A bridged token is a derivative asset created on a destination blockchain that represents a locked or escrowed asset on a source blockchain. This process, known as token bridging, enables assets like Bitcoin, Ethereum, or USDC to be used on alternative networks like Solana, Avalanche, or Polygon. The bridge's smart contracts lock the original tokens and mint a corresponding amount of wrapped tokens on the new chain, maintaining a 1:1 peg to the value of the original asset. These tokens are often prefixed with a label indicating their bridged nature, such as wBTC (Wrapped Bitcoin) or USDC.e (Bridged USDC on Avalanche).
Bridged Token
What is a Bridged Token?
A bridged token is a representation of a native cryptocurrency that has been transferred from its original blockchain to a different blockchain network.
The primary mechanism involves a lock-and-mint or burn-and-mint model. In the lock-and-mint model, the native tokens are deposited into a secure custodian contract on the source chain, and an equivalent amount of bridged tokens are minted on the destination chain. To redeem the original asset, the bridged tokens are burned on the destination chain, unlocking the native tokens from the source chain's custodian. Bridges can be categorized as trusted (relying on a federation or multi-signature wallet for custody) or trustless (using cryptographic proofs and decentralized networks for verification).
Bridged tokens are fundamental to cross-chain interoperability, allowing users to access different blockchain ecosystems' unique features—such as lower fees, faster transactions, or specific DeFi applications—without selling their original holdings. However, they introduce distinct risks, primarily bridge security. Since the bridged token's value is entirely dependent on the integrity of the bridge's custodian or verification mechanism, a bridge hack or failure can render the bridged tokens worthless, as seen in incidents like the Wormhole and Ronin bridge exploits. Users must assess the trust assumptions of the bridging protocol they use.
From a technical accounting perspective, a bridged token is a claim on the underlying asset held in custody, not the asset itself. This distinction is crucial for protocols and auditors. Furthermore, while bridged tokens facilitate liquidity fragmentation across chains, they can create confusion, as the same asset (e.g., USDC) may exist in native and multiple bridged forms (e.g., native USDC on Arbitrum vs. bridged USDC from Ethereum). This necessitates careful asset verification by users and developers to ensure compatibility with applications that may only support one specific version.
How a Bridged Token Works
A bridged token is a synthetic representation of an asset from one blockchain that exists on another, enabling cross-chain liquidity and functionality. This process, known as token bridging, does not physically move the original asset but creates a locked-and-minted or burned-and-released derivative.
A bridged token is a derivative asset created on a destination blockchain that represents a locked or burned original asset on a source chain. The core mechanism involves a bridging protocol or bridge that locks the original tokens in a smart contract or custodian account on the source chain. Upon confirming this lock, the protocol mints an equivalent number of the bridged token on the destination chain. This process is often called lock-and-mint. To return the asset, the bridged tokens are burned on the destination chain, which signals the protocol to release the original tokens from the source chain's lock—a burn-and-release mechanism.
Bridges operate under different trust models, which define their security and decentralization. Trusted (or custodial) bridges rely on a centralized federation or multi-signature wallet to hold the locked assets, introducing counterparty risk. In contrast, trustless (or decentralized) bridges use cryptographic proofs and smart contracts to automate the process without a central custodian. Common trustless models include light client relays, which verify block headers, and optimistic or zero-knowledge (zk) proof systems, which cryptographically validate state transitions between chains.
The lifecycle of a bridged token involves several key participants and components. A user initiates a deposit transaction on the source chain. Bridge validators or relayers observe this event and attest to its validity. This attestation is passed to the destination chain, where a minting contract creates the bridged tokens for the user. Popular examples include Wrapped Bitcoin (WBTC) on Ethereum (a custodial model) and Wormhole-wrapped assets (which use a decentralized guardian network). Each bridged token is typically pegged 1:1 to the original asset, though its value depends entirely on the security and redeemability of the underlying bridge.
Bridged tokens unlock critical cross-chain functionality, allowing assets to be used in the decentralized finance (DeFi) ecosystems of other blockchains. For instance, Bitcoin can be bridged to Ethereum to serve as collateral in lending protocols like Aave or to provide liquidity in automated market makers (AMBs) like Uniswap. However, they introduce unique risks, primarily bridge risk—the risk that the bridge itself is compromised, leading to a loss of the locked assets. This makes the security architecture and audit history of the bridging protocol a paramount consideration for users.
From a technical perspective, bridged tokens are distinct from native cross-chain assets or multi-chain assets that natively exist on multiple ledgers (e.g., USDC). They are also different from wrapped tokens created purely within a single chain's ecosystem (like Wrapped ETH, or WETH). The smart contract for a bridged token on the destination chain must enforce a strict supply cap equal to the assets locked on the source chain, and its canonical status is often determined by being the officially recognized bridge for a project's community.
Key Features of Bridged Tokens
Bridged tokens are synthetic assets that represent a cryptocurrency on a different blockchain, created through a cross-chain bridge. Their functionality and security are defined by specific technical characteristics.
Wrapped Representation
A bridged token is a wrapped representation of a native asset from another chain. It is minted on the destination chain (e.g., Wrapped BTC on Ethereum) and is typically backed 1:1 by the original asset locked in a custodial vault or smart contract on the source chain. The token's value is pegged to the original, but its technical implementation (e.g., ERC-20, SPL) is native to the new environment.
Bridge Dependency & Risk
The existence and security of a bridged token are entirely dependent on the underlying bridge. Key risks include:
- Smart Contract Risk: Bugs in the bridge's locking/minting contracts.
- Custodial Risk: For trusted bridges, reliance on a central validator or multi-sig.
- Liquidity Risk: Inability to redeem the underlying asset if the bridge fails. This creates a distinct risk profile compared to the native asset.
Canonical vs. Non-Canonical
Bridged tokens are categorized by their issuance authority:
- Canonical (Official): Issued by the bridge recognized as the standard by the asset's native community (e.g., WETH, WBTC).
- Non-Canonical (Unofficial): Issued by third-party bridges, leading to multiple wrapped versions of the same asset (e.g., renBTC, multichain BTC) on one chain. This can fragment liquidity and create confusion.
Minting & Burning Mechanism
The supply of bridged tokens is controlled by a deterministic mint-and-burn process:
- Lock/Mint: User locks Asset A on Chain X, providing cryptographic proof to Chain Y's bridge contract, which mints wrapped Asset A on Chain Y.
- Burn/Release: To redeem, the user burns the wrapped token on Chain Y, providing proof to unlock the original asset on Chain X. This mechanism maintains the 1:1 peg.
Composability in DeFi
Bridged tokens unlock composability by allowing assets to be used in decentralized applications on foreign chains. For example, wBTC (Wrapped Bitcoin) on Ethereum can be used as collateral in lending protocols like Aave, deposited into liquidity pools on Uniswap, or integrated into yield strategies. This is their primary utility, but it inherits the bridge's security assumptions.
Underlying Proof Mechanism
Bridges use different consensus mechanisms to verify transactions and authorize minting:
- Externally Verified (Trusted): Relies on a federation or multi-sig of known entities.
- Locally Verified (Trust-Minimized): Uses light clients or cryptographic proofs (like zk-SNARKs or optimistic verification) to validate state transitions from the source chain. The proof mechanism is the core security layer for the bridged asset.
Bridge Security Models & Token Types
A comparison of the primary security models used by cross-chain bridges and the token types they produce, detailing their trust assumptions, custody, and technical characteristics.
| Security Model / Token Type | Description | Trust Assumptions | Custody | Example Bridges |
|---|---|---|---|---|
Lock & Mint (Wrapped) | Assets are locked on the source chain and a synthetic representation is minted on the destination chain. | Validators/Oracles, Bridge Smart Contract Security | Custodial (Bridge) | Multichain (formerly Anyswap), Wormhole |
Burn & Mint (Canonical) | Assets are burned on the source chain and an equivalent amount is minted from a canonical supply on the destination chain. | Destination Chain Validators, Token Issuer | Non-Custodial (User) | Polygon PoS Bridge, Arbitrum Bridge |
Liquidity Network (Pool-based) | Assets are swapped via liquidity pools on both chains; no minting or burning of synthetic assets. | Liquidity Providers, DEX AMM Security | Non-Custodial (LP Pools) | Hop Protocol, Stargate |
Optimistic Verification | Uses a fraud-proof window where transactions can be challenged before finalization, reducing active validator load. | Watchers (Fraud Provers), Challenge Period | Varies (Model-Dependent) | Nomad, Synapse (Optimistic Rollup Bridges) |
Light Client / Relayer | Relayers submit cryptographic proofs (e.g., Merkle proofs) that are verified by light client smart contracts on the destination chain. | Source Chain Consensus (e.g., 2/3+ validators) | Non-Custodial (User) | IBC, Near Rainbow Bridge |
Federated / Multi-sig | A defined set of trusted entities (federation) signs off on cross-chain transactions. | Honest Majority of Federation Members | Custodial (Federation) | WBTC, early versions of Polygon Bridge |
Common Bridged Token Examples
Bridged tokens are not theoretical; they are the foundational assets powering cross-chain DeFi. This section details prominent examples, their underlying technology, and their role in the multi-chain ecosystem.
Wrapped Ether (WETH)
Wrapped Ether (WETH) is an ERC-20 representation of native Ether (ETH). Unlike most bridges, it operates on a single chain (Ethereum) to convert the native asset into a standardized token format. This is essential because Ethereum's native ETH does not conform to the ERC-20 standard, which is required by most decentralized exchanges (DEXs) and smart contracts.
Ecosystem Usage & Protocols
A bridged token is a representation of a native asset from one blockchain that is locked and mirrored on another, enabling cross-chain liquidity and functionality. This section details the core mechanisms, security models, and major protocols that power this critical interoperability layer.
Lock-and-Mint Mechanism
The most common bridging model where the native asset is locked or burned in a smart contract on the source chain, and an equivalent amount of the wrapped token is minted on the destination chain. This creates a 1:1 pegged representation.
- Example: Locking ETH on Ethereum to mint WETH on Arbitrum.
- Custody: Assets are held by a custodian, which can be a multi-sig wallet, a decentralized validator set, or the protocol's smart contracts themselves.
Liquidity Pool Models
Some bridges use liquidity pools on both chains instead of minting tokens. Users deposit assets into a pool on Chain A and withdraw from a corresponding pool on Chain B.
- Atomic Swaps: Facilitates near-instant transfers without a central custodian holding funds.
- Examples: Connext and Hop Protocol use this model for fast, trust-minimized transfers of stablecoins and other assets.
Canonical vs. Non-Canonical Bridges
A critical distinction for security and composability.
- Canonical Bridge: The officially sanctioned bridge for a Layer 2 or appchain, often deployed by the core development team. Tokens bridged this way are the native canonical representation on the new chain (e.g., ETH bridged via the official Optimism bridge).
- Non-Canonical Bridge: A third-party bridge. Using it creates a different token contract, which can lead to fragmentation and is not recognized by all native DeFi applications.
Security & Trust Assumptions
Bridge security models define the trust required for asset safety.
- Trusted (Custodial): Relies on a centralized federation or multi-sig. Users trust the bridge operators not to collude or get hacked.
- Trust-Minimized: Uses cryptographic proofs and decentralized validator sets. Light client bridges and ZK-proof bridges fall here, offering stronger security by verifying state proofs from the source chain.
Major Bridging Protocols
Key infrastructure enabling cross-chain asset transfers.
- Wormhole: A generic message-passing protocol that uses a decentralized guardian network for attestations.
- LayerZero: An omnichain interoperability protocol using an Oracle and Relayer for lightweight message verification.
- Axelar: A blockchain network providing cross-chain communication via a proof-of-stake validator set.
- Polygon PoS Bridge: The canonical bridge for the Polygon network, using a federated security model with checkpointing to Ethereum.
Risks & Considerations
Using bridged tokens introduces specific risks beyond smart contract vulnerabilities.
- Bridge Risk: The bridge itself is a central point of failure; several have been exploited for billions.
- Wrapped Asset Depeg: The bridged token can lose its 1:1 peg if the bridge is compromised or the custodian acts maliciously.
- Composability Risk: Non-canonical tokens may not be integrated into the destination chain's core DeFi protocols, reducing utility.
Security Considerations & Risks
Bridged tokens inherit the security model of the bridge that mints them, introducing unique risks beyond the underlying asset's native chain.
Bridge Custody Risk
The most critical risk is the custodial model of the bridge. In a custodial or trusted bridge, users deposit assets with a centralized entity, creating a single point of failure. Non-custodial bridges rely on decentralized validator sets or cryptographic proofs, but can still be vulnerable if the consensus mechanism is compromised. The security of the bridged token is only as strong as the bridge's ability to protect the locked collateral.
Smart Contract Risk
The bridge's smart contracts on both the source and destination chains are high-value targets for exploits. Vulnerabilities can lead to:
- Unlimited minting of bridged tokens without backing collateral.
- Theft of locked funds in the bridge's vault.
- Logic errors that prevent users from redeeming their original assets. Major breaches like the Wormhole ($325M) and Ronin Bridge ($625M) exploits were due to smart contract vulnerabilities.
Validator/Oracle Risk
Many bridges use external validators or oracles to attest to cross-chain transactions. This creates attack vectors:
- Collusion: A supermajority of validators can approve fraudulent withdrawals.
- Oracle compromise: If the data feed is manipulated, invalid state transitions can be certified.
- Liveness failure: If validators go offline, assets can be stuck. This risk is central to fraud-proof and optimistic bridge designs.
Wrapped vs. Native Confusion
Users often confuse bridged/wrapped tokens (e.g., USDC.e on Avalanche) with native tokens (e.g., native USDC on Avalanche). Key risks include:
- Liquidity fragmentation across multiple versions of the same asset.
- Depeg risk if the bridge is compromised, while the native asset remains sound.
- Protocol incompatibility, as some DeFi applications may only accept the native canonical version. Always verify the token contract address.
Liquidity & Redemption Risk
The ability to redeem a bridged token for the original asset depends on the bridge's liquidity and operation status. Risks include:
- Bridge shutdown: If the bridge ceases operation, redemption may become impossible.
- Insolvency: If the locked collateral is stolen or depleted, bridged tokens become unbacked.
- Withdrawal delays: Some bridges have long challenge periods (e.g., 7 days) for fraud proofs, during which funds are inaccessible.
Canonical Bridge Preference
The canonical bridge (often built or endorsed by the destination chain's core team) is typically the most secure option for bridging assets. It benefits from:
- Direct integration with the chain's security and upgrade mechanisms.
- Greater scrutiny and formal verification.
- Official token status, reducing confusion. Using unofficial third-party bridges increases exposure to the aforementioned risks and should involve thorough due diligence.
Common Misconceptions
Bridged tokens are a cornerstone of multi-chain interoperability, but their technical and security models are often misunderstood. This section clarifies the critical differences between canonical and wrapped assets, the role of custodians, and the inherent risks of bridging protocols.
No, a bridged token is a derivative representation of an asset on a foreign blockchain, not the original asset itself. When you bridge an asset like Ethereum's ETH to the Avalanche C-Chain, you do not receive native AVAX-wrapped ETH. Instead, you receive a token (e.g., bridge.eth) minted by a smart contract on Avalanche, which is backed by the original ETH locked in a vault on Ethereum. The bridged token's value and security are entirely dependent on the integrity and solvency of the bridging protocol, not the destination chain's native validation rules.
Technical Details
Bridged tokens are representations of assets locked on one blockchain that are minted on another. This glossary details the core mechanisms, security models, and trade-offs involved in cross-chain asset transfers.
A bridged token is a representation of a native asset from one blockchain that is minted on a different blockchain, enabling the asset to be used in the destination chain's ecosystem. The process involves locking or burning the original asset on the source chain, which triggers a minting event of a corresponding token on the destination chain via a bridge protocol. This token is pegged 1:1 to the value of the original asset. Common examples include Wrapped Bitcoin (WBTC) on Ethereum and USDC.e (bridged USDC) on Avalanche.
Key Characteristics:
- Custodial Model: The original assets are held by a central entity or a multi-sig wallet.
- Representation: The bridged token is a new smart contract on the destination chain.
- Trust Assumption: Users must trust the bridge's custodians or validators to honor redemption requests.
Frequently Asked Questions (FAQ)
Common questions about tokens that exist on multiple blockchains via a bridge, covering their mechanics, risks, and canonical status.
A bridged token is a representation of a native asset from one blockchain that has been transferred to another blockchain via a cross-chain bridge. The process typically involves locking or burning the original tokens on the source chain and minting an equivalent amount of wrapped tokens on the destination chain. For example, Wrapped Bitcoin (WBTC) is a bridged token representing Bitcoin on the Ethereum network, where real BTC is custodied, and WBTC is minted as an ERC-20 token. The bridge's smart contracts and validators manage the locking and minting process to ensure the total supply of bridged tokens is backed 1:1 by the locked originals.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.