repeatedly trigger cache misses, consuming massive resources while incurring minimal gas costs. This threatens network stability and economic models.
Toolchain security and reproducible builds. This is the most dangerous and underestimated risk. Security shifts from relying on on-chain VMs to relying on off-chain compilers like LLVM—complex software known to contain vulnerabilities. An attacker exploiting compiler bugs could transform seemingly safe source code into malicious bytecode. Equally challenging: ensuring compiled binaries match publicly available source code (the “reproducible build” problem) across different build environments. Minor environment variations produce different outputs, creating trust and transparency issues.
These risks are solvable but not trivial.
Mitigation: Defense in Depth
Phased rollout as primary strategy. By introducing RISC-V gradually through precompiles, then dual VMs, then full replacement, the protocol builds operational experience and confidence before committing irreversibly. This staged approach is the foundational risk management tool.
Aggressive testing and formal verification. While formal verification is the long-term goal, it must be paired with continuous high-intensity testing. Security firms like Diligence have already discovered 11 critical soundness and integrity vulnerabilities in leading zkVMs through fuzz testing. This pattern—vulnerabilities hiding in well-designed systems—mandates parallel testing and verification strategies, not sequential ones.
Standardization to prevent fragmentation. The community should adopt a single standard RISC-V configuration, likely RV64GC with Linux-compatible ABI. This maximizes toolchain support and prevents ecosystem splintering, allowing developers to benefit fully from LLVM’s ecosystem advantages.
The Verifiable Internet Layer: Ethereum’s Long Game
The EVM-to-RISC-V transition isn’t primarily about incremental performance gains. It’s about repositioning Ethereum from a “smart contract virtual machine” toward becoming the verifiable trust foundation for general-purpose internet computing.
Vitalik’s framing captures the endgame: “The end goal includes… making everything ZK-snarkified.”
This transformation addresses Ethereum’s “Lean Execution” pillar—part of the broader “Lean Ethereum” vision. The protocol simplifies from a monolithic VM into a minimalist settlement and data availability layer optimized for verifiable computation. Hardware proof acceleration (ASICs and FPGAs from SP1, Nervos, Cartesi) becomes feasible once the instruction set stabilizes around RISC-V.
The transition is inevitable not because it’s optimal in isolation, but because it aligns with where computation itself is heading. ZK proofs represent the third cryptographic primitive after hashes and signatures. Ethereum’s bet is that whoever provides the foundational trust layer for verifiable computing—native integration of a general machine structure in system programming—controls the next era of the internet.
Despite substantial technical and social hurdles, this restructuring of Ethereum’s execution layer represents one of the most consequential architectural decisions in blockchain history. It trades the network effects of EVM familiarity for the strategic positioning of leading the verifiable computing revolution.
The transformation begins now. Projects like Ethproofs aggregate the collaborative data necessary to execute this shift. Teams like Succinct Labs provide the practical blueprints. Within 6-12 months, expect the first precompile alternatives running RISC-V code on Ethereum mainnet—marking the beginning of the end for the Ethereum Virtual Machine as we know it.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
When Ethereum Ditches EVM for RISC-V: The Architecture Overhaul That Could Redefine Blockchain Computing
Ethereum stands at an inflection point. While the Ethereum Virtual Machine (EVM) has powered a decade of blockchain innovation—creating the foundation for DeFi and NFTs—it’s becoming increasingly clear that this custom-built execution layer wasn’t designed for the computational future that’s now arriving. The shift toward zero-knowledge (ZK) verification and the emergence of a general machine structure in system programming standards are forcing a reckoning: Can Ethereum’s aging architecture adapt, or does it need a complete reimagining?
According to technical researchers and Ethereum Foundation leadership, the answer is becoming unmistakable. The protocol is charting a course toward replacing the EVM with RISC-V, an open-source instruction set architecture that promises to unlock scalability, reduce complexity, and align Ethereum with the broader ecosystem of verifiable computing.
The Performance Crisis No One Talks About: Why EVM Can’t Keep Up with ZK
The bottleneck isn’t immediately obvious, but it’s fundamental. When Ethereum begins proving its state transitions through zero-knowledge proofs—an essential pathway for scaling L1—the current zkEVM implementation creates a crushing performance penalty.
Here’s the technical reality: Today’s zkEVM doesn’t directly prove EVM execution. Instead, it proves an interpreter that has been compiled into RISC-V code. This extra abstraction layer is the culprit. The performance cost? Estimates range from 50 to 800 times slower than native execution. Even after optimizing other components—such as switching to more efficient hashing algorithms—block execution remains the bottleneck, accounting for 80-90% of all proof generation time.
As Vitalik Buterin succinctly framed the issue: If the zkVM ultimately compiles everything into RISC-V anyway, why force smart contract developers to work through an EVM intermediary that adds nothing but overhead?
This isn’t theoretical. The performance gap translates directly into economics. Eliminating this interpretive layer could improve execution efficiency by roughly 100 times—a difference that separates viable scaling from continued congestion.
Technical Debt Buried in the Protocol
The EVM’s design choices made perfect sense in 2015, but they’ve calcified into limitations. Consider three specific problems:
Precompiled contracts as a patch that failed. When the EVM couldn’t efficiently handle certain cryptographic operations, Ethereum added hardcoded functions—precompiled contracts. This seemed pragmatic temporarily. Today, it’s created what Vitalik calls a “bad” situation: these modules have bloated Ethereum’s trusted codebase to unsustainable levels and introduced repeated security risks that have come dangerously close to causing consensus failures.
Adding new precompiles requires contentious hard forks and involves wrapper code more complex than entire RISC-V implementations. Vitalik’s conclusion: the protocol should stop adding precompiles entirely.
256-bit architecture for the wrong use case. The EVM’s 256-bit stack was designed for cryptographic values, but most smart contracts operate with 32 or 64-bit integers. This mismatch creates a cruel efficiency equation: smaller numbers save no resources while doubling or quadrupling complexity. In ZK proof systems, this inefficiency is magnified.
Stack vs. registers. The EVM’s stack-based architecture requires more instructions than RISC-V’s register model to perform identical operations, complicating compiler optimization and increasing proof generation load.
These accumulated design choices aren’t bugs—they’re architectural constraints that made sense once but have become incompatible with Ethereum’s future.
RISC-V: Why an Open Standard Beats Custom Design
RISC-V isn’t proprietary technology. It’s an open-source instruction set standard—essentially a freely available blueprint for processor design. Its adoption for this role is neither arbitrary nor experimental.
Why simplicity is strength. RISC-V’s foundational instruction set contains approximately 47 instructions. This radical minimalism is intentional. Fewer instructions mean a smaller trusted codebase—easier to audit, formally verify, and prove secure. As Jeremy Bruestle emphasized at industry conferences, this design is “almost perfect for the super-minimal general machine we need.”
Ecosystem maturity through LLVM. By choosing an established standard, Ethereum gains access to decades of compiler infrastructure. Through LLVM support, developers can use any mainstream programming language—Rust, C++, Go, Python—and compile directly to RISC-V. This eliminates the need to rebuild an entire development ecosystem from scratch. Justin Drake articulated the strategic advantage: “We get all high-level languages supported by LLVM for free.”
zkVM convergence is already happening. The market has already voted. Among the ten most advanced zkVM implementations capable of proving Ethereum blocks, nine have chosen RISC-V. This isn’t speculation—it’s practical validation. The zero-knowledge ecosystem has standardized on RISC-V as the execution target, making Ethereum’s adoption not a gamble but an alignment with where the industry is heading.
Formal verification becomes possible. Unlike the EVM’s Yellow Paper specification—written in natural language and prone to ambiguity—RISC-V has an official SAIL specification that’s machine-readable. This mathematical rigor enables zkVM circuits to be verified directly against the specification, creating a path toward provable correctness that the EVM could never offer.
Hardware security boundaries built in. RISC-V includes a privileged architecture with user mode and supervisor mode. Smart contracts run in user mode and cannot directly access blockchain state; instead, they issue ECALL requests to a trusted kernel. This creates a security boundary enforced by the processor architecture itself—far more robust than software-only sandboxing. As Diego from Cartesi explained, “All these protection mechanisms are part of the RISC-V standard.”
The Three-Phase Transition: Risk Mitigation Through Gradualism
Ethereum isn’t planning a sudden switchover. The migration follows a deliberately conservative roadmap:
Phase 1: RISC-V as a precompile replacement. Initially, the protocol stops adding new EVM precompiles. Instead, new cryptographic functionality is implemented through whitelisted RISC-V programs. This allows the new architecture to undergo mainnet testing in a controlled, low-risk environment before broader adoption.
Phase 2: Dual virtual machine coexistence. Smart contracts gain the ability to declare whether their bytecode targets EVM or RISC-V. Crucially, contracts in both environments can call each other through standardized ECALL system calls. This creates a hybrid period where both architectures operate together, validating interoperability before full migration.
Phase 3: EVM as a simulated contract. The endgame treats the EVM as a high-level language—a formally verified smart contract running natively on RISC-V L1. Legacy applications remain permanently supported, but the protocol’s core execution layer becomes pure RISC-V, drastically simplifying client development and maintenance.
This phased approach transforms a potentially catastrophic migration into a manageable evolution.
The Ecosystem Realignment: Winners and Losers
The shift doesn’t affect all Layer 2s equally—it creates winners and losers.
Optimistic Rollups face architectural challenges. Projects like Arbitrum and Optimism rely on fraud proofs: disputing a transaction requires re-executing it on L1. If L1’s VM changes from EVM to RISC-V, this security model collapses. These projects face a choice: undertake massive engineering efforts to redesign fraud proofs for the new architecture, or decouple from Ethereum’s security model entirely. Both options are expensive.
ZK Rollups gain massive strategic advantage. Projects like Polygon, zkSync, and Scroll have already standardized on RISC-V internally. An L1 that “speaks their language” eliminates translation layers. What Ethereum Foundation calls “native Rollups” becomes possible: L2 becomes a specialized instance of L1’s execution environment, sharing tools, compilers, and formal verification infrastructure. The practical outcome: L2 teams no longer build bridges between incompatible VMs, development costs plummet, and gas economics align more rationally.
Developer experience transforms. Instead of learning Solidity exclusively, developers write in Rust, Go, or any LLVM-supported language. Contracts can use mature libraries from the broader software ecosystem. Vitalik compares it to Node.js: on-chain and off-chain code unified in the same language, with the same tooling. This barrier reduction will likely reshape who can participate in blockchain development.
User economics improve dramatically. Proof costs drop by approximately 100-fold. Transaction fees for L1 and L2 settlement decline correspondingly. This unlocks “Gigagas L1”—roughly 10,000 transactions per second—enabling complex applications that require both throughput and security.
Succinct Labs and SP1: Proving the Vision Works Today
The transition isn’t purely theoretical. Succinct Labs has already demonstrated RISC-V’s practical advantages through SP1, an open-source zkVM that proves the architectural thesis works.
SP1’s innovation: it adopts a “precompile-centric” design that solves EVM’s cryptographic bottleneck without creating the complexity problem. Intensive operations like Keccak hashing run in specialized ZK circuits, called through standard ECALL instructions. This combines custom hardware performance with software flexibility.
The practical impact is immediate. Succinct’s OP Succinct product gives Optimistic Rollups zero-knowledge capabilities. The result: instead of waiting seven days for final confirmation and withdrawal, transactions finalize in approximately one hour. For the entire OP Stack ecosystem, this speed improvement addresses a critical pain point.
Succinct also operates a decentralized Prover Network, creating a market for proof generation. This isn’t a proof of concept—it’s a blueprint for the economic model that will govern verifiable computing at scale.
The Hidden Risks: What Can Still Go Wrong
Despite RISC-V’s advantages, the transformation introduces novel risks:
Gas measurement complexity. Assigning a fair, deterministic gas cost to general-purpose instructions is an unsolved problem. Simple instruction counting is vulnerable to denial-of-service attacks. An attacker could design programs that repeatedly trigger cache misses, consuming massive resources while incurring minimal gas costs. This threatens network stability and economic models.
Toolchain security and reproducible builds. This is the most dangerous and underestimated risk. Security shifts from relying on on-chain VMs to relying on off-chain compilers like LLVM—complex software known to contain vulnerabilities. An attacker exploiting compiler bugs could transform seemingly safe source code into malicious bytecode. Equally challenging: ensuring compiled binaries match publicly available source code (the “reproducible build” problem) across different build environments. Minor environment variations produce different outputs, creating trust and transparency issues.
These risks are solvable but not trivial.
Mitigation: Defense in Depth
Phased rollout as primary strategy. By introducing RISC-V gradually through precompiles, then dual VMs, then full replacement, the protocol builds operational experience and confidence before committing irreversibly. This staged approach is the foundational risk management tool.
Aggressive testing and formal verification. While formal verification is the long-term goal, it must be paired with continuous high-intensity testing. Security firms like Diligence have already discovered 11 critical soundness and integrity vulnerabilities in leading zkVMs through fuzz testing. This pattern—vulnerabilities hiding in well-designed systems—mandates parallel testing and verification strategies, not sequential ones.
Standardization to prevent fragmentation. The community should adopt a single standard RISC-V configuration, likely RV64GC with Linux-compatible ABI. This maximizes toolchain support and prevents ecosystem splintering, allowing developers to benefit fully from LLVM’s ecosystem advantages.
The Verifiable Internet Layer: Ethereum’s Long Game
The EVM-to-RISC-V transition isn’t primarily about incremental performance gains. It’s about repositioning Ethereum from a “smart contract virtual machine” toward becoming the verifiable trust foundation for general-purpose internet computing.
Vitalik’s framing captures the endgame: “The end goal includes… making everything ZK-snarkified.”
This transformation addresses Ethereum’s “Lean Execution” pillar—part of the broader “Lean Ethereum” vision. The protocol simplifies from a monolithic VM into a minimalist settlement and data availability layer optimized for verifiable computation. Hardware proof acceleration (ASICs and FPGAs from SP1, Nervos, Cartesi) becomes feasible once the instruction set stabilizes around RISC-V.
The transition is inevitable not because it’s optimal in isolation, but because it aligns with where computation itself is heading. ZK proofs represent the third cryptographic primitive after hashes and signatures. Ethereum’s bet is that whoever provides the foundational trust layer for verifiable computing—native integration of a general machine structure in system programming—controls the next era of the internet.
Despite substantial technical and social hurdles, this restructuring of Ethereum’s execution layer represents one of the most consequential architectural decisions in blockchain history. It trades the network effects of EVM familiarity for the strategic positioning of leading the verifiable computing revolution.
The transformation begins now. Projects like Ethproofs aggregate the collaborative data necessary to execute this shift. Teams like Succinct Labs provide the practical blueprints. Within 6-12 months, expect the first precompile alternatives running RISC-V code on Ethereum mainnet—marking the beginning of the end for the Ethereum Virtual Machine as we know it.