Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Wrapped Token Standard

A technical specification, like ERC-20 on Ethereum, for creating tokenized representations of assets native to another blockchain.
Chainscore © 2026
definition
BLOCKCHAIN INTEROPERABILITY

What is a Wrapped Token Standard?

A technical specification that defines how to create and manage tokens representing assets from one blockchain on a different blockchain.

A Wrapped Token Standard is a smart contract interface, like Ethereum's ERC-20 or ERC-721, that specifies the functions required to mint, burn, and transfer a wrapped token. This standard ensures that all wrapped tokens of a particular type (e.g., all ERC-20 wrapped Bitcoin) behave consistently, enabling seamless integration with wallets, decentralized exchanges (DEXs), and other DeFi applications. The standard governs the token's basic properties—its name, symbol, divisibility, and total supply—creating a predictable and interoperable asset layer on the destination chain.

The core mechanism involves a custodial or non-custodial bridge. In a common model, the original asset (e.g., Bitcoin) is locked in a secure vault or smart contract on its native chain. A corresponding amount of the wrapped token (e.g., WBTC on Ethereum) is then minted according to the standard's rules. This process is overseen by a network of merchants and custodians who verify the lock-up and initiate the minting. The standard's mint and burn functions are the critical on-chain endpoints that facilitate this cross-chain representation, ensuring a 1:1 peg is maintained.

Prominent examples include Wrapped Bitcoin (WBTC), which uses the ERC-20 standard to bring Bitcoin to Ethereum, and Wrapped Ether (WETH), which wraps native ETH into an ERC-20 compliant form for use in older DeFi protocols. Other chains have their own standards, such as BEP-20 on BNB Chain or SPL on Solana, which serve the same purpose. These standards are foundational to cross-chain liquidity, allowing assets to participate in lending, yield farming, and trading on networks for which they were not originally designed, thus breaking down blockchain silos.

Implementing a wrapped token standard introduces considerations around trust assumptions and security. Custodial models rely on the integrity of the entity holding the underlying assets, while non-custodial, cryptoeconomically secured bridges use validator networks and complex smart contracts. The standard itself must be audited to prevent vulnerabilities in the mint/burn logic. Furthermore, the proliferation of wrapped assets can lead to liquidity fragmentation, where multiple versions of a wrapped asset (e.g., WBTC, renBTC, tBTC) compete for market share on the same chain.

how-it-works
CROSS-CHAIN INTEROPERABILITY

How Does a Wrapped Token Standard Work?

A technical overview of the standardized protocols that enable the creation and management of wrapped tokens, which are blockchain-native representations of assets from other chains.

A wrapped token standard is a formalized smart contract specification, such as Ethereum's ERC-20 or Solana's SPL, that defines the interface and rules for creating and managing wrapped tokens. These standards ensure that all wrapped assets on a given blockchain behave predictably and are interoperable with wallets, decentralized exchanges (DEXs), and other DeFi applications. The standard specifies core functions like transfer, balanceOf, and approve, which allow the wrapped token to be traded, staked, or used as collateral just like any other native asset on its host chain.

The operational mechanism relies on a custodial or non-custodial bridge. In a typical custodial model, a user locks the original asset (e.g., Bitcoin) with a trusted entity or a decentralized multi-signature vault on its native chain. Upon proof of this lock-up, a minting function in the wrapped token's smart contract is authorized to create an equivalent amount of the wrapped version (e.g., WBTC) on the destination chain. The process is reversed for burning the wrapped asset to redeem the original. Non-custodial bridges use more complex cryptographic proofs but follow a similar lock-mint/burn-unlock pattern.

Key to the system's security is the verification and auditing of the reserve. For a wrapped token like Wrapped Bitcoin (WBTC), regular attestations are published to prove that the total supply of WBTC on Ethereum is fully backed 1:1 by Bitcoin held in reserve. This transparency is critical for maintaining the token's peg to the value of the underlying asset. Without a robust, audited reserve and a secure bridge, the wrapped token risks becoming unbacked, breaking its peg and losing utility.

Prominent examples include Wrapped Ether (WETH), which wraps native ETH into an ERC-20 token for compatibility with older DeFi protocols, and Wrapped BTC (WBTC) on Ethereum. Other chains have their own standards, like Wormhole's cross-chain messaging protocol which facilitates wrapped assets across Solana, Ethereum, and others. Each implementation must carefully manage the inherent risks of the bridging mechanism, which is often the central point of failure or attack in the system.

Ultimately, wrapped token standards are foundational infrastructure for cross-chain liquidity. They allow developers to build applications that can utilize assets from any blockchain, creating a more interconnected and efficient financial ecosystem. However, they introduce counterparty risk (in custodial models) and smart contract risk, making the choice of bridge and the auditability of its reserves paramount considerations for users and integrators.

key-features
ARCHITECTURE

Key Features of Wrapped Token Standards

Wrapped token standards define the technical blueprints for creating assets that represent value from one blockchain on another. These features ensure interoperability, security, and composability across decentralized ecosystems.

02

Cross-Chain Messaging & Bridges

Wrapped tokens require a secure communication layer, or bridge, between blockchains. This involves:

  • Lock-and-Mint: Asset is locked on Chain A, a wrapped version is minted on Chain B.
  • Burn-and-Mint: Wrapped token is burned on Chain B to unlock the original on Chain A.
  • Liquidity Pools: Using pooled liquidity for instant swaps without direct minting/burning. Standards define how these messages are verified and relayed.
03

Standardized Interfaces (ERC-20, BEP-20, SPL)

Wrapped tokens conform to the destination chain's dominant token standard to ensure compatibility with existing wallets, DEXs, and DeFi protocols. Key examples:

  • ERC-20 on Ethereum and EVM chains (WBTC, WETH).
  • BEP-20 on BNB Smart Chain.
  • SPL on Solana. This standardization allows wrapped assets to be seamlessly traded, lent, or used as collateral.
04

Proof & Verification Mechanisms

To ensure the wrapped token is fully backed, systems implement verification mechanisms:

  • Multi-signature custody proofs for custodial models, requiring signatures from a decentralized set of entities.
  • Light client proofs or Merkle proofs for non-custodial bridges, where the destination chain verifies the validity of transactions on the source chain.
  • On-chain attestations from oracles or relayers providing state updates.
05

Minting & Burning Privileges

Standards define who can mint (create) and burn (destroy) wrapped tokens, which is critical for controlling supply and security.

  • Permissioned Minters: A whitelist of addresses (often DAO-governed) can initiate minting upon verifying asset lock-up.
  • Permissionless Burning: Typically, any holder can burn their wrapped tokens to redeem the underlying asset.
  • Pause Functions: Upgradeable contracts may include emergency pause functions for minting/burning.
06

Composability in DeFi

The primary value of a wrapped token standard is enabling composability. A wrapped asset like WBTC functions identically to a native ERC-20 token, allowing it to be:

  • Swapped on decentralized exchanges (Uniswap, Curve).
  • Used as collateral for borrowing/lending on platforms like Aave and Compound.
  • Integrated into yield farming strategies and liquidity pools. This creates a unified financial layer across previously isolated blockchains.
$10B+
WBTC in DeFi (peak)
examples
CROSS-CHAIN ASSETS

Examples of Wrapped Tokens

Wrapped tokens are blockchain-native representations of assets from other chains, enabling their use in decentralized finance (DeFi) and other applications. Below are prominent examples across different ecosystems.

06

Wrapped BNB (WBNB)

The BEP-20 representation of BNB Chain's native BNB token. Similar to WETH, it wraps the chain's native gas token into its own ecosystem's fungible token standard for use in smart contracts.

  • Standard: BEP-20
  • Primary Use: Essential for trading on PancakeSwap and other BNB Chain DEXs, and for DeFi protocols that require a standard token interface.
  • Mechanism: Created by depositing native BNB into a smart contract.
CORE CONCEPTS

Wrapped Tokens vs. Native Assets & Bridges

A comparison of the technical and operational characteristics of wrapped tokens, the native assets they represent, and the bridging infrastructure that connects them.

FeatureWrapped Token (e.g., WETH, WBTC)Native Asset (e.g., ETH, BTC)Cross-Chain Bridge

Primary Function

ERC-20 representation of an asset on a non-native chain

Original asset on its native blockchain

Protocol for locking/minting assets between chains

Technical Standard

Governed by token standard of destination chain (e.g., ERC-20, BEP-20)

Governed by native protocol rules (e.g., Bitcoin Script, Ethereum VM)

Custom smart contract or multi-signature system

Custody Model

Custodied by bridge smart contract on source chain

User-controlled via private keys

Custodied by bridge validators or smart contracts

Settlement Finality

Depends on destination chain confirmation

Depends on native chain confirmation

Depends on bridge's security model and source/destination chains

Interoperability

High (usable in destination chain's DeFi ecosystem)

None (confined to native chain without wrapping)

Enables interoperability by facilitating the wrapping process

Trust Assumption

Trust in bridge's mint/burn mechanism and custodians

Trust in the native chain's consensus

Trust in bridge operators, validators, or cryptographic proofs

Primary Risk Vector

Bridge compromise or failure

Native chain consensus failure

Protocol logic flaw, validator collusion, or liquidity issues

ecosystem-usage
WRAPPED TOKEN STANDARD

Ecosystem Usage and Protocols

The Wrapped Token Standard (e.g., ERC-20 on Ethereum) is a technical specification that defines how a smart contract must function to represent a token from another blockchain, enabling cross-chain liquidity and interoperability within a DeFi ecosystem.

01

Core Mechanism: Minting & Burning

A wrapped token is created through a custodial or non-custodial bridge. The process involves:

  • Locking/Minting: The original asset (e.g., BTC) is locked in a vault or smart contract on its native chain, and an equivalent amount of the wrapped version (e.g., WBTC) is minted on the destination chain.
  • Burning/Redeeming: To retrieve the original asset, the wrapped tokens are burned (destroyed), and the custodian releases the locked collateral. This 1:1 peg is maintained by the verifiable reserves held by the bridge protocol.
02

Dominant Standard: ERC-20 Wrappers

The ERC-20 token standard on Ethereum is the most common wrapper format. It allows any asset to be represented as a fungible token compatible with the vast Ethereum DeFi ecosystem. Key examples include:

  • Wrapped Bitcoin (WBTC): The largest Bitcoin representation on Ethereum.
  • Wrapped Ether (WETH): Ether wrapped into an ERC-20 format for compatibility with DEXs and lending protocols that require the standard.
  • Wrapped assets for SOL (wSOL), AVAX (WAVAX), and others follow the same principle on their respective chains.
03

Use Cases in DeFi & Trading

Wrapped tokens unlock native assets for use in decentralized finance applications on foreign chains. Primary uses include:

  • Decentralized Exchanges (DEXs): Trading BTC/ETH pairs on Uniswap or Curve.
  • Lending & Borrowing: Using wrapped BTC as collateral to borrow stablecoins on Aave or Compound.
  • Yield Farming & Liquidity Provision: Supplying wrapped assets to liquidity pools to earn trading fees and protocol rewards.
  • Synthetic Asset Creation: Serving as the underlying collateral for more complex derivative products.
04

Custodial vs. Non-Custodial Bridges

The security model of a wrapped token depends on its bridging mechanism:

  • Custodial Bridges (e.g., WBTC): Rely on a centralized entity or consortium to hold the locked original assets. Users must trust this custodian's solvency and honesty. Verifiable on-chain proof-of-reserves is critical.
  • Non-Custodial Bridges (e.g., wstETH): Use smart contracts and cryptographic proofs (like light clients or optimistic verification) to lock and mint assets without a central custodian. This reduces trust assumptions but can introduce new smart contract and validator set risks.
05

Risks & Considerations

Using wrapped tokens introduces specific risks beyond the underlying asset's volatility:

  • Bridge Risk: The smart contract or custodian holding the locked collateral is a central point of failure. Major hacks have targeted cross-chain bridges.
  • Centralization Risk: Custodial models rely on trusted entities, creating potential censorship or confiscation vectors.
  • Peg Risk: Technical failures, loss of confidence, or liquidity crises can cause the wrapped token to depeg from its underlying asset.
  • Regulatory Risk: Wrapped assets may face unclear regulatory treatment compared to their native counterparts.
06

Canonical vs. Non-Canonical Wrappers

Not all wrappers for the same asset are equal:

  • Canonical Wrappers are the officially recognized, most liquid, and widely adopted version (e.g., WBTC for Bitcoin on Ethereum). They often become the de facto standard for that asset in the ecosystem.
  • Non-Canonical Wrappers are created by other bridging protocols (e.g., renBTC, tBTC). They compete by offering different trust models (decentralized custody) but may suffer from lower liquidity and network effects. This distinction affects liquidity fragmentation and user choice between security models.
security-considerations
WRAPPED TOKEN STANDARD

Security Considerations and Risks

Wrapped tokens introduce unique security dependencies and trust assumptions beyond the underlying asset's native chain. Understanding these risks is critical for protocol developers and users.

01

Custodial Risk & Centralization

The security of a wrapped asset is fundamentally tied to the custodian or bridge protocol that holds the underlying collateral. This creates a single point of failure. Risks include:

  • Private Key Compromise: If the custodian's keys are stolen, the wrapped tokens may become worthless.
  • Regulatory Seizure: Centralized entities can be forced to freeze or confiscate funds.
  • Malicious Upgrades: A centralized multisig or admin key could upgrade the contract to mint unlimited tokens or steal funds. The 2022 Wormhole bridge hack, resulting in a $325M loss, exemplifies this risk vector.
02

Smart Contract Risk

The wrapper contract itself is a critical attack surface, separate from the underlying asset's security. Key vulnerabilities include:

  • Logic Flaws: Bugs in mint/burn, pause, or upgrade mechanisms.
  • Reentrancy Attacks: Allowing malicious contracts to manipulate balances during cross-chain messaging.
  • Oracle Manipulation: For bridges that rely on price or state oracles to verify deposits, corrupted data can lead to fraudulent mints.
  • Signature Verification Flaws: Insecure validation of off-chain authorizations for minting. Each wrapper must be audited as a standalone DeFi primitive.
03

Bridge-Specific Vulnerabilities

Cross-chain bridges, which power most wrapped assets, have complex, chain-specific attack surfaces:

  • Validation Fraud: In optimistic or light-client bridges, attackers may submit fraudulent proofs of deposits.
  • Relayer Failures: The network of relayers or validators can be censored or compromised.
  • Message Verification: Flaws in the verification of cross-chain messages (e.g., on the destination chain) can allow spoofing.
  • Liquidity Pool Exploits: Bridges using liquidity pools (like lock-mint models) are vulnerable to flash loan attacks and impermanent loss manipulation.
04

Peg Stability & Depegging Events

A wrapped token's value is pegged 1:1 to its underlying asset. This peg can break (depeg) due to:

  • Loss of Collateral: A bridge hack or custodian failure destroys the backing.
  • Redemption Failure: Technical issues preventing users from burning the wrapped token to reclaim the native asset.
  • Market Panic: Perceived insecurity can cause the wrapped token to trade at a discount on DEXs, as seen with various bridged assets post-major exploits.
  • Chain-Specific Halts: If the underlying chain halts (e.g., Solana outage), redemption is impossible, causing temporary depegs.
05

Governance & Upgrade Risks

Many wrapper contracts are governed by DAO treasuries or multisigs, introducing procedural risks:

  • Proposal Malice: A governance attack could pass a malicious proposal to drain funds.
  • Upgrade Timelock Bypass: Insufficient timelocks allow immediate execution of harmful upgrades.
  • Voter Apathy: Low participation can allow a small, coordinated group to control outcomes.
  • Tokenomics Exploits: Attackers may borrow or buy governance tokens temporarily to pass proposals, a form of governance attack.
06

Composability & Systemic Risk

Wrapped tokens are deeply integrated into DeFi (e.g., as collateral in lending protocols). A failure cascades:

  • Protocol Insolvency: If WBTC depegs, protocols using it as collateral may become undercollateralized, triggering liquidations.
  • Oracle Failures: Price oracles may fail to reflect a depeg quickly, allowing arbitrageurs to drain protocols.
  • Liquidity Crunch: A loss of confidence can cause a rush to unwrap, draining bridge liquidity and freezing funds. This creates interconnected risk where a single bridge failure can threaten the stability of multiple ecosystems.
WRAPPED TOKEN STANDARD

Common Misconceptions About Wrapped Tokens

Clarifying widespread misunderstandings about the nature, security, and functionality of wrapped tokens on blockchain networks.

A wrapped token is a tokenized representation of a native asset from one blockchain that is made usable on a different blockchain. It works through a custodial or non-custodial mechanism where the original asset is locked in a secure smart contract (a custodian or wrapper) on its source chain, and an equivalent amount of the wrapped version is minted on the destination chain. For example, Wrapped Bitcoin (WBTC) involves a user sending BTC to a custodian's address, who then mints an equivalent amount of WBTC, an ERC-20 token, on Ethereum. The process is reversible, allowing the wrapped tokens to be burned to unlock the original asset.

technical-details-standard
ERC-20 & BEYOND

Technical Details: The Standard Interface

This section details the core technical specifications that define a wrapped token, focusing on the smart contract interfaces that enable interoperability and trustless operations across different blockchain systems.

A wrapped token standard is a formalized smart contract interface that defines the functions and events required to create, manage, and redeem a token that represents an asset from another blockchain or system. The most prevalent standard for wrapped tokens on Ethereum and EVM-compatible chains is ERC-20, which provides the foundational blueprint for fungible tokens. This interface mandates functions like transfer, approve, and balanceOf, ensuring all wrapped tokens behave predictably and can interact seamlessly with wallets, decentralized exchanges (DEXs), and other DeFi protocols. Adherence to a common standard is what allows a wrapped Bitcoin (WBTC) to be traded on Uniswap or used as collateral on Aave just like any native ERC-20 token.

The technical implementation revolves around a custodial or decentralized bridge and a wrapper contract. The wrapper contract, which conforms to the ERC-20 standard, holds the custodial reserves or verifies cryptographic proofs. Key functions include deposit (or mint), where a user locks the native asset on the source chain, triggering the minting of an equivalent amount of the wrapped token on the destination chain. Conversely, the withdraw (or burn) function allows a user to destroy their wrapped tokens, which signals the release of the underlying asset. Events like Deposit and Withdrawal are emitted for transparent on-chain tracking of all mint and burn operations.

While ERC-20 is dominant, other standards are used for specific asset types. ERC-721 and ERC-1155 are employed for wrapped non-fungible tokens (NFTs), allowing NFTs from one chain to be represented on another. Furthermore, cross-chain messaging protocols like LayerZero and Wormhole have developed their own generalized token bridging standards that often extend ERC-20 with additional functions for cross-chain communication. These standards abstract away the complexity of the underlying bridge, presenting developers with a simple, familiar ERC-20 interface while the protocol handles the secure transfer of asset ownership and state across disparate networks.

WRAPPED TOKEN STANDARD

Frequently Asked Questions (FAQ)

Essential questions and answers about the ERC-20 standard for creating wrapped tokens, which represent assets from other blockchains on Ethereum.

The ERC-20 token standard is a technical specification on the Ethereum blockchain that defines a common set of rules and functions that all compliant tokens must implement. It works by providing a standard interface—including functions like transfer(), balanceOf(), and approve()—that allows wallets, exchanges, and smart contracts to interact with any token in a predictable way. This standardization is crucial for interoperability, as it ensures that applications don't need custom code for each new token. The standard covers token transfers, approvals for delegated spending, and basic data retrieval, forming the foundation for the vast majority of fungible tokens on Ethereum.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Wrapped Token Standard: Definition & Examples | ChainScore Glossary