A bridged asset is a tokenized representation of a native asset that has been transferred from one blockchain to another via a cross-chain bridge. It is not the original asset but a derivative—often called a wrapped token—that is locked or burned on the source chain and minted on the destination chain. This process enables assets like Bitcoin (BTC) to be used within the decentralized finance (DeFi) ecosystem of Ethereum, where they are represented as WBTC or renBTC.
Bridged Asset
What is a Bridged Asset?
A bridged asset is a tokenized representation of a native asset that has been transferred from one blockchain to another via a cross-chain bridge.
The creation and redemption of a bridged asset rely on a custodial or non-custodial bridge mechanism. In a custodial model, a centralized entity holds the locked native assets. In a non-custodial or trust-minimized model, smart contracts and decentralized validator networks secure the assets. The bridged token's value is pegged 1:1 to the original asset, maintained by the bridge's ability to redeem the wrapped token for the underlying collateral.
Bridged assets introduce specific risks distinct from their native counterparts. The primary risk is bridge risk—the potential for the bridge's smart contracts or custodians to be compromised, which could lead to a loss of the locked collateral and the de-pegging of the bridged asset. Furthermore, bridged assets create liquidity fragmentation, as the same asset can exist in multiple wrapped forms (e.g., WBTC, renBTC, tBTC) across different chains and bridges.
Despite the risks, bridged assets are fundamental infrastructure for cross-chain interoperability. They allow users to leverage assets from one blockchain's ecosystem—such as Bitcoin's store of value or Solana's low transaction fees—within the application environment of another, like Ethereum's robust DeFi landscape. This composability is essential for a multi-chain future where no single blockchain dominates all use cases.
When interacting with bridged assets, it is critical to verify the specific bridge's security model, audit history, and the canonical representation of an asset on a given chain. For major assets, there is often a dominant, community-accepted bridged version. Understanding that a bridged asset is a claim on a locked asset elsewhere, rather than the asset itself, is key to assessing its utility and risk profile in a portfolio or smart contract.
How Does a Bridged Asset Work?
A bridged asset is a tokenized representation of a native asset from one blockchain that is locked, minted, and made usable on another blockchain through a cross-chain bridge.
The process begins with a user initiating a transaction on the source chain (e.g., Ethereum). The bridge's smart contract locks or burns the original native assets (e.g., ETH). This action generates cryptographic proof of the deposit, which is relayed to the destination chain (e.g., Avalanche) via a relayer or validator network. Upon verifying the proof, a corresponding smart contract on the destination chain mints an equivalent amount of the bridged asset (e.g., bridged ETH, often denoted as avaxETH). This new token is a wrapped representation of the original, pegged 1:1 to its value.
Two primary architectural models govern this process. A lock-and-mint bridge uses custodial or decentralized validators to hold the locked assets and authorize minting on the other side. In contrast, a burn-and-mint bridge destroys, or burns, the assets on the source chain and uses a synchronized minting contract on the destination chain, often managed by a light client or relay chain for verification. The security and trust assumptions of the bridged asset are entirely dependent on the underlying bridge's design, ranging from trust-minimized cryptographic proofs to federated or multisig models.
Once minted, the bridged asset functions like any native token within its new ecosystem—it can be traded on decentralized exchanges, supplied as liquidity, or used in DeFi protocols. However, it carries bridge-specific risks, including smart contract vulnerabilities, validator collusion, or liquidity issues on the destination chain. To return the asset to its native chain, the user must burn the bridged token on the destination chain, providing proof to unlock the original asset from the source chain's custody.
Key Features of Bridged Assets
Bridged assets are not native tokens; they are synthetic representations of value locked on a source chain, enabling cross-chain functionality. Their key features define their security, utility, and operational model.
Custodial Model & Security
The custodial model defines who controls the underlying collateral. Lock-and-Mint bridges (e.g., Polygon PoS Bridge) use a trusted, centralized custodian. Burn-and-Mint models (e.g., IBC) rely on decentralized validator sets. The chosen model directly determines the trust assumptions and security risks, such as custodial failure or validator collusion.
Representation & Wrapping
A bridged asset is a wrapped token (e.g., WETH, USDC.e) minted on the destination chain. It is a 1:1 claim on the original asset, which is locked or burned on the source chain. The wrapper contract enforces the peg and manages mint/burn permissions, making the bridge's security critical to the wrapper's integrity.
Canonical vs. Non-Canonical
A canonical bridge is the officially recognized, often native, bridge for an asset (e.g., Arbitrum's bridge for moving ETH from Ethereum). Non-canonical bridges are third-party alternatives. Canonical bridges typically have deeper liquidity and official support, but users may opt for non-canonical bridges for better rates or speed, accepting different trust models.
Liquidity & Composability
Bridged assets require liquidity pools on the destination chain to be usable in DeFi. Their composability—the ability to function in smart contracts—depends on widespread integration. A bridged USDC must be accepted by lending protocols and DEXs to be valuable. Fragmentation across multiple bridge versions (USDC, USDC.e, USDC from LayerZero) can reduce liquidity for each.
Bridge-Specific Risk
Bridged assets inherit the security of the bridge itself, a critical additional risk layer beyond the source and destination chains. This includes:
- Smart contract risk: Bugs in the bridge contract.
- Validator/custodian risk: Malicious or faulty actors in the bridge's consensus.
- Liveness risk: The bridge going offline, freezing assets. A bridge compromise can lead to the minting of unbacked synthetic assets.
Examples & Ecosystem Impact
WBTC is a canonical, custodian-based bridged Bitcoin on Ethereum. USDC.e is the canonical bridged USDC on Avalanche (via the Avalanche Bridge), distinct from native USDC. axlUSDC is a non-canonical version bridged via Axelar. These assets power cross-chain DeFi but create ecosystem fragmentation, where the same underlying asset has multiple, non-fungible representations.
Bridged Asset vs. Native Asset
A comparison of the fundamental properties and trade-offs between assets that originate on a blockchain versus those transferred via a bridge.
| Feature | Bridged Asset | Native Asset |
|---|---|---|
Origin & Issuance | Minted on a destination chain by a bridge protocol based on locked/collateralized assets on a source chain. | Issued directly and natively by the protocol of its originating blockchain (e.g., ETH on Ethereum, SOL on Solana). |
Canonical Source of Truth | The state of the asset on the source chain and the security of the bridge. | The ledger of its native blockchain. |
Sovereignty & Upgrades | Governance depends on bridge operators; upgrades may require bridge intervention. | Governed solely by the rules of its native protocol; upgrades follow that chain's governance. |
Security Model | Inherits security from both the source chain and the bridge (which may have varying trust assumptions). | Inherits the full security of its native blockchain. |
Protocol Fee Eligibility | Typically ineligible for native staking, governance, or fee distribution (e.g., bridged ETH cannot be staked for Ethereum consensus). | Fully eligible for all native protocol utilities like staking, governance, and fee accrual. |
Depeg & Redeemability Risk | Exposed to bridge failure, exploit, or censorship, which can break the 1:1 peg. | No depeg risk from bridge failure; value is intrinsic to the native chain. |
Example | Wrapped BTC (WBTC) on Ethereum, USDC.e on Avalanche (bridged from Ethereum). | Bitcoin (BTC) on Bitcoin, Ether (ETH) on Ethereum, AVAX on Avalanche. |
Common Types of Bridged Assets
Bridged assets are categorized by their underlying collateralization model and governance, which determines their security and trust assumptions. The primary distinction is between canonical and synthetic assets.
Synthetic (Wrapped) Assets
These are third-party issued tokens that represent a claim on an asset from another chain. They are not natively issued or directly backed by the original protocol, creating a different trust model.
- Mechanism: A bridging service or DAO holds the collateral and issues a new token standard (e.g., anyBTC, multichain.xyz assets) on the destination chain.
- Trust Assumption: Relies on the custody and solvency of the bridge operator, not the native protocol.
- Risk Profile: Higher counterparty risk compared to canonical assets, as seen in bridge hacks or insolvencies.
Ecosystem Usage & Prominent Examples
Bridged assets are foundational to cross-chain interoperability, enabling liquidity and functionality to flow between disparate blockchain networks. Their implementation and security models vary significantly across different protocols.
Stablecoin Bridges
The most bridged asset class due to their role as the primary medium of exchange and collateral in DeFi.
- Major Examples: USDC, USDT, DAI.
- Challenges: Supply fragmentation occurs when multiple, non-interoperable bridged versions exist (e.g., USDC on Polygon can be native USDC or bridged USDC.e).
- Importance: A deep, canonical stablecoin bridge is often the first major infrastructure deployed to a new Layer 2 or alternative Layer 1.
Security & Risk Models
Bridged asset security is paramount, as bridges are high-value targets. Models include:
- Custodial/Multi-sig: Relies on a trusted set of signers (e.g., WBTC).
- Federated: A committee validates transfers (common in early bridges).
- Optimistic: Uses a fraud-proof window where transfers can be challenged.
- Light Client/ZK: Uses cryptographic proofs for verification (e.g., zkBridge). Historical Note: Major exploits like the Ronin Bridge ($625M) and Wormhole ($326M) highlight the systemic risk.
Security Considerations & Risks
Bridged assets introduce unique security dependencies and attack vectors beyond the native risks of the underlying blockchain. This section details the critical vulnerabilities inherent in cross-chain tokenization.
Custodial vs. Non-Custodial Bridge Models
Bridge security is fundamentally defined by its custody model. Custodial bridges rely on a trusted third party or federation to hold the locked assets, creating a central point of failure. Non-custodial bridges use decentralized mechanisms like multi-party computation (MPC) or light client relays, but these can still be vulnerable to consensus-level attacks on the underlying chains. The choice determines who controls the canonical reserve of the original asset.
Validator/Oracle Risk
Most bridges depend on an external set of validators or oracles to attest to events (like deposits) on the source chain. This creates critical attack surfaces:
- Collusion: A malicious supermajority can mint unlimited bridged tokens without backing.
- Liveness Failure: If validators go offline, assets can be stuck.
- Software Bugs: Flaws in the relayer software can be exploited. Historic bridge hacks, like the Wormhole and Ronin incidents, often stemmed from compromising these external verifiers.
Smart Contract Risk
The smart contracts governing the bridge on both the source and destination chains are high-value targets. Vulnerabilities can include:
- Reentrancy attacks on mint/burn functions.
- Logic errors in upgradeable proxy contracts.
- Signature verification flaws for validator attestations. Each additional chain a bridge supports multiplies its attack surface, as contracts must be deployed and secured on every connected network.
Economic & Peg Stability Risk
A bridged asset's value is contingent on the 1:1 redeemability of the canonical asset held in reserve. Risks include:
- Peg Breakdown: If confidence in the bridge is lost, the bridged token may trade at a discount (de-peg), as seen during major hacks.
- Liquidity Fragmentation: Bridged versions (e.g., USDC.e) may have less liquidity than the native asset, impacting slippage and stability.
- Wrapped Token Proliferation: Multiple bridges creating different wrapped versions of the same asset (e.g., WBTC, renBTC) can confuse users and dilute security scrutiny.
Censorship & Upgrade Centralization
Bridge operations often have centralized points of control that contradict decentralization ideals:
- Pause Functions: Many bridge contracts have admin-controlled emergency pause functions, which can be used to freeze user funds.
- Upgrade Keys: Multisig upgrade authority, if compromised, can lead to a complete takeover.
- Blocklist Authority: Some bridges maintain the ability to censor specific addresses from using the bridge, introducing regulatory and single-point risks.
Systemic & Compositional Risk
Bridged assets create interconnected risk across the DeFi ecosystem:
- Protocol Contagion: A major bridge hack can destabilize dozens of protocols using its assets as collateral, potentially triggering cascading liquidations.
- Oracle Manipulation: An attacker could exploit a bridge flaw to mint fake assets and use them to manipulate oracle prices on a destination chain.
- Cross-Chain MEV: The latency in cross-chain message passing can create new opportunities for Miner/Maximal Extractable Value, potentially harming end-users.
Frequently Asked Questions (FAQ)
Common questions about the creation, use, and risks of assets transferred between blockchains.
A bridged asset is a token on a destination blockchain that represents a locked or burned asset on a source blockchain, enabling cross-chain value transfer. The process typically involves a user locking native assets (like ETH) in a smart contract on the source chain. A bridge validator or relayer network then validates this lock event and mints an equivalent amount of the bridged token (like wrapped ETH or bridged ETH) on the destination chain. This new token is pegged 1:1 to the value of the original asset, allowing it to be used in the destination chain's DeFi ecosystem. The security and decentralization of this process depend entirely on the bridge's design, ranging from multi-signature wallets to complex light client or ZK-proof systems.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.