Cross-Chain Bridges

12 min readUpdated: March 2026

In a multi-chain world with over $128B in DeFi TVL spread across Ethereum, Arbitrum, Optimism, Base, and dozens of other networks, bridges are the highways connecting isolated ecosystems. They're also where the biggest exploits have happened — over $2.5B lost to bridge hacks since 2020.

Why Bridges Matter

Blockchain networks are, by design, isolated environments. Ethereum cannot natively communicate with Solana. Bitcoin has no mechanism to verify events on Polygon. This isolation was intentional — each chain optimises for its own consensus and security model — but it creates a fundamental problem for users and capital: fragmentation.

Liquidity fragmentation means that $50B locked in Ethereum DeFi protocols cannot be deployed on Arbitrum without moving assets through an intermediary. A developer building on Base cannot tap Ethereum's deep liquidity pools without bridging infrastructure. As the ecosystem matured past a single dominant chain, the industry recognised that interoperability wasn't a luxury — it was a prerequisite for growth.

Cross-chain bridges solve the interoperability problem by providing mechanisms for assets and data to travel between chains. In 2024, bridge protocols processed over $600B in cumulative cross-chain volume, making them critical financial infrastructure. For professionals in the blockchain space, understanding how bridges work — and where they fail — is essential knowledge.

Bridge Architectures

Three primary architectural patterns have emerged, each with distinct trade-offs between trust assumptions, speed, and capital efficiency.

Lock & Mint

  1. 1Lock token on Chain A
  2. 2Validator observes lock event
  3. 3Mint wrapped token on Chain B
  4. 4Burn wrapped to unlock original
Used by: WBTC, Wormhole

Burn & Mint

  1. 1Burn token on Chain A
  2. 2Proof of burn verified
  3. 3Native mint on Chain B
  4. 4No locked reserves required
Used by: CCIP, LayerZero

Liquidity Network

  1. 1Deposit on Chain A
  2. 2Router fronts liquidity on Chain B
  3. 3Instant receive from LP pool
  4. 4LP rebalanced asynchronously
Used by: Hop, Across Protocol

Lock-and-mint is the oldest pattern and creates wrapped tokens (wBTC on Ethereum is Bitcoin locked on the Bitcoin network). Burn-and-mint is cleaner but requires the token to be natively deployable on multiple chains. Liquidity networks offer the fastest user experience — often under 2 minutes — by using professional market makers to front capital rather than waiting for cross-chain consensus.

Major Bridge Protocols

The bridge landscape has consolidated around protocols with strong security track records and high liquidity. Understanding the major players is essential for professionals making bridge recommendations or working on cross-chain applications.

Wormhole

$1.2B+ daily volume

Generic messaging protocol connecting 30+ blockchains. Uses a decentralised guardian network of 19 validators for message verification. Supports token transfers and arbitrary data payloads.

EthereumSolanaArbitrum+27 chains

Stargate (LayerZero)

Unified liquidity model

Built on LayerZero's ultra-light node messaging protocol. Stargate introduced the concept of unified liquidity pools — single pools shared across all chains rather than separate pools per chain pair. Eliminates guaranteed finality problem.

15+ chainsUSDC / USDT / ETH

Across Protocol

Fastest settlement

Intent-based bridge using UMA's optimistic oracle for dispute resolution. Professional relayers front user transfers for instant receipt (typically <2 min) and claim reimbursement later. Capital efficient liquidity network model.

Hop Protocol

L2-specialist

Purpose-built for Ethereum L2 ecosystem transfers. Uses hTokens (intermediate tokens) and AMM pools on each chain to enable near-instant transfers between Optimism, Arbitrum, Polygon, Base, and Ethereum mainnet.

Bridge Security

Bridges represent the most concentrated risk surface in DeFi. They hold large amounts of locked assets and require complex cross-chain message verification — making them attractive targets. Three exploits illustrate the failure patterns:

$625M

Ronin Bridge (2022)

Attacker compromised 5 of 9 validator keys for Axie Infinity's bridge. Fake withdrawal signatures. Largest DeFi hack to date.

$320M

Wormhole (2022)

Smart contract vulnerability allowed minting 120,000 wETH without depositing collateral. Signature verification bypass.

$190M

Nomad Bridge (2022)

Fraudulent messages accepted due to initialisation bug. 300+ addresses drained the bridge in a decentralised exploit.

Bridge Safety Checklist

Audited by multiple independent firms

Trail of Bits, OpenZeppelin, or Certik

Battle-tested — 12+ months without exploit

Age correlates with real-world robustness

Decentralised validator set (9+ validators)

Reduces single-point-of-failure risk

Bug bounty programme ($500K+)

Incentivises responsible disclosure

Graduated withdrawal limits / circuit breakers

Limits maximum single-event loss

Key Takeaways

  • 1Bridges solve liquidity fragmentation in a multi-chain world — over $600B in annual cross-chain volume depends on them.
  • 2Three dominant architectures: lock-and-mint (custodial), burn-and-mint (native), and liquidity networks (fastest UX).
  • 3Major protocols include Wormhole, Stargate, Across, and Hop — each with different security and capital models.
  • 4Over $1.1B lost in 2022 bridge exploits alone; validator key security and smart contract audits are critical.
  • 5Evaluate any bridge on: audit history, validator decentralisation, bug bounties, and circuit breaker mechanisms.