Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Bridged Token

A bridged token is a token on a destination chain that represents a locked or burned asset on a source chain, often issued by a bridge protocol.
Chainscore © 2026
definition
BLOCKCHAIN INTEROPERABILITY

What is a Bridged Token?

A bridged token is a representation of a native asset from one blockchain that exists and operates on a different blockchain, created through a cross-chain bridge.

A bridged token is a synthetic representation of a native asset from one blockchain that exists and operates on a different blockchain, created through a cross-chain bridge. It is not the original asset but a wrapped or pegged version that is programmatically linked to it. For example, Wrapped Bitcoin (WBTC) on Ethereum is a bridged token representing Bitcoin, allowing BTC to be used within Ethereum's ecosystem of decentralized applications (dApps) and DeFi protocols. The value of a bridged token is intended to be 1:1 with the original asset, maintained through locking or burning mechanisms on the source chain.

The creation process, or bridging, typically involves locking the native asset in a secure smart contract or custodian on its original chain and minting an equivalent amount of the bridged token on the destination chain. This process is often managed by a bridge protocol which can be trusted (relying on a federation or custodian) or trust-minimized (using cryptographic proofs and decentralized networks). When a user wishes to reclaim the original asset, they "burn" or destroy the bridged token, which triggers the release of the locked collateral on the source chain.

Bridged tokens are fundamental to blockchain interoperability, enabling liquidity and functionality to flow between otherwise isolated networks. They allow assets to access different features, such as using Bitcoin in Ethereum's faster, smart contract-enabled environment for lending or yield farming. However, they introduce specific risks, primarily counterparty risk in trusted models and smart contract risk in all models. The security of the bridged token is entirely dependent on the security and correctness of the bridge infrastructure, which has been a significant attack vector in the ecosystem.

Common standards for bridged tokens exist within their destination chains. On Ethereum and other EVM-compatible networks, bridged tokens are most often issued as ERC-20 tokens. Distinguishing between a bridged token and a native wrapped token (like WETH, which wraps the chain's own native ETH) is important; a bridged token always represents an asset foreign to the chain it resides on. Prominent examples include Wrapped BTC (WBTC), Multichain's anyUSDC, and Wormhole's Wrapped Asset (WA) tokens.

When interacting with bridged tokens, users and developers must verify the canonical bridge authority, as multiple unofficial or fraudulent "wrapped" versions of an asset can exist. The canonical bridge is the officially recognized and most widely adopted bridge for that asset, often endorsed by the asset's originating project. Using non-canonical bridges can lead to illiquidity or total loss if the bridge fails. Auditing the bridge's security model—whether it uses lock-and-mint, burn-and-mint, or liquidity pool mechanisms—is a critical due diligence step.

key-features
BRIDGED TOKEN

Key Features

Bridged tokens are asset representations that enable cross-chain liquidity and interoperability. Their functionality and security are defined by the underlying bridging mechanism.

01

Wrapped Assets

A bridged token is a wrapped asset that represents a native token from another blockchain. The canonical version is locked in a smart contract on the source chain, and an equivalent amount of the wrapped token is minted on the destination chain. This is the most common form of bridging, enabling assets like Wrapped Bitcoin (WBTC) on Ethereum.

02

Cross-Chain Liquidity

The primary function is to unlock liquidity across isolated blockchain ecosystems. By creating a synthetic representation, users can leverage assets from one chain (e.g., Bitcoin's value) within the DeFi applications (like lending or trading) of another chain (e.g., Ethereum or Solana).

03

Bridge Security Models

The security and trust assumptions of a bridged token are dictated by its bridge:

  • Trusted (Custodial): A central entity or multi-sig holds the locked assets.
  • Trust-Minimized: Uses cryptographic proofs (like light clients or validity proofs) to verify state transitions.
  • Liquidity Network: Relies on liquidity providers and economic incentives, not asset locking.
04

Canonical vs. Non-Canonical

A canonical bridge is the official, often native, bridge between two chains (e.g., the Arbitrum bridge for ETH). Its bridged tokens are considered the canonical representation. Non-canonical bridges are third-party, creating alternative wrapped versions, which fragments liquidity and introduces depeg risk if the bridge is compromised.

05

Inherent Risks

Bridged tokens carry specific risks beyond the underlying asset:

  • Bridge Risk: The smart contract holding the locked assets is a central point of failure.
  • Custodial Risk: In trusted models, the custodian may act maliciously.
  • Wrapping Complexity: Multiple wrapping layers (e.g., Bitcoin → WBTC → multichain.xyz Bitcoin) increase systemic risk.
06

Examples & Standards

Common implementations include:

  • Wrapped BTC (WBTC): ERC-20 token representing Bitcoin on Ethereum.
  • Multichain (formerly AnySwap): A router protocol creating bridged tokens across many chains.
  • Wormhole Wrapped Assets: Tokens bridged via the Wormhole message-passing protocol. Many use token standards like ERC-20 or SPL on their destination chain.
how-it-works
CROSS-CHAIN MECHANICS

How Bridged Tokens Work

A technical breakdown of the mechanisms that enable tokenized assets to move between independent blockchain networks.

A bridged token is a representation of a native asset from one blockchain that is locked or burned on its source chain and minted as a synthetic equivalent on a destination chain, enabling cross-chain liquidity and functionality. This process is facilitated by a bridge protocol, which acts as a trusted intermediary or a set of decentralized smart contracts to manage the asset's custody and the mint/burn operations. The canonical example is Wrapped Bitcoin (WBTC), an ERC-20 token on Ethereum that represents Bitcoin locked in a custodian's vault, allowing BTC to be used within Ethereum's DeFi ecosystem.

The core technical operation involves a lock-and-mint or burn-and-release model. In a lock-and-mint bridge, the original asset (e.g., ETH) is sent to a secure address (often a multi-signature wallet or a smart contract) on the source chain, which then triggers the minting of an equivalent amount of the bridged token (e.g., WETH on Arbitrum) on the destination chain. To return the asset, the bridged token is burned on the destination chain, providing cryptographic proof that releases the original asset from custody on the source chain. This mechanism requires a verification system, which can range from a centralized federation to a decentralized network of light clients or optimistic fraud proofs.

Different bridge architectures present distinct security and trust models. Trusted or custodial bridges rely on a central entity or a multi-sig committee to hold the locked assets, introducing counterparty risk. Trust-minimized bridges use cryptographic proofs and economic incentives; for example, light client bridges verify block headers from the source chain, while liquidity networks use atomic swaps and liquidity pools without centralized custody. The choice of model involves a fundamental trade-off between security, decentralization, and speed, with more secure bridges often being slower and more complex to operate.

Bridged tokens introduce unique risks, primarily bridge exploit risk, where a vulnerability in the bridge's smart contracts or validator set can lead to the theft of locked assets—a common vector for major crypto heists. There is also wrapping risk, where the bridged token's value becomes decoupled from its underlying asset if the custodian becomes insolvent or the bridge fails. Furthermore, canonical bridges (officially endorsed by the destination chain) and third-party bridges compete, leading to fragmentation where multiple representations of the same asset (e.g., USDC.e and native USDC) exist on one chain, creating complexity for users and protocols.

For developers and protocols, integrating bridged tokens requires careful consideration. Smart contracts must account for the specific token standard and decimal precision of the bridged asset, which may differ from the native version. Protocols often implement allowlists for specific bridge origins to manage risk and may offer incentives for liquidity migration to a canonical version. The long-term evolution points toward native cross-chain messaging and interoperability protocols like the Inter-Blockchain Communication (IBC) protocol, which aim to make asset transfers a seamless, trustless primitive rather than a layered abstraction.

examples
CASE STUDIES

Examples of Bridged Tokens

Bridged tokens are asset representations locked on one blockchain and minted on another. These examples illustrate different bridging mechanisms and their real-world applications.

COMPARISON

Bridged Token vs. Native Token vs. Wrapped Token

A technical comparison of token types based on their origin, security model, and canonical status.

FeatureBridged TokenNative TokenWrapped Token

Origin Chain

Foreign chain (e.g., ETH on Avalanche)

The chain itself (e.g., AVAX on Avalanche)

Same chain (e.g., wETH on Ethereum)

Canonical Issuance

Underlying Asset

Locked/minted via a bridge

The chain's base asset

Locked in a smart contract

Security Model

Depends on the bridge's validators

The chain's consensus

The underlying chain's consensus

Custodian Risk

Bridge multisig or validator set

None

Single smart contract

Primary Use Case

Cross-chain liquidity and composability

Network fees and staking

Interoperability within a single DeFi ecosystem

Example

USDC.e (Bridged from Ethereum to Avalanche)

SOL (Solana)

Wrapped BTC (WBTC on Ethereum)

Redemption Complexity

Multi-step, cross-chain

N/A (native unit)

Single-chain transaction

security-considerations
BRIDGED TOKEN

Security Considerations & Risks

Bridged tokens introduce unique security dependencies beyond the underlying asset's native chain. The primary risks stem from the security model of the bridge itself, which acts as a centralized point of failure or a complex smart contract system.

01

Bridge Custody Risk

The most critical risk is the custodial model of the bridge. In a locked-and-minted system, the native assets are held in a vault (smart contract or multi-sig wallet). A compromise of this vault leads to a total loss of backing for all bridged tokens. Examples include:

  • Private key compromise of a multi-sig.
  • Exploit of the vault's smart contract logic.
  • Regulatory seizure of centralized bridge operator funds.
02

Validator/Oracle Risk

Most bridges rely on a validator set or oracle network to attest to deposits and authorize minting on the destination chain. This creates a consensus risk:

  • 51% Attack: If a majority of validators collude, they can mint unbacked tokens or steal locked assets.
  • Liveness Failure: If the validator set stops attesting, the bridge becomes unusable, freezing funds.
  • Implementation Bugs: Flaws in the relayer or attestation logic can be exploited to pass invalid messages.
03

Smart Contract Risk

The bridge's on-chain components on both the source and destination chains are complex smart contracts with significant attack surface. This includes the token minting/burning contracts, message verifiers, and liquidity pools. Historical exploits like the Wormhole ($325M) and Ronin Bridge ($625M) were due to vulnerabilities in signature verification and validator node compromise, respectively. Rigorous, continuous audits are non-negotiable.

04

Liquidity & Peg Risk

Bridged tokens rely on liquidity providers or a 1:1 backing guarantee to maintain their peg to the native asset. Risks include:

  • Liquidity Fragmentation: A bridged token (e.g., USDC.e) may have lower liquidity than the canonical version on that chain, leading to slippage and de-pegging during volatility.
  • Redemption Failure: In a crisis, if users rush to burn bridged tokens to redeem native assets, the bridge's liquidity or processing capacity may fail, breaking the peg.
05

Upgradeability & Admin Key Risk

Many bridge contracts have upgradeability mechanisms controlled by a DAO or multi-sig committee. This introduces governance and centralization risks:

  • A malicious or coerced upgrade could change bridge rules to steal funds.
  • Governance attacks could lead to a hostile takeover of the bridge's admin keys.
  • The time delay for upgrades (if any) creates a window of vulnerability if a bug is discovered.
06

Cross-Chain Message Risk

Bridging is fundamentally a cross-chain messaging problem. The security of the bridged token is only as strong as the underlying messaging protocol (e.g., IBC, LayerZero, Axelar, CCTP). Risks include:

  • Message Forgery: Spoofing a deposit event to mint free tokens.
  • Replay Attacks: Using a valid message multiple times.
  • Network Congestion: Messages getting delayed or lost, stranding funds in transit.
ecosystem-usage
BRIDGED TOKEN

Ecosystem Usage

Bridged tokens are representations of assets from one blockchain that are locked on a source chain and minted on a destination chain, enabling cross-chain liquidity and functionality. Their usage patterns define the modern multi-chain ecosystem.

01

Cross-Chain Liquidity Provision

Bridged tokens are the primary mechanism for moving liquidity between isolated blockchains. They allow assets like ETH to be used as WETH on other chains (e.g., Arbitrum, Polygon), enabling DeFi activities such as lending, trading, and yield farming in new ecosystems without selling the original asset.

02

Interoperable DeFi Composability

By representing assets from other chains, bridged tokens enable composability across ecosystems. A user can collateralize bridged BTC on Ethereum to borrow USDC, then bridge that USDC to Avalanche to provide liquidity in a farm. This creates interconnected financial legos across multiple networks.

03

Asset-Specific Bridge Models

Different bridging models exist, each with distinct usage implications:

  • Lock-and-Mint: The canonical asset is locked on the source chain, and a representative token is minted on the destination (e.g., Wrapped BTC).
  • Liquidity Network: Users swap assets via liquidity pools on both chains (e.g., some LayerZero applications).
  • Native Issuance: The asset is natively issued on multiple chains with a burn/mint mechanism (e.g., USDC via CCTP).
04

Security & Trust Assumptions

Usage of a bridged token inherently accepts the security model of its bridge. This can range from trust-minimized cryptoeconomic security (light clients, fraud proofs) to federated/multisig models where a committee validates transfers. The bridge's security directly impacts the risk profile of the bridged asset.

05

Canonical vs. Non-Canonical Tokens

A critical usage distinction is between canonical and non-canonical bridged tokens. A canonical bridged token (e.g., USDC bridged via its official Circle bridge) is the recognized, redeemable standard on that chain. Non-canonical versions from third-party bridges may have lower liquidity and different redemption paths, creating fragmentation.

06

Risks & Considerations

Using bridged tokens introduces specific risks:

  • Bridge Risk: The bridge contract or validator set is a central point of failure for hacks.
  • Liquidity Fragmentation: Multiple bridge versions of the same asset (e.g., USDC.e vs. native USDC) split liquidity.
  • Wrapping Complexity: Deeply nested wraps (e.g., a token bridged multiple times) increase redemption steps and counterparty risk.
BRIDGED TOKENS

Frequently Asked Questions

Common questions about bridged tokens, which are synthetic assets representing value locked on another blockchain.

A bridged token is a synthetic asset created on a destination blockchain that represents and is backed one-to-one by a native asset locked in a smart contract on a source blockchain. It enables the transfer of value and liquidity across different, otherwise incompatible, blockchain networks. The process, known as bridging, involves locking or burning the original asset on the source chain and minting a corresponding representation on the target chain. Popular examples include Wrapped Bitcoin (WBTC) on Ethereum, which represents Bitcoin, and various canonical bridges like the Wormhole bridge for Solana and Ethereum.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team