My fear with LN is rather the opposite: that propagating "waves of panic" will overwhelm the block chain with transactions, because the amount of transactions pending on the LN network can in principle be orders of magnitude larger than what a block chain can handle (that's its main idea !). So if a block chain can handle, say, 100 000 transactions per hour, and the LN network has 10 million transactions pending in 10 minutes, and there's a panic wave going through the network, those 10 million transactions will need to go on-chain which will create a backlog of 100 hours, often passing the safety time limit of regularisation, and huge opportunities to scam.
Your fears are confirmed , article from Jul 5, 201612:28 PM EST by Kyle Torpey
https://bitcoinmagazine.com/articles/here-s-how-bitcoin-s-lightning-network-could-fail-1467736127/And also what would happen in this scenario if the locks on the main chain expire before the tx from LN can be pushed back to the main chain, it would be a bit like double spending issue no ?
Nice, you see the problems with LN also.
https://lightning.network/lightning-network-paper.pdfPage 49 thru 51

Improper Timelocks
Participants must choose timelocks with sucient amounts of time. If insuf-
cient time is given, it is possible that timelocked transactions believed to
be invalid will become valid, enabling coin theft by the counterparty. There
is a trade-o between longer timelocks and the time-value of money. When
writing wallet and Lightning Network application software, it is necessary
to ensure that sucient time is given and users are able to have their trans-
actions enter into the blockchain when interacting with non-cooperative or
malicious channel counterparties
9.2 Forced Expiration Spam
Forced expiration of many transactions may be the greatest systemic risk
when using the Lightning Network. If a malicious participant creates many
channels and forces them all to expire at once, these may overwhelm block
data capacity, forcing expiration and broadcast to the blockchain. The re-
sult would be mass spam on the bitcoin network. The spam may delay
transactions to the point where other locktimed transactions become valid
9.3 Coin Theft via Cracking
As parties must be online and using private keys to sign, there is a possibility
that, if the computer where the private keys are stored is compromised, coins
will be stolen by the attacker. While there may be methods to mitigate
the threat for the sender and the receiver, the intermediary nodes must be
online and will likely be processing the transaction automatically. For this
reason, the intermediary nodes will be at risk and should not be holding
a substantial amount of money in this \hot wallet." Intermediary nodes
which have better security will likely be able to out-compete others in the
long run and be able to conduct greater transaction volume due to lower
fees. Historically, one of the largest component of fees and interest in the
nancial system are from various forms of counterparty risk { in Bitcoin it
is possible that the largest component in fees will be derived from security
risk premiums.
A Funding Transaction may have multiple outputs with multiple Com-
mitment Transactions, with the Funding Transaction key and some Commit-
ment Transactions keys stored oine. It is possible to create an equivalent
of a \Checking Account" and \Savings Account" by moving funds between
outputs from a Funding Transaction, with the \Savings Account" stored
oine and requiring additional signatures from security services.