Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Wrapped Token

A wrapped token is a blockchain token that represents a native asset from another blockchain, pegged 1:1 to its value and secured by a custodian or smart contract bridge.
Chainscore © 2026
definition
BLOCKCHAIN INTEROPERABILITY

What is a Wrapped Token?

A wrapped token is a blockchain-native asset that represents a token from another blockchain, enabling it to be used within a different decentralized ecosystem.

A wrapped token is a blockchain-native asset that represents a token from another blockchain, enabling it to be used within a different decentralized ecosystem. It is a custodial or non-custodial representation of the original asset, which is locked or burned on its native chain. The most common example is Wrapped Bitcoin (WBTC), an ERC-20 token on Ethereum that represents Bitcoin, allowing BTC to be utilized in DeFi protocols like Uniswap or Aave. This process of creating a wrapped version is often called "wrapping" or "bridging."

The mechanism relies on a custodian or a decentralized network of validators who hold the original assets in a secure reserve, often called a custody contract or vault. When a user wraps an asset, they send it to this custodian, which then mints an equivalent amount of the wrapped token on the destination chain. To redeem the original asset, the user burns the wrapped tokens, triggering the release of the collateral from the vault. This model introduces elements of counterparty risk and trust assumptions, which vary between centralized, federated, and decentralized bridging solutions.

Wrapped tokens are fundamental to cross-chain interoperability, solving the problem of blockchain silos. They allow value and functionality to flow between ecosystems—for instance, using Bitcoin to provide liquidity on an Ethereum-based automated market maker (AMM) or to serve as collateral for a loan. Beyond simple assets, the concept extends to wrapped NFTs and other digital representations. However, users must assess the security of the underlying bridge or custodian, as exploits on these connecting layers have led to significant losses of locked collateral.

The technical standard for a wrapped token varies by the hosting blockchain. On Ethereum, it is typically an ERC-20 token with additional metadata and functions managed by a controller contract. Other chains use their own standards, such as BEP-20 on BNB Chain or SPL on Solana. The smart contract governing the wrapper manages the minting and burning processes, maintains a 1:1 peg with the underlying asset through arbitrage incentives, and may implement multi-signature controls or decentralized oracle networks to verify lock-up events on the source chain.

Prominent examples illustrate their utility: Wrapped Ether (WETH) allows native ETH, which doesn't conform to the ERC-20 standard, to be seamlessly traded on decentralized exchanges. Wrapped MATIC (WMATIC) enables Polygon's native token to interact with Ethereum DeFi. The ecosystem also includes canonical bridges deployed by layer-2 networks like Arbitrum and Optimism, which mint standardized wrapped versions of assets moving from Ethereum. As blockchain ecosystems proliferate, wrapped tokens remain a critical, albeit trust-dependent, plumbing layer for a interconnected multi-chain world.

how-it-works
MECHANISM

How Wrapped Tokens Work

A technical breakdown of the custodial and trust-minimized systems that enable asset interoperability across disparate blockchain networks.

A wrapped token is a blockchain-native digital asset that represents a token from another blockchain, locked or custodied in a secure manner, enabling the original asset's value and functionality to be used on a non-native network. This process, known as token wrapping, involves depositing the original asset (e.g., Bitcoin) into a designated custodian system, which then mints a corresponding pegged token (e.g., Wrapped Bitcoin or WBTC) on the target chain. The value of the wrapped token is algorithmically or contractually pegged 1:1 to the underlying asset, allowing it to function within the destination blockchain's ecosystem of decentralized applications (dApps), decentralized exchanges (DEXs), and lending protocols.

The core mechanism relies on a custodian or a bridge protocol that manages the reserve of the original assets. In a centralized model, a designated custodian (often a consortium) holds the underlying assets and mints/burns the wrapped tokens based on user requests. In contrast, trust-minimized or decentralized bridges use smart contracts and cryptographic proofs to lock assets on the source chain and mint representations on the destination chain, reducing reliance on a single entity. The wrapped token itself is typically a standard token (like an ERC-20 on Ethereum or a BEP-20 on BNB Chain) whose smart contract enforces the peg by only allowing minting when new collateral is proven and burning when assets are redeemed.

Key technical concepts include the minting and burning processes. To create a wrapped token, a user sends the native asset to the custodian or bridge contract, which, upon verification, issues the equivalent wrapped tokens to the user's address on the new chain. To redeem the original asset, the user sends the wrapped tokens back to the bridge contract or custodian, which then burns (destroys) them and releases the locked collateral. This mint-and-burn mechanism ensures the total supply of wrapped tokens in circulation always matches the quantity of assets held in reserve, maintaining the 1:1 peg.

Prominent examples illustrate the utility and variation in design. Wrapped Bitcoin (WBTC) is the largest wrapped asset, representing Bitcoin on the Ethereum network and enabling BTC to be used in DeFi. It employs a multi-signature custodial model. Wrapped Ether (WETH) is a special case where the native asset of Ethereum (ETH) is wrapped into an ERC-20 standard to ensure compatibility with smart contracts that exclusively handle that token interface. Cross-chain bridges like Wormhole and LayerZero facilitate the creation of wrapped assets through more decentralized, multi-chain messaging protocols.

The primary use case for wrapped tokens is interoperability, unlocking liquidity and functionality across isolated blockchain ecosystems. They allow assets to participate in the financial primitives of another chain, such as yield farming, collateralized lending, and liquidity provision on automated market makers (AMMs). However, they introduce specific risks, primarily custodial risk (reliance on the entity holding the underlying assets), smart contract risk (vulnerabilities in the wrapping bridge or token contract), and bridge risk (the potential for exploits in the cross-chain communication layer), which users must evaluate.

key-features
CORE MECHANICS

Key Features of Wrapped Tokens

Wrapped tokens are blockchain-native representations of assets from other chains or systems, secured by a custodial or non-custodial mechanism. Their core features enable cross-chain interoperability and liquidity.

01

1-to-1 Peg & Collateralization

Every wrapped token maintains a 1:1 value peg to its underlying asset. This is enforced by a reserve or smart contract holding the original asset as collateral. For example, Wrapped Bitcoin (WBTC) on Ethereum is backed 1:1 by Bitcoin held in custody. The peg's integrity is maintained through audits and on-chain verification of the reserve.

02

Cross-Chain Interoperability

Wrapped tokens solve the blockchain interoperability problem by allowing assets native to one chain (e.g., Bitcoin) to be used on another (e.g., Ethereum). This unlocks the asset's utility within the destination chain's ecosystem, enabling:

  • Use in DeFi protocols (lending, yield farming)
  • Access to DEX liquidity pools
  • Interaction with NFT marketplaces and other dApps
03

Custodial vs. Non-Custodial Models

The security model defines how the underlying asset is held.

Custodial (e.g., WBTC): A centralized entity or consortium holds the original asset. Users must trust the custodian's solvency and honesty.

Non-Custodial (e.g., tBTC, RenBTC): The underlying asset is locked in a decentralized network of nodes or a smart contract using cryptoeconomic incentives and multi-party computation, minimizing trust assumptions.

04

Minting & Burning Mechanism

Wrapped tokens are created and destroyed through a mint/burn process.

  • Minting: A user sends the native asset to a custodian or smart contract, which then mints an equivalent amount of the wrapped token on the destination chain.
  • Burning/Redeeming: A user sends the wrapped token to be destroyed (burned), triggering the release of the original asset from custody. This process enforces the circular arbitrage that maintains the peg.
05

Standardized Token Interface

On their destination chain, wrapped tokens conform to that chain's dominant token standard (e.g., ERC-20 on Ethereum, BEP-20 on BNB Chain, SPL on Solana). This standardization ensures composability—the wrapped asset can be seamlessly integrated into wallets, decentralized exchanges, and smart contracts just like any other native token on that network.

06

Bridge Dependency & Risks

Wrapping inherently relies on a bridge—the infrastructure managing the mint/burn process and custody. This introduces specific risks:

  • Custodial Risk: Loss or theft of the underlying reserve.
  • Smart Contract Risk: Vulnerabilities in the minting/burning contracts.
  • Bridge Exploit Risk: Attacks on the bridge's validation mechanism.
  • Regulatory Risk: Potential action against centralized custodians.
examples
WRAPPED TOKEN

Prominent Examples

These are the most significant and widely adopted wrapped tokens, representing the standard for bridging value across different blockchain ecosystems.

CORE DIFFERENCES

Wrapped Token vs. Native Asset

A technical comparison of the fundamental properties of a wrapped token and the native asset it represents.

FeatureWrapped Token (e.g., WETH, WBTC)Native Asset (e.g., ETH, BTC)

Underlying Asset

A representation of an asset from another blockchain

The original, protocol-native asset

Protocol Layer

Smart contract (e.g., ERC-20, BEP-20)

Base consensus layer of its native blockchain

Creation / Minting

Minted by locking the native asset in a custodian contract

Mined, staked, or issued as the protocol's base currency

Custody / Trust Assumption

Relies on a custodian (centralized or decentralized) or bridge security

Secured solely by the native blockchain's consensus mechanism

Primary Utility

Interoperability; use within DeFi applications on a non-native chain

Pay transaction fees (gas) and secure the native network

Transaction Finality

Subject to finality of the host chain and the bridge

Subject only to the finality of its native chain

Canonical Example

WETH (Wrapped Ether) on Ethereum

ETH (Ether) on Ethereum

ecosystem-usage
ECOSYSTEM USAGE & PROTOCOLS

Wrapped Token

A wrapped token is a tokenized representation of a native asset from one blockchain, issued on a different blockchain to enable its use within that ecosystem. This guide explains its core mechanics, key examples, and primary use cases.

01

Core Mechanism: Custody & Minting

A wrapped token is created through a custodial or decentralized bridge. The native asset (e.g., BTC) is locked in a secure reserve (a custodial vault or a smart contract), and an equivalent amount of the wrapped version (e.g., WBTC) is minted on the destination chain. The process is redeemable 1:1, where burning the wrapped token releases the original asset from the reserve. This mechanism ensures the wrapped token is a fully-backed, synthetic representation of the underlying asset.

03

Protocol Integration & Composability

Wrapped tokens are fundamental to DeFi composability. By bringing external assets onto a smart contract platform, they unlock liquidity and functionality. Primary integrations include:

  • Decentralized Exchanges (DEXs): Trading pairs like WBTC/ETH on Uniswap.
  • Lending Markets: Using wBTC as collateral to borrow stablecoins on Aave or Compound.
  • Yield Aggregators: Earning interest on wrapped assets through automated strategies. This transforms isolated assets into programmable, interoperable financial legos.
04

Trust Models: Custodial vs. Trustless

Wrapping solutions operate on a spectrum of trust assumptions:

  • Custodial (Federated): Relies on a known group of entities to hold the reserve (e.g., early WBTC). Users must trust the custodians' solvency and honesty.
  • Trustless (Decentralized): Uses cryptoeconomic security and smart contracts on both chains to lock and mint assets without a central party (e.g., wETH on Ethereum is simply a standardized wrapper for native ETH).
  • Hybrid: Combines elements of both, often with multi-signature schemes and proof-of-reserve audits.
05

Common Wrapped Assets & Standards

Beyond WBTC, numerous assets are wrapped to enhance utility. Common examples and standards include:

  • Wrapped Ether (WETH): The ERC-20 wrapper for native ETH, required for most DEX interactions.
  • Wrapped SOL (wSOL): Enables Solana's native token to be used on other chains like Ethereum.
  • Cross-Chain Standards: Protocols like Wormhole and LayerZero facilitate the creation of canonical wrapped assets across many blockchains, each with its own security model.
06

Risks & Considerations

Using wrapped tokens introduces specific risks beyond the underlying asset's volatility:

  • Counterparty Risk: Dependency on the custodian or bridge's security. Bridge hacks are a major vector for fund loss.
  • Smart Contract Risk: Vulnerabilities in the minting/burning contract or the wrapper token itself.
  • Liquidity Fragmentation: The same asset can have multiple, non-fungible wrapped versions (e.g., WBTC, renBTC, tBTC), splitting liquidity.
  • Regulatory Uncertainty: Wrapping may create unclear legal status regarding the asset's representation and custody.
security-considerations
WRAPPED TOKEN

Security Considerations & Risks

Wrapped tokens introduce unique security dependencies and attack vectors beyond the underlying asset's native chain. Understanding these risks is critical for protocol developers and asset holders.

01

Custodial Risk

The primary risk for a wrapped token is the security and solvency of its custodian or bridge. The custodian holds the original assets (e.g., BTC, ETH) and mints the wrapped version (e.g., WBTC, WETH).

  • Centralized Custodians: A single entity controls the underlying reserves. Risk of theft, fraud, or regulatory seizure.
  • Multisig Custody: Relies on a group of signers. Vulnerable if the threshold is compromised.
  • Bridge Exploits: For cross-chain bridges, smart contract vulnerabilities can lead to the minting of unbacked tokens or theft of locked assets.
02

Smart Contract Risk

The wrapping contract itself is a critical attack surface. Even if the underlying asset is secure, bugs in the wrapper's code can be exploited.

  • Upgradeability: Many wrappers use proxy patterns for upgrades. A malicious or compromised upgrade can drain funds.
  • Logic Flaws: Errors in mint/burn, pause, or fee mechanisms can lock funds or allow unauthorized minting.
  • Integration Risk: DApps interacting with the wrapper must correctly handle its specific interface, or risk financial loss.
03

Oracle & Peg Risk

Maintaining a 1:1 peg to the underlying asset is not guaranteed and depends on external mechanisms.

  • Price Oracle Manipulation: If DeFi protocols rely on oracles for the wrapped asset's price, manipulation can lead to undercollateralized loans or faulty liquidations.
  • Redemption Arbitrage: The peg relies on efficient arbitrage between the wrapped token's market price and the custodian's redemption mechanism. Network congestion or high fees can break the peg temporarily.
  • Black Swan Events: A catastrophic failure of the custodian or bridge can cause the wrapped token to depeg permanently, trading at a significant discount.
04

Centralization & Governance Risk

Wrapped token systems often have administrative privileges and governance models that introduce centralization vectors.

  • Admin Keys: Privileged addresses may control minting, pausing, or upgrading the contract. These keys are high-value targets.
  • Governance Attacks: For decentralized governance, token holders vote on parameters. An attacker could acquire enough tokens to pass malicious proposals.
  • Censorship Risk: Custodians or bridge validators could censor specific users from minting or redeeming assets.
05

Cross-Chain Bridge Vulnerabilities

Cross-chain wrapped assets (e.g., USDC from Ethereum to Solana) rely on bridges, which are among the most exploited components in crypto.

  • Validation Mechanism Flaws: Bridges use various consensus models (multi-sig, light clients, PoS validators). Compromising the validator set allows minting infinite tokens on the destination chain.
  • Replay Attacks: Improperly signed messages can be replayed to mint tokens multiple times.
  • Liquidity Fragmentation: Assets locked on one chain cannot be natively used on another, creating systemic risk if the bridge fails.
06

Regulatory & Compliance Risk

Wrapped tokens can create complex regulatory exposure for issuers and users, differing from the native asset.

  • Security Classification: A regulator may deem the wrapper's governance token or the wrapped asset itself a security, subjecting it to different rules.
  • Custodian Licensing: The entity holding the underlying assets may require specific money transmitter or custody licenses. Loss of license jeopardizes the wrapper.
  • Sanctions Compliance: Wrappers must screen addresses to avoid minting for sanctioned entities, potentially requiring centralized oversight that contradicts decentralization claims.
WRAPPED TOKENS

Common Misconceptions

Wrapped tokens are fundamental to cross-chain interoperability, but their mechanics and risks are often misunderstood. This section clarifies the most frequent points of confusion.

No, a wrapped token is not inherently a stablecoin. A wrapped token is a tokenized representation of an asset from one blockchain on another blockchain, maintaining a 1:1 peg to the value of the original asset. A stablecoin is a cryptocurrency designed to maintain a stable value, typically pegged to a fiat currency like the US Dollar. While a wrapped version of a stablecoin (like Wrapped USDC) exists, wrapping applies to any asset, including volatile ones like WBTC (Wrapped Bitcoin) or WETH (Wrapped Ethereum). The "peg" refers to the underlying asset's market value, not a fixed fiat value.

WRAPPED TOKENS

Frequently Asked Questions

Wrapped tokens are a foundational cross-chain interoperability mechanism. This FAQ addresses the most common technical questions about their purpose, creation, and security.

A wrapped token is a tokenized representation of a native cryptocurrency on a different blockchain, created by locking the original asset in a custodial or non-custodial smart contract (a "wrapper") and minting an equivalent amount of the new token on the destination chain. The process involves a deposit-and-mint mechanism: a user sends a native asset (e.g., BTC) to a designated custodian or smart contract, which then issues a corresponding wrapped version (e.g., WBTC on Ethereum). This enables the asset to interact with the destination chain's DeFi protocols, DEXs, and smart contracts. The wrapped token is pegged 1:1 to the value of the underlying asset, which can be redeemed by burning the wrapped token to unlock the original.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline