Crypto Bridges Explained: Cross-Chain Transfers and Their Risks

A crypto bridge moves assets between blockchains that cannot natively talk to each other. Bridges are essential infrastructure for a multi-chain ecosystem, but they are also the single most attacked surface in crypto. Understanding how they work — and where they break — is important before using one.

Why bridges exist

Each blockchain is its own isolated ledger. Bitcoin cannot verify what is happening on Ethereum. Ethereum cannot natively read Solana's state. Yet users want to move value between chains — to access a DeFi protocol that only exists on one chain, to use a faster and cheaper network for certain operations, or to take advantage of yield opportunities on a different Layer 2.

Bridges are the protocols that make this possible by maintaining synchronized state across two chains: they accept an asset on one chain and issue a claim on it on another.

The lock-and-mint model

The most common bridge architecture works like this:

  1. You deposit an asset (say, USDC) into the bridge's smart contract on the source chain. The asset is now locked there.
  2. The bridge's validator network (or oracle system) detects this deposit.
  3. The bridge mints a wrapped version of USDC on the destination chain and delivers it to your address there.

To reverse the process (bridge back), you send the wrapped token to the bridge contract on the destination chain — it is burned — and the original is unlocked and returned to you on the source chain.

The locked pool on the source chain is the critical point: it holds all the original assets backing every wrapped token in circulation. At peak usage, major bridges hold hundreds of millions to billions of dollars in locked assets. This concentration is what makes bridges attractive targets.

Trust assumptions

Every bridge answers the question: who decides a deposit on chain A is valid before minting on chain B? The answer defines the bridge's trust model:

  • Multisig validators: a set of entities (often 5-of-9 or similar) must collectively sign off on each message. Security is as strong as the weakest signer and the access controls around their keys. This is how the Ronin bridge worked — and five of nine validators were compromised.
  • Light client bridges: the destination chain runs a lightweight version of the source chain's consensus, cryptographically verifying block headers. Much more secure, but computationally expensive and complex to implement.
  • Optimistic bridges: transactions are assumed valid unless challenged within a dispute window (often 7 days). Fast in practice, but requires at least one honest watcher.
  • ZK bridges: use zero-knowledge proofs to cryptographically prove source-chain state without running a full validator set. Highest security, but computationally intensive and still maturing as a technology.

Major bridge hacks

Bridge hacks account for the largest single-incident losses in crypto history:

  • Ronin Network — $625 million (March 2022): The bridge for the Axie Infinity game used a 5-of-9 multisig. Attackers — later attributed to North Korea's Lazarus Group — compromised five validator private keys through social engineering and a malicious job offer. With five keys, they authorized fraudulent withdrawals of 173,600 ETH and 25.5 million USDC. The theft went undetected for six days.
  • Wormhole — $320 million (February 2022): A vulnerability in the Wormhole bridge's Solana-side contract allowed the attacker to forge a valid guardian signature without actually having one. They used the forged signature to mint 120,000 wrapped ETH on Solana with no corresponding deposit. Jump Crypto, a backer of Wormhole, replenished the funds to make users whole.
  • Nomad Bridge — $190 million (August 2022): A flawed initialization allowed any message to be processed as if it had been pre-approved. Once the first attacker found this, hundreds of copycat wallets drained the bridge opportunistically within hours.

Native bridges vs third-party bridges

Not all bridges carry the same risk profile. When you move assets to a Layer 2 like Arbitrum or Optimism using their official bridge, you are using a bridge that inherits Ethereum's security guarantees. Fraud proofs (optimistic rollups) or validity proofs (ZK rollups) mean the bridge's correctness is verified cryptographically rather than trusted to a validator committee.

Third-party cross-chain bridges — moving assets between unrelated Layer 1 networks like Ethereum and Solana — have no shared security model to fall back on. They rely entirely on their own validator set and smart contract security.

Risk reduction practices

Bridge risk cannot be eliminated, but it can be managed:

  • Use official native bridges when possible (Arbitrum Bridge, Optimism Bridge, Base Bridge)
  • Prefer bridges with long operating histories, multiple audits, and active bug bounty programs
  • Do not leave large amounts sitting in bridged (wrapped) tokens longer than necessary
  • For large amounts, consider bridging in stages rather than all at once
  • Check that the bridge you are using is the officially endorsed one for that network — phishing sites impersonating bridges are common

Bridge resources on ChainClarity

  • Layer 2 — rollup networks with cryptographically secured official bridges
  • DeFi — the protocols that make cross-chain bridging economically useful
  • Smart contracts — the code underpinning bridge lock-and-mint mechanics
  • Blockchain — the isolated systems that bridges connect
  • Ethereum — the source chain for most major cross-chain bridge volume

Frequently asked questions

What is a crypto bridge?

A crypto bridge is a protocol that enables asset transfers between two blockchains that cannot natively communicate. Blockchains are isolated systems — Bitcoin does not know what is happening on Ethereum, and vice versa. Bridges work by accepting a deposit on the source chain and issuing a representative token on the destination chain. The most common mechanism is lock-and-mint: the original asset is locked in a smart contract (or multisig) on the source chain, and a synthetic version is minted on the destination chain. When you bridge back, the synthetic is burned and the original is released.

How does the lock-and-mint model work?

When you bridge 1 ETH from Ethereum to Solana using a lock-and-mint bridge: (1) You send 1 ETH to a bridge contract on Ethereum. (2) The bridge's oracle or validator network detects the deposit. (3) The bridge mints 1 wrapped ETH (wETH) on Solana and sends it to your Solana address. The original ETH remains locked in the Ethereum contract. The wrapped token derives its value entirely from the guarantee that the locked ETH can be reclaimed. This guarantee is only as strong as the bridge's security model — the locked contract is a concentrated pool of value that is an attractive target.

Why have bridges been hacked so often?

Bridges accumulate large pools of locked assets in a single contract or set of contracts, making them high-value targets. Their security often depends on a multisignature validator set — a small group of entities who must agree to authorize withdrawals. Compromising enough of these signers, exploiting a flaw in the bridge's smart contract logic, or manipulating the oracle that detects deposits can drain the entire locked pool. The Ronin bridge ($625M, March 2022) was exploited by compromising five of the nine validator keys. The Wormhole bridge ($320M, February 2022) was exploited through a bug in signature verification that allowed the attacker to mint wrapped tokens without a corresponding deposit.

Are some bridges safer than others?

Bridge security varies significantly by design. Native bridges (Ethereum's official rollup bridges to Arbitrum, Optimism, and Base) use the rollup's own fraud proof or validity proof system rather than a separate validator set — they inherit Ethereum's security. Third-party bridges with large validator sets and long track records are generally safer than newer bridges with small multisigs. Bridges that have undergone multiple independent security audits and have bug bounty programs in place offer more confidence, but no bridge is risk-free. The general principle: don't leave large amounts sitting in bridged assets longer than needed.

What is the difference between a bridge and a Layer 2?

A Layer 2 is a scaling system built on top of an existing blockchain (like Ethereum) that inherits its security guarantees through cryptographic proofs or fraud challenges. Moving funds to a Layer 2 uses the official bridge — which is part of the rollup's design and cryptographically secured. A third-party cross-chain bridge, by contrast, moves assets between two independent blockchains (like Ethereum and Solana) that have no shared security model. The trust assumptions are fundamentally different: a Layer 2 withdrawal challenge can be arbitrated by Ethereum itself; a cross-chain bridge withdrawal depends on its own validator set.

New whitepapers explained, weekly

Plain-English breakdowns of new crypto projects, delivered when they drop. No price predictions, no hype — just clear analysis you can actually use.

First look

Each whitepaper we add to the library lands in your inbox before it goes live.

Reader picks

See which projects the ChainClarity community is reading and discussing each week.