Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
cross-chain-future-bridges-and-interoperability
Blog

Why Economic Security is Irreconcilable with Permissionless Cross-Chain Calls

A first-principles argument that unbounded, permissionless inbound calls create a fatal vulnerability: a richer chain can always drain a poorer one, making native economic security impossible.

introduction
THE FUNDAMENTAL MISMATCH

The Cross-Chain Security Paradox

Permissionless composability across sovereign chains is impossible without sacrificing economic security or introducing trusted third parties.

Security is not transitive. A smart contract on Chain A cannot inherit the economic security of Chain B. A call from Ethereum to Avalanche is only as secure as the weakest link in the bridging path, which is often a small validator set or a multisig.

The oracle problem recurs. Protocols like Chainlink CCIP or LayerZero's Decentralized Verification Networks attempt to solve this by creating new security layers, but they become the trusted oracles for the cross-chain state. This shifts, but does not eliminate, the trust assumption.

Native verification is unscalable. Directly verifying Ethereum proofs on another chain, as with zkBridge or IBC, imposes prohibitive gas costs. The data availability and computational overhead make this model impractical for high-frequency, low-value transactions.

Evidence: The Polygon POS Bridge hack and Wormhole exploit demonstrate that cross-chain security budgets are orders of magnitude smaller than the value they secure. The economic security of the destination chain is irrelevant if the messaging layer has a $10M cap.

key-insights
THE FUNDAMENTAL DILEMMA

Executive Summary: The Inescapable Trade-Off

Permissionless cross-chain messaging forces a choice between economic security and liveness that cannot be optimized away.

01

The Oracle Problem, Re-invented

Every bridge is a price oracle for its own attestations. A permissionless network of relayers creates a coordination game where the cheapest validator set dictates security. This leads to predictable race-to-the-bottom dynamics seen in networks like LayerZero and Axelar.

  • Security Cost: Securing $1B in TVL requires $1B+ in slashable stake for byzantine fault tolerance.
  • Market Reality: Relay incentives are often <$0.01 per message, making staking irrational.
$1B+
Stake Needed
<$0.01
Relay Incentive
02

The Verifier's Dilemma

For a state proof to be trust-minimized, the destination chain must fully verify the source chain's consensus. This requires embedded light clients, which are prohibitively expensive for general-purpose execution (e.g., a ZK-EVM verifying another ZK-EVM). Projects like Succinct and Polygon zkBridge push the envelope but face O(n) gas cost scaling with transaction volume.

  • Throughput Limit: ~100-1,000 trust-minimized messages/day per chain pair.
  • Latency Penalty: Finality delays from 15 minutes (Ethereum) to hours (ZK-proving).
O(n)
Cost Scaling
~100/day
Practical Limit
03

Liveness Trumps Correctness

In a permissionless system, liveness (messages delivered) is measurable and fee-generating; correctness (messages valid) is not. This misalignment guarantees that optimistic or fraud-proof systems (e.g., Nomad, Across) will be exploited. The 7-day challenge period is a market failure—no rational actor monitors for fraud for free.

  • Economic Attack Cost: Often <10% of the stolen funds.
  • Historical Proof: $200M+ lost in bridge hacks are primarily optimistic design failures.
7 Days
Vulnerability Window
<10%
Attack Cost Ratio
04

The Sovereign Stack Fallacy

Chains like Cosmos and Polkadot solve intra-ecosystem security with shared validator sets, but this recreates a permissioned coalition. True permissionlessness requires any chain to connect to any other, which fragments security budgets. The Inter-Blockchain Communication (IBC) protocol is secure because it operates within a curated set of Byzantine Fault Tolerant chains.

  • Ecosystem Lock-in: Security is not portable to external chains like Ethereum or Solana.
  • Validator Overlap: ~30-50% commonality needed for security, creating centralization pressure.
30-50%
Validator Overlap
05

Intent-Based Routing as a Patch

Solutions like UniswapX, CowSwap, and Across use fillers to solve liveness by making execution permissioned, but they outsource security to economic reputation. This creates a market-maker oligopoly where cross-chain MEV is captured by a few entities. The system is secure only as long as filler collateral exceeds the profit from a malicious fill.

  • Capital Efficiency: 10-100x better than staking models.
  • Centralization Risk: ~5-10 major fillers control >80% of volume.
10-100x
Capital Efficiency
5-10
Dominant Fillers
06

The Inevitable Hybrid Model

The end-state is a two-tiered system: 1) Expensive, slow, trust-minimized bridges for sovereign asset transfers (using ZK or light clients). 2) Cheap, fast, economically secured pathways for general messaging & intents. Protocols will route based on value-at-risk. Chainlink CCIP and LayerZero's Oracle/Relayer split are early examples of this hybrid reality.

  • Value Threshold: ~$10k+ for trust-minimized routes.
  • Market Share: >90% of volume will flow through economic security layers.
$10k+
Trust-Min Threshold
>90%
Economic Route Volume
thesis-statement
THE ECONOMIC REALITY

The Core Argument: Security is Relative, Not Absolute

Permissionless cross-chain messaging cannot achieve absolute security because its economic model is fundamentally misaligned with its technical guarantees.

Security is a cost function. The security of a cross-chain message on LayerZero or Axelar is not a binary 'secure/insecure' state. It is a probabilistic guarantee priced by the cost to corrupt the underlying attestation mechanism, whether that's an oracle/relayer set or a light client bridge.

Permissionless execution breaks the model. When any contract on Chain B can initiate a callback to Chain A, the security budget for Chain A becomes unbounded. The economic security of Chain A's validators must now account for infinite, unpredictable external state changes, which is financially impossible.

This creates systemic risk. A vulnerable DeFi protocol on Avalanche, exploited via a Wormhole-facilitated cross-chain call, can drain collateral from a lending market on Ethereum. The security of the stronger chain is now pegged to the weakest link in the interconnected system.

Evidence: The Chainlink CCIP model explicitly acknowledges this by implementing a risk management network and rate limits on value transfer, a tacit admission that unbounded permissionless interoperability is a security black hole.

PERMISSIONLESS CROSS-CHAIN CALLS

The Attack Surface: Mapping Economic Imbalance to Risk

Comparison of security models for cross-chain communication, highlighting the inherent economic vulnerability of permissionless message passing.

Security Model / MetricNative Validator (e.g., LayerZero)Light Client Bridge (e.g., IBC, Polymer)Optimistic Verification (e.g., Hyperlane, Wormhole)

Core Security Assumption

Economic stake of permissionless off-chain actors

Cryptographic proof from source chain consensus

Economic stake + fraud proof window

Attack Vector

Collusion of relayers/off-chain actors

1/3 Byzantine consensus attack on source

Successful state fraud undiscovered for challenge period

Economic Imbalance

Message value can exceed total stake of actors

Message value cannot exceed chain's total stake

Message value can exceed bond, but is slashed if fraud proven

Capital Efficiency for Security

Low (stake not natively at risk)

High (reuses source chain's stake)

Medium (bond must cover fraud window exposure)

Time to Finality

< 1 min

Source chain finality + proof generation (~2-30 min)

Source chain finality + challenge period (~30 min - 7 days)

Permissionless Relay Set

Requires Source Chain Light Client

deep-dive
THE FUNDAMENTAL MISMATCH

Deconstructing the Slippery Slope: From Intent to Execution

The trust model required for generalized cross-chain execution is incompatible with the economic security of individual blockchains.

Intent-based systems like UniswapX abstract execution but delegate trust to a third-party solver network. This works for simple swaps where failure is limited to a single asset's value. Generalized cross-chain calls, however, require solvers to execute complex, multi-step logic across sovereign chains, creating an uninsurable risk surface.

Economic security is non-transferable. A validator's stake on Chain A provides zero security for its actions on Chain B. Protocols like LayerZero and Wormhole rely on external oracle/relayer sets to attest to cross-chain state, creating a new security perimeter that is not backed by the underlying chains' consensus.

This creates a liveness-for-security trade-off. To be permissionless, any actor must be able to fulfill a cross-chain intent. This necessitates weak, bond-based slashing instead of robust crypto-economic penalties, as seen in Across Protocol's design. The result is security subsidized by fraud proofs, not prevention.

Evidence: The 2022 Nomad Bridge hack exploited this exact mismatch. A faulty off-chain updater, secured by a trivial $200k bond, was able to forge messages and drain $190M, demonstrating that bridged security is its weakest link.

case-study
THE TRUST TRILEMMA

Protocol Archetypes & Their Inherent Flaws

Every cross-chain design is forced to make a fundamental trade-off between trustlessness, capital efficiency, and generalizability. You can only pick two.

01

The Native Bridge: Sovereign but Isolated

Each chain's canonical bridge is the most secure for its own assets, but creates liquidity silos. This forces users into a fragmented, multi-hop experience.

  • Security: Inherits L1's consensus, but only for its own vault.
  • Capital: Billions locked in isolated, non-composable pools.
  • Flaw: No native path for cross-chain smart contract calls or generalized messages.
1:1
Asset Security
$0
Interop Tax
02

The Liquidity Network (e.g., Stargate, Connext)

Uses a canonical bridge as a settlement layer, with a liquidity pool on the destination chain. Optimizes for capital efficiency and composability.

  • Mechanism: Swaps are atomic; liquidity is rebalanced via arbitrage.
  • Capital: ~$1B TVL networks achieve high utilization.
  • Flaw: Security is bounded by the underlying canonical bridges. A bridge hack compromises the entire liquidity network.
~5s
Finality
Bridge Risk
Security Ceiling
03

The External Verifier Network (e.g., LayerZero, Wormhole, Axelar)

Introduces a third-party attestation layer of oracles and relayers to pass generalized messages. Maximizes for generalizability and developer experience.

  • Mechanism: Independent oracle/relayer sets attest to events; security is probabilistic.
  • Scale: Supports any payload, enabling full smart contract composability.
  • Flaw: Economic security is not native. It's an off-chain social consensus backed by slashing stakes, which can be corrupted or circumvented.
100+
Chains
Off-Chain
Trust Root
04

The Light Client & ZK Bridge (e.g., Succinct, Polymer)

The cryptographic ideal: verify the source chain's state directly on the destination chain via light client proofs. Theoretically achieves full trustlessness and generalizability.

  • Mechanism: Zero-knowledge proofs (ZK-SNARKs) verify consensus headers.
  • Security: Inherits cryptographic guarantees of the source chain.
  • Flaw: Prohibitively expensive for high-throughput chains. Ethereum → Gnosis proof costs ~$100+ in gas, making it capital-inefficient for small transactions.
~10min
Proof Time
$100+
Fixed Cost
05

The Hub Model (e.g., Cosmos IBC, Polkadot XCM)

Enforces shared security and standardized communication protocols. Chains must conform to a specific consensus and client architecture.

  • Mechanism: Light clients are cheap because chains share similar BFT consensus.
  • Security: Native and constant, with ~$2B+ in staked economic security.
  • Flaw: Not permissionless. Requires chain sovereignty to be subjugated to the hub's governance and technical standards. A walled garden.
~3s
Latency
Sovereignty Tax
Trade-off
06

The Intent-Based Abstraction (e.g., UniswapX, Across, CowSwap)

Acknowledges the trilemma and routes around it. Users declare a desired outcome (intent); a network of solvers competes to fulfill it using the best available infrastructure.

  • Mechanism: Solvers can use any bridge (Liquidity Network, Verifier, Native) in combination.
  • Optimization: Achieves best execution by dynamically selecting the securest/cheapest path.
  • Flaw: Does not solve base-layer security; merely abstracts the complexity and risk to a competing solver market, which can centralize.
Dynamic
Pathing
Solver Risk
New Vector
counter-argument
THE FUNDAMENTAL MISMATCH

Steelman: "But What About Economic Guarantees?"

Permissionless execution and quantifiable economic security are mutually exclusive properties for cross-chain messaging.

Economic security requires slashing. A verifier's stake must be slashable for provable misbehavior, which demands a permissioned validator set with known identities and legal recourse. This is the model of LayerZero and Axelar.

Permissionless execution forbids slashing. A truly permissionless network, like a rollup's sequencer set or an L1, cannot have its validators slashed by an external protocol. This creates an unresolvable principal-agent problem for economic guarantees.

The trade-off is binary. You choose either a permissioned, slashable security model (with centralization risks) or a permissionless execution model (with only cryptographic security). Protocols like Chainlink CCIP and Wormhole architecturally demonstrate this dichotomy.

Evidence: The $15M hack on the Wormhole bridge was made whole by Jump Crypto's capital, not a slashing mechanism. This proves economic guarantees are promises, not protocols.

FREQUENTLY ASKED QUESTIONS

FAQ: Navigating the Inevitable

Common questions about the fundamental conflict between economic security and permissionless cross-chain interoperability.

Economic security is the capital cost required to attack a system, which is irreconcilable with permissionless cross-chain calls. A bridge securing $10B in assets cannot have $10B of staked capital; it's economically infeasible. This creates a security mismatch where a small, attackable bridge validates state for a massive destination chain like Ethereum or Solana, making the entire system only as strong as its weakest, undercapitalized link.

future-outlook
THE FUNDAMENTAL TRADE-OFF

The Path Forward: Sovereignty or Subjugation

Cross-chain interoperability forces a definitive choice between a chain's economic security and its permissionless composability.

Permissionless composability breaks security. A chain that accepts arbitrary, unvetted cross-chain messages from protocols like LayerZero or Wormhole outsources its security to external, often opaque, validator sets. This creates a trusted third-party in a system designed to be trust-minimized.

Economic security requires sovereignty. A sovereign chain, like Cosmos app-chains or Avalanche subnets, must validate all inbound state transitions itself. This necessitates a permissioned whitelist of approved message types and origins, directly conflicting with the open, permissionless ethos of general-purpose L1s and L2s.

The market is choosing subjugation. The dominance of generalized messaging bridges proves developers prioritize seamless UX over sovereign security. Chains become features in a larger, bridge-controlled meta-system, as seen with Stargate and Axelar enabling omnichain apps.

Evidence: The $2.5B Total Value Locked in cross-chain bridges is secured by external validator sets, not the destination chains' own consensus. This is an irreconcilable architectural compromise.

takeaways
THE CROSS-CHAIN DILEMMA

TL;DR: Actionable Insights for Builders

Permissionless composability and economic security are mutually exclusive in cross-chain design. Here's what you must architect around.

01

The UniswapX Model: Shift Risk to Users

UniswapX and CowSwap solve for permissionless routing by making the user the lynchpin of security. The protocol doesn't guarantee execution; it facilitates intent matching.

  • User assumes slippage and MEV risk via signed orders.
  • Fillers compete on a permissionless network, creating a market for execution.
  • No protocol-level economic security is required, enabling true permissionless entry for solvers.
0
Protocol TVL at Risk
100%
User-Borne Risk
02

The LayerZero Model: Centralize the Verifier

LayerZero, Wormhole, and Axelar provide a universal messaging layer by concentrating security in a small, permissioned set of off-chain verifiers (Oracles/Relayers).

  • Security is not permissionless; it's delegated to known entities with bonded stakes.
  • Economic security scales with the verifier set's stake, not the chain's validators.
  • You trade decentralization for liveness, creating a trusted bridge-like security model wrapped in a permissionless UI.
~15
Active Verifiers
$1B+
Escrowed Capital
03

The EigenLayer Model: Re-stake Everything

EigenLayer and Babylon attempt to reconcile the dilemma by re-hypothecating the economic security of Ethereum (or Bitcoin) to secure other systems, like cross-chain bridges.

  • Security is borrowed, not native, creating systemic risk contagion.
  • Slashing must be objectively verifiable, limiting use-cases to simple consensus faults.
  • You are betting on a single, massive security pool, creating a potential single point of failure for the entire ecosystem.
$15B+
TVL at Contagion Risk
Monoculture
Security Model
04

The StarkEx Model: Force Settlement on L1

StarkEx's L2-to-L1 validity-proof bridge and dYdX's migration show the nuclear option: avoid asynchronous cross-chain calls entirely. Force all critical state transitions to settle on a single security base (Ethereum).

  • Cross-chain is a UX illusion; finality is always on the settlement layer.
  • Composability is limited to the L2/L3 silo, sacrificing interoperability for security.
  • The solution is to not have the problem, making it the only model with L1-grade security guarantees.
L1 Final
Security Guarantee
Siloed
Composability
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Why Permissionless Cross-Chain Calls Break Economic Security | ChainScore Blog