Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Bridge Token

A native cryptocurrency issued by a cross-chain bridge protocol, primarily used for governance, staking to secure the network, and paying transaction fees.
Chainscore © 2026
definition
CROSS-CHAIN ASSET

What is a Bridge Token?

A bridge token is a synthetic or wrapped representation of an asset that has been transferred from one blockchain to another via a cross-chain bridge.

A bridge token is a synthetic or wrapped representation of an asset that has been transferred from one blockchain to another via a cross-chain bridge. It is not the original asset but a derivative that is pegged 1:1 to the value of the locked or burned original. For example, when bridging Ether from Ethereum to Avalanche, a user receives Wrapped Ether (WETH.e) on Avalanche, which is a bridge token representing the locked ETH on the source chain. The security and redeemability of the bridge token are entirely dependent on the underlying bridge's custodial or cryptographic mechanisms.

The creation process follows a lock-and-mint or burn-and-mint model. In the lock-and-mint model, the original asset (e.g., USDC) is locked in a smart contract on the source chain (like Ethereum), and an equivalent amount of the bridge token (e.g., USDC.e on Avalanche) is minted on the destination chain. To return, the bridge token is burned on the destination chain, unlocking the original asset. This mechanism enables liquidity fragmentation, as the bridge token (USDC.e) and the native asset (native USDC on Avalanche) are distinct and often not directly interchangeable without another bridging step.

Bridge tokens carry specific technical and trust risks. They introduce counterparty risk to the bridge operator or custodian in centralized bridges, and smart contract risk in decentralized models. A catastrophic bridge hack can render its bridge tokens worthless, as seen in incidents like the Wormhole or Nomad bridge exploits. Furthermore, bridge tokens often have reduced composability compared to native assets, as they may not be supported by all decentralized applications (dApps) on the destination chain, which can limit their utility in complex DeFi protocols.

It is critical to distinguish bridge tokens from canonical or native multichain assets. A canonical asset, like USDC issued by Circle natively on multiple chains, does not rely on a third-party bridge's custodianship. Bridge tokens are an interim solution for asset portability, while the industry evolves toward more secure native cross-chain messaging protocols and interoperability standards that allow assets to move without changing their fundamental representation.

how-it-works
MECHANICS

How Bridge Tokens Work

A technical breakdown of the mechanisms that enable tokens to move between different blockchain networks, covering mint-and-burn, liquidity pools, and the critical role of validators.

A bridge token is a representation of a native asset from one blockchain that exists on a different blockchain, created through a cross-chain bridge. The most common mechanism is the mint-and-burn model: when a user locks native tokens (e.g., ETH) on the source chain, an equivalent amount of wrapped tokens (e.g., bridged ETH on Polygon) are minted on the destination chain. To reclaim the original asset, the bridged tokens are burned on the destination chain, unlocking the collateral on the source. This process relies on a set of validators or oracles to cryptographically attest to the lock and burn events, ensuring the total supply across chains remains consistent.

An alternative model uses liquidity pools rather than minting. Here, the bridge holds liquidity of the target asset on both chains. A user deposits Token A on Chain 1, and the bridge's relayer instructs its pool on Chain 2 to send Token A directly to the user's address. This is often faster but requires deep, managed liquidity on both sides. Bridges also differ in their trust assumptions: trustless bridges use the underlying blockchains' native cryptographic proofs (like light clients), while trusted bridges rely on a federation or multi-signature wallet controlled by a known entity, introducing counterparty risk.

The lifecycle of a bridge token involves several key steps. It begins with a user initiating a deposit transaction on the source chain, which is detected by the bridge's off-chain relayer or watcher. After a confirmation period for finality, the bridge's attestation system generates a proof. This proof is submitted to the destination chain's bridge contract, which verifies it and executes the mint function for the bridge token. The entire system's security hinges on the cryptoeconomic security of the validation mechanism, whether it's a multi-sig, a proof-of-stake validator set, or a decentralized oracle network.

Prominent examples illustrate these models. The Polygon POS Bridge uses a set of staking validators and the mint-and-burn model to bridge assets to its sidechain. Wormhole employs a network of Guardian nodes as its attestation layer. Hop Protocol utilizes automated market makers (AMMs) and bonded liquidity providers across its network of layer-2 rollups to facilitate fast, liquidity-backed transfers. Each design makes distinct trade-offs between decentralization, speed, capital efficiency, and universal connectivity.

For developers and users, critical considerations include bridge security audits, the risk of contract vulnerabilities, and the potential for validator collusion. It's also essential to understand that bridge tokens are distinct from canonical wrapped tokens (like WETH on Ethereum), which are minted on a single chain. The future of interoperability points towards native cross-chain messaging and interoperability standards like the Blockchain Interoperability Alliance, aiming to reduce reliance on centralized bridging points and create a more seamless multi-chain ecosystem.

key-features
BRIDGE TOKEN

Key Features & Functions

A bridge token is a synthetic representation of an asset that has been transferred from one blockchain to another via a cross-chain bridge. It is not the original asset but a claim on it, redeemable by burning the token and unlocking the original on the source chain.

01

Wrapped Asset Representation

A bridge token is a wrapped asset that represents a 1:1 claim on the original asset (e.g., ETH, USDC) locked in a smart contract on the source chain. It is minted on the destination chain when a user deposits the original. Common naming conventions include "wrapped" (wETH) or "bridged" (axlUSDC, multichain.xyz) prefixes.

02

Lock-and-Mint Mechanism

This is the most common mechanism for creating bridge tokens.

  • Locking: The original asset is deposited and locked in a smart contract on the source chain (e.g., Ethereum).
  • Minting: A corresponding bridge token is minted on the destination chain (e.g., Avalanche).
  • Burn-and-Release: To redeem the original, the user burns the bridge token, which triggers a release of the locked asset.
03

Liquidity Pool Model

Some bridges use a liquidity pool model instead of locking assets. Liquidity providers deposit assets on both chains. When a user bridges, assets are swapped from the pool on the destination chain, and no new tokens are minted. This model is used by liquidity network bridges like Hop Protocol or Stargate.

04

Canonical vs. Non-Canonical

Bridge tokens have a critical distinction:

  • Canonical (Native): The official, issuer-backed bridged version (e.g., USDC from Circle's CCTP on other chains). It is universally recognized and redeemable 1:1.
  • Non-Canonical: A bridged version created by a third-party bridge (e.g., USDC.e on Avalanche). It is only redeemable through that specific bridge, creating fragmentation and depeg risk if the bridge fails.
05

Security & Trust Assumptions

The security of a bridge token is entirely dependent on the security of the underlying bridge and its custody model.

  • Trusted (Custodial): Relies on a centralized federation or multi-sig to hold locked assets.
  • Trust-Minimized: Uses cryptographic proofs (like light clients or zero-knowledge proofs) to verify state transitions. Bridge tokens from compromised bridges can become worthless.
06

Interoperability & Composability

Bridge tokens enable cross-chain DeFi by allowing assets to be used in applications on foreign chains. A user can bridge ETH to Polygon as WETH and then supply it as collateral in a lending protocol like Aave. However, liquidity fragmentation across different bridge versions (e.g., USDC, USDC.e, axlUSDC) can reduce efficiency.

examples
BRIDGE TOKEN IMPLEMENTATIONS

Real-World Examples

Bridge tokens are implemented through various technical mechanisms, each with distinct trade-offs in security, speed, and decentralization. These examples illustrate the primary models used in production.

05

Canonical vs. Non-Canonical Bridges

A critical distinction in bridge token provenance and security.

  • Canonical Bridge: The official, native bridge endorsed by the chain's developers (e.g., Arbitrum Bridge, Optimism Gateway). The minted tokens are the chain's official representation.
  • Non-Canonical Bridge: A third-party bridge (e.g., Synapse, Celer cBridge) that creates its own representation. This can lead to fragmented liquidity where "USDC.e" (bridged) and "USDC" (native) are separate tokens.
  • Risk: Using non-canonical bridges introduces additional trust assumptions beyond the core chain.
ecosystem-usage
BRIDGE TOKEN

Ecosystem Roles

A bridge token is a synthetic asset minted on a destination blockchain to represent a locked asset from a source chain, enabling cross-chain value transfer. It is a core component of most blockchain bridges.

01

Wrapped Assets

The most common type of bridge token. When a user bridges a native asset like Ethereum (ETH) to another chain, the bridge locks the ETH and mints a wrapped version (e.g., WETH on Arbitrum). This token is pegged 1:1 to the value of the original asset and can be redeemed by burning it on the destination chain.

  • Example: Bridging BTC to Ethereum creates Wrapped Bitcoin (WBTC).
  • Key Property: The wrapped token's value is backed by the original asset held in custody by the bridge.
02

Liquidity Pool Tokens

Some bridges use liquidity pools instead of minting synthetic tokens. Users deposit asset A into a pool on Chain X and receive a liquidity provider (LP) token. They can then redeem this LP token for asset B from a corresponding pool on Chain Y. The bridge token here represents a claim on pooled liquidity rather than a specific locked asset.

  • Mechanism: Facilitates swaps across chains via Automated Market Makers (AMMs).
  • Example: Using a liquidity bridge to swap USDC from Avalanche for USDC on Polygon.
03

Canonical vs. Non-Canonical

A critical distinction in bridge token design.

  • Canonical Tokens: The official, bridged version of an asset, often minted by a native protocol or a widely accepted bridge (e.g., WETH minted by the official Arbitrum bridge). They have maximum composability.
  • Non-Canonical Tokens: Synthetic versions minted by third-party bridges (e.g., anyETH). These create fragmentation risk, as DApps may not support all variants, and their security depends solely on the issuing bridge.
04

Security & Trust Assumptions

The security of a bridge token is directly tied to the bridge's validation mechanism. The token is only as secure as the custodian or consensus that backs it.

  • Custodial (Trusted): Assets are held by a single entity or federation. The bridge token is an I.O.U.
  • Trust-Minimized: Uses cryptographic proofs (like light clients or zero-knowledge proofs) to verify state on the source chain. The bridge token is a verifiable claim.
  • Risk: If the bridge is compromised, the bridge tokens can become worthless as the backing assets may be stolen.
05

Composability & DeFi Integration

Bridge tokens are designed to be fungible and interoperable within the destination chain's ecosystem. They can be used in:

  • Decentralized Exchanges (DEXs) for trading.
  • Lending Protocols as collateral.
  • Yield Farming strategies.
  • Liquidity Pools. Their widespread acceptance is crucial for cross-chain DeFi. However, non-canonical tokens face liquidity fragmentation, reducing their utility.
06

Redemption & Burn Mechanism

The process of converting a bridge token back to the original native asset. This typically involves:

  1. The user sends the bridge token to the bridge contract on the destination chain.
  2. The bridge burns (destroys) the token.
  3. A message is relayed to the source chain.
  4. The original locked asset is released to the user's address on the source chain. This burn-and-mint cycle maintains the peg and the total supply across chains. The speed and cost of redemption depend on the bridge's message finality and fees.
CROSS-CHAIN ASSET TYPES

Bridge Token vs. Wrapped Asset

A comparison of two common methods for representing an asset on a non-native blockchain, highlighting key technical and trust distinctions.

FeatureBridge TokenWrapped Asset (e.g., WETH, WBTC)

Primary Purpose

Facilitates asset transfer between specific blockchain networks

Represents a native asset on its own blockchain (e.g., ETH on Ethereum)

Underlying Asset Custody

Held by the bridge protocol's smart contracts or validators

Backed 1:1 by the native asset held in a custodial or decentralized vault

Trust Model

Relies on the security and liveness of the bridge's validators or committee

Relies on the custodian(s) of the reserve (can be centralized or decentralized)

Interoperability Scope

Designed for movement between two or more predefined chains

Typically exists on a single chain, though canonical versions exist on multiple (e.g., WETH)

Minting/Burning Mechanism

Minted on destination chain upon locking/burning on source chain

Minted when native asset is deposited into the wrapper contract, burned to redeem

Canonical Status

Often non-canonical; multiple bridges can create competing tokens for the same asset

Often canonical; the official, community-accepted representation on that chain

Protocol Risk Exposure

Exposed to bridge-specific smart contract and validator set risks

Exposed to wrapper contract and reserve custodian risks

security-considerations
BRIDGE TOKEN

Security & Economic Considerations

A bridge token is a representation of an asset on a destination blockchain, minted when the original asset is locked on its source chain. This section details the critical security models and economic implications of these cross-chain assets.

01

Custodial vs. Trustless Models

The security of a bridge token is defined by its underlying bridge's custody model. Custodial (federated) bridges rely on a centralized entity or multi-signature committee to hold the locked assets, introducing a single point of failure. Trustless (decentralized) bridges use cryptographic proofs (like light clients or optimistic verification) to allow users to verify the state of the source chain directly, removing the need for a trusted third party. The choice of model directly impacts the trust assumptions and attack surface.

02

Mint-and-Burn Mechanism

Bridge tokens are created and destroyed via a synchronized mint-and-burn mechanism. When a user locks Asset A on Chain 1, the bridge's smart contract on Chain 2 mints an equivalent amount of the wrapped token (e.g., wAsset). To redeem the original asset, the user burns the wrapped token on Chain 2, which signals the bridge to release the locked collateral on Chain 1. This mechanism must be perfectly synchronized and secure to prevent infinite mint attacks or fund loss.

03

Canonical vs. Wrapped Tokens

Not all bridge-issued tokens are equal. A canonical token is the official, natively issued representation of an asset on a new chain (e.g., USDC issued by Circle on multiple chains). A wrapped token is a synthetic version created by a third-party bridge (e.g., USDC.e on Avalanche). Canonical tokens are generally preferred as they are redeemable 1:1 with the issuer, while wrapped tokens carry the counterparty risk of the specific bridge that minted them and may have fragmented liquidity.

04

Liquidity & Peg Stability

The value of a bridge token is pegged to its underlying asset. This peg is maintained by arbitrage and the redeemability guarantee. If the bridge token trades at a discount (de-pegging), arbitrageurs can buy it cheaply and redeem it for the full-value asset on the source chain. Critical risks to the peg include:

  • Bridge exploit or hack, destroying confidence in redeemability.
  • Liquidity fragmentation across multiple wrapped versions of the same asset.
  • Validator/governance attacks that could freeze or confiscate funds.
05

Validator & Relayer Risks

Even 'decentralized' bridges rely on external actors. Validators or relayers are responsible for observing events on one chain and submitting proof to another. These actors can be targeted through bribery attacks (e.g., in a consensus-based model) or censorship. Many bridges use economic security models like bonding/slashing, where operators stake collateral that can be destroyed for malicious behavior. The size and distribution of this stake is a key security parameter.

06

Smart Contract & Upgrade Risks

The smart contracts governing the bridge's locking, minting, and validation logic are a primary attack vector. Historical exploits (e.g., Wormhole, Ronin Bridge) often stem from contract vulnerabilities. Furthermore, many bridge contracts have upgradeable proxies, allowing developers to patch bugs or add features. This introduces governance risk: who controls the upgrade keys, and could they be used maliciously? Users must audit both the current code and the upgradeability mechanism.

BRIDGE TOKENS

Common Misconceptions

Bridge tokens, often called wrapped tokens, are frequently misunderstood. This section clarifies the core mechanics and security models behind these critical cross-chain assets.

No, a bridge token is a distinct cryptographic representation of an asset on a different blockchain, not the original asset itself. A bridge token (e.g., WETH on Arbitrum) is a synthetic asset minted by a bridge protocol when the original asset (e.g., native ETH) is locked in a vault on the source chain. It derives its value from the promise of redeemability, not from being the original. The security and value of the bridge token are entirely dependent on the custodial model and validator set of the bridging protocol, which introduces counterparty risk absent from the native asset.

BRIDGE TOKEN

Technical Deep Dive

A bridge token is a representation of an asset on a blockchain that originated on a different chain, created through a cross-chain bridge. This section explains the technical mechanisms, security models, and common pitfalls.

A bridge token is a derivative asset minted on a destination blockchain to represent a locked or burned asset on a source blockchain, enabling cross-chain liquidity. The core mechanism involves a bridging protocol that locks the original asset (e.g., ETH on Ethereum) in a smart contract or vault. In response, an equivalent amount of a synthetic token (e.g., wrapped ETH on Avalanche) is minted on the destination chain. This process relies on a validation mechanism—which can be externally verified (trusted custodians), natively verified (light clients), or locally verified (liquidity networks)—to attest to the lock-up event and authorize the mint. The bridge token is pegged 1:1 in value to the original asset and can be redeemed by burning it to unlock the original.

BRIDGE TOKENS

Frequently Asked Questions

Bridge tokens are synthetic assets that represent value locked in a different blockchain. This section answers common questions about their purpose, mechanics, and risks.

A bridge token (or wrapped token) is a synthetic asset created on a destination blockchain that represents a native asset locked in a source blockchain. It works through a bridging protocol that locks the original asset in a smart contract or with a custodian on the source chain and mints a corresponding token on the destination chain. This process, often called minting or wrapping, enables cross-chain liquidity and interoperability. For example, Wrapped Bitcoin (WBTC) is an ERC-20 token on Ethereum that represents Bitcoin (BTC) held in reserve. When the bridge token is returned or "burned" on the destination chain, the original asset is unlocked on the source chain.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Bridge Token: Definition, Use Cases & Tokenomics | ChainScore Glossary