Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Token Bridging

Token bridging is a mechanism that locks a token on its native blockchain and mints a representative, or 'wrapped,' version on a different blockchain to enable cross-chain interoperability.
Chainscore © 2026
definition
BLOCKCHAIN INTEROPERABILITY

What is Token Bridging?

Token bridging is the process of transferring digital assets from one blockchain to another, enabling interoperability between otherwise isolated networks.

Token bridging is a protocol that enables the transfer of digital assets or data from one blockchain to another. This process is essential for blockchain interoperability, allowing tokens like ETH, USDC, or NFTs to move between networks with different consensus rules and native assets. A bridge achieves this by locking or burning the original tokens on the source chain and minting an equivalent representation, often called wrapped tokens, on the destination chain. This mechanism creates a synthetic asset that is pegged 1:1 to the value of the original.

The technical architecture of bridges varies significantly. Lock-and-Mint Bridges, like many cross-chain bridges for Ethereum, use smart contracts to custody the original assets and issue new ones. Burn-and-Mint Bridges destroy the original token and recreate it on the new chain, a model used by some layer-2 solutions. Bridges can also be categorized by their trust model: trusted (custodial) bridges rely on a centralized federation or multi-signature wallet to hold assets, while trustless (decentralized) bridges use cryptographic proofs and decentralized networks of validators to secure the transfer.

Key considerations when using a bridge include security risks, as bridges are high-value targets for exploits (e.g., the Wormhole and Ronin bridge hacks), and liquidity fragmentation, where the same asset exists in multiple wrapped versions. Developers must also account for the bridging latency (the time to complete a transfer) and associated transaction fees on both chains. Despite risks, bridges are fundamental infrastructure for the multi-chain ecosystem, powering use cases in decentralized finance (DeFi), cross-chain gaming, and scalable application deployment.

how-it-works
MECHANISM

How Token Bridging Works

An explanation of the technical processes that enable the transfer of digital assets between distinct blockchain networks.

Token bridging is the process of transferring digital assets or data from one blockchain to another, enabling interoperability between otherwise isolated networks. This is achieved through a combination of smart contracts and a set of validators or relayers that lock or burn tokens on the source chain and mint or release a corresponding representation on the destination chain. The resulting asset on the new chain is often called a wrapped token (e.g., WETH on Arbitrum representing ETH from Ethereum).

The most common bridging architecture is the lock-and-mint model. Here, a user sends native tokens to a smart contract on the source chain, which locks them in a vault. A bridging protocol's validators attest to this deposit, and a corresponding smart contract on the destination chain mints an equivalent amount of the bridged token. For a return transfer, the bridged tokens are burned on the destination chain, and the original vault releases the locked assets. Alternative models include liquidity network bridges, which use pooled liquidity on both sides for faster transfers, and atomic swaps for trustless peer-to-peer exchanges.

Bridges introduce distinct security and trust considerations. Trusted bridges rely on a federation or multi-signature wallet controlled by a known entity, creating a custodial risk. Trust-minimized bridges use cryptographic proofs, like light clients or zero-knowledge proofs, to verify the state of the source chain without relying on external validators. The security of the bridge is paramount, as it often becomes a centralized point of failure; major exploits, such as the Wormhole and Ronin bridge hacks, have resulted in losses exceeding hundreds of millions of dollars.

From a user perspective, bridging typically involves connecting a wallet to a bridge interface, selecting the source and destination chains and assets, and approving two transactions: one to lock/deposit and another to claim/mint on the target network. Users must pay gas fees on both chains and should be aware of the bridge's finality time—the delay for confirmations—and any associated fees charged by the bridge protocol. It is critical to verify the official bridge channels for a blockchain, as fraudulent bridge websites are a common attack vector for phishing.

key-features
TOKEN BRIDGING

Key Features & Characteristics

Token bridging is the process of transferring digital assets from one blockchain to another, enabling interoperability. This section details the core mechanisms and design choices that define how bridges operate.

01

Trusted (Custodial) Bridges

Also known as federated or custodial bridges, these rely on a central entity or a permissioned group of validators to hold the locked assets and mint the wrapped tokens. Users must trust this intermediary's security and honesty.

  • Examples: Early versions of the Wrapped Bitcoin (WBTC) bridge on Ethereum.
  • Trade-off: Often faster and cheaper but introduces a central point of failure and censorship risk.
02

Trustless (Non-Custodial) Bridges

These bridges use cryptographic proofs and the underlying blockchains' consensus mechanisms to verify transfers without a trusted third party. Assets are typically locked in a smart contract.

  • Mechanisms: Utilize light clients, relayers, or zero-knowledge proofs to verify state from the source chain.
  • Examples: The IBC protocol for Cosmos, or rollup bridges like Arbitrum's.
  • Trade-off: More secure and decentralized, but can be more complex and expensive to operate.
03

Lock-and-Mint / Burn-and-Mint

The most common bridging model. Assets are locked or burned on the source chain, and an equivalent wrapped or synthetic representation is minted on the destination chain.

  • Process:
    1. User sends tokens to a bridge contract on Chain A (lock/burn).
    2. Validators or a proof verifies the event.
    3. A corresponding token (e.g., asset.chain-b) is minted on Chain B for the user.
  • Reverse Process: To return, the wrapped token is burned on Chain B, unlocking the original on Chain A.
04

Liquidity Network Bridges

Instead of locking and minting tokens, these bridges use liquidity pools on both chains. Users swap assets on the source chain for assets already existing on the destination chain via liquidity providers.

  • How it works: A user swaps Token A on Chain 1 for Token B on Chain 2 from a pool. An arbiter or messaging protocol ensures the pool balances are reconciled.
  • Examples: Connext and Hop Protocol use this model.
  • Advantage: Faster for frequent transfers as it doesn't require minting latency; relies on available liquidity.
05

Canonical vs. Wrapped Tokens

A key distinction in bridged asset representation.

  • Canonical Bridged Token: The official bridged version of an asset, often backed 1:1 by the native asset locked in the bridge's canonical contract. (e.g., USDC bridged via Circle's CCTP).
  • Wrapped Token: A specific, often non-canonical representation minted by a particular bridge (e.g., USDC.e on Avalanche from the Avalanche Bridge). Multiple wrapped versions of the same asset can exist, creating fragmentation.

Risk: Using a non-canonical wrapped token introduces dependency on that specific bridge's security.

06

Security Model & Risks

The security of a bridge is defined by its weakest link, which is often not the underlying blockchains.

  • Key Risks:
    • Validator Compromise: Attackers control the bridge's validating nodes.
    • Smart Contract Bugs: Vulnerabilities in the lock/mint contracts.
    • Economic Attacks: Manipulating proof submissions or oracle data.
  • Attack Surface: Bridges are high-value targets, as seen in exploits like the Wormhole ($325M) and Ronin Bridge ($625M) hacks. Trustless bridges aim to minimize this surface by aligning security with the connected chains.
TRUST ASSUMPTIONS

Bridge Trust Models: A Comparison

A comparison of the core security and trust assumptions underlying different token bridge architectures.

Trust & Security DimensionTrusted (Custodial)Trust-Minimized (Native)Optimistic / Light Client

Custody of Funds

Centralized validator or multi-sig

Locked in source chain smart contract

Locked in source chain smart contract

Verification Mechanism

Off-chain attestation by known entities

On-chain cryptographic proof (e.g., Merkle)

Fraud proof challenge period (e.g., 7 days)

Trust Assumption

Trust in the bridge operator(s)

Trust in the consensus & cryptography of the source chain

Trust in at least one honest watcher during challenge period

Decentralization

Finality Time

< 5 min

Source chain finality + proof generation (~10 min - hours)

Source chain finality + challenge window (~7 days)

Capital Efficiency

High

Low (requires over-collateralization)

High

Attack Surface

Operator compromise

Source chain 51% attack

Censorship of fraud proofs

examples
IMPLEMENTATIONS

Examples & Prominent Bridge Protocols

Token bridging is implemented through various protocols, each with distinct architectural approaches and trust models. These solutions facilitate the transfer of assets and data between different blockchain networks.

ecosystem-usage
TOKEN BRIDGING

Ecosystem Usage & Applications

Token bridging enables the transfer of assets and data between distinct blockchain networks. This section details its core mechanisms, security models, and primary applications.

01

Lock & Mint (Wrapped Assets)

The most common bridging mechanism where assets are locked in a smart contract on the source chain and an equivalent wrapped representation is minted on the destination chain. This creates a 1:1 pegged asset (e.g., WETH on Arbitrum).

  • Process: User deposits Token A on Chain 1 → Validators lock tokens → Wrapped Token A is minted on Chain 2.
  • Examples: Wrapped BTC (WBTC) on Ethereum, bridged USDC.
  • Consideration: Relies on the security and honesty of the bridge's validators or multi-signature setup.
02

Liquidity Network Bridges

These bridges use liquidity pools on both chains instead of locking and minting. A user's assets are swapped for liquidity pool tokens on the destination chain, facilitated by liquidity providers.

  • Process: User swaps Token A on Chain 1 → Bridge routes swap via pool → User receives Token B on Chain 2.
  • Examples: Connext, Hop Protocol, Stargate.
  • Advantage: Often faster for frequent, small transfers and supports native assets.
  • Risk: Subject to slippage and pool liquidity depth.
03

Light Client & Zero-Knowledge Bridges

Advanced bridges that use cryptographic proofs to verify the state of another chain without trusting third-party validators.

  • Light Clients: Verify block headers to confirm transactions (e.g., IBC in Cosmos).
  • ZK Bridges: Use zero-knowledge proofs (ZK-SNARKs/STARKs) to cryptographically prove the validity of state transitions on the source chain. This is considered the most secure, trust-minimized approach.
  • Examples: zkBridge projects, Polygon zkEVM bridge.
  • Goal: Achieve security equivalent to the underlying blockchains.
04

Canonical Bridges & Official Issuers

Bridges that are officially recognized or built by the core development teams of a blockchain or asset issuer. They are often considered the most authoritative route for moving native assets.

  • Examples:
    • The Arbitrum, Optimism, and Base bridges for their respective L2s.
    • Circle's Cross-Chain Transfer Protocol (CCTP) for USDC.
  • Characteristic: Typically use a lock-and-mint model with a permissioned, audited set of validators controlled by the project team.
  • Trust Assumption: Users must trust the issuing entity's governance and security practices.
05

Cross-Chain Messaging & Composability

Modern bridges function as general message passing systems, enabling smart contracts on different chains to communicate. This unlocks cross-chain DeFi and applications.

  • Use Cases:
    • Cross-chain lending: Collateralize assets on Chain A to borrow on Chain B.
    • Cross-chain swaps & yield aggregation: Find best rates across all chains.
    • Cross-chain NFTs: Move or use NFTs across ecosystems.
  • Key Protocols: LayerZero, Wormhole, Axelar. They provide the messaging layer that dApps build upon.
06

Security Models & Trust Assumptions

Every bridge introduces a trust assumption, which is its critical security consideration. The spectrum ranges from trusted to trust-minimized.

  • Trusted (Federated/Multi-sig): Relies on a committee of known entities. Fast and cheap, but introduces custodial risk. Example: Many canonical bridges.
  • Insured/Staked: Validators post collateral that can be slashed for malicious behavior. Adds economic security.
  • Trust-Minimized (Cryptographic): Security derives from the underlying blockchain's consensus via light clients or zero-knowledge proofs. Most secure but computationally intensive.
  • Risk: Bridges are prime targets for exploits, often representing a single point of failure.
security-considerations
TOKEN BRIDGING

Security Considerations & Risks

Token bridges are critical infrastructure for cross-chain interoperability, but their complex, trust-minimized designs introduce unique attack vectors and systemic risks.

01

Custodial & Trust Assumptions

Bridges rely on a validator set or committee to authorize asset transfers, creating a central point of failure. Custodial bridges hold user funds in a multi-sig wallet, requiring trust in the signers. Federated models depend on a known group of entities. Even decentralized bridges using light clients or optimistic verification have security budgets and liveness assumptions that can be exploited.

02

Smart Contract Vulnerabilities

The bridge's on-chain contracts are high-value targets for exploits. Common vulnerabilities include:

  • Reentrancy attacks on deposit/withdrawal logic.
  • Logic flaws in message verification or relayer incentives.
  • Upgradability risks where admin keys can be compromised.
  • Oracle manipulation feeding incorrect price data or state proofs. Major breaches like the Wormhole ($326M) and Ronin Bridge ($625M) exploited contract vulnerabilities.
03

Validation Mechanism Attacks

The cryptographic and economic mechanisms securing the bridge can be subverted.

  • 51% Attacks: On the source chain can allow double-spending of locked assets.
  • Signature Forgery: Compromised validator keys can mint fraudulent wrapped assets.
  • Data Availability Failures: If state proofs are not reliably available, verification fails.
  • Economic Attacks: Overwhelming the bridge's fraud proof system or staking slashing conditions.
04

Liquidity & Peg Risks

Wrapped assets (e.g., wBTC, bridged USDC) are only as secure as the bridge backing them. Risks include:

  • Peg Collapse: If the bridge is hacked, the wrapped token can depeg from its native asset.
  • Liquidity Fragmentation: Bridged assets exist on multiple chains, creating isolated liquidity pools.
  • Redemption Risk: The ability to burn a wrapped token and redeem the native asset depends on the bridge's ongoing solvency and liveness.
05

Cross-Chain Message Risks

Bridges that transfer arbitrary data (not just tokens) for cross-chain dApps introduce additional complexity. Message relaying can be delayed or censored. Execution contexts differ between chains, leading to unexpected behavior when a message is processed on the destination chain. This expands the attack surface beyond simple asset transfers.

06

Systemic & Economic Security

Bridges create interdependencies between otherwise isolated blockchains. A major bridge failure can cause:

  • Contagion across DeFi protocols using its wrapped assets.
  • Loss of User Funds at scale, undermining trust in interoperability.
  • Asymmetric Value: The bridge often holds more value on one chain than the other, making it a lucrative target. The security of the entire system is limited by its weakest consensus or trust assumption.
TOKEN BRIDGING

Common Misconceptions About Bridging

Clarifying widespread misunderstandings about how assets move between blockchains, focusing on security models, custodianship, and technical mechanisms.

No, a bridged token is a distinct representation on the destination chain, not the original asset. When you bridge, the original asset (e.g., native ETH) is typically locked in a smart contract on the source chain, and a new, wrapped token (e.g., WETH on another chain) is minted on the destination. These are synthetic assets or canonical bridges that derive their value from the locked collateral. They are not fungible with the native asset on its home chain and rely entirely on the security and solvency of the bridge protocol for their peg.

TOKEN BRIDGING

Technical Deep Dive

A comprehensive exploration of the mechanisms, security models, and trade-offs involved in moving digital assets across different blockchain networks.

A token bridge is a protocol that enables the transfer of digital assets and data between two distinct blockchain networks. It works by locking or burning tokens on the source chain and minting or unlocking a corresponding representation on the destination chain. The core mechanism typically involves a validator set or relayers that monitor events on one chain and attest to them on the other, facilitating the cross-chain state transition. For example, to bridge an asset from Ethereum to Avalanche, the bridge locks the user's tokens in a smart contract on Ethereum, and a corresponding wrapped token is minted on Avalanche's C-Chain. This process creates a synthetic, 1:1 pegged asset that represents the original.

TOKEN BRIDGING

Frequently Asked Questions (FAQ)

Essential questions and answers about moving digital assets between different blockchains, covering mechanisms, security, and key considerations.

A token bridge is a protocol or application that enables the transfer of digital assets and data between two distinct blockchain networks. It works by locking or burning tokens on the source chain and minting or releasing a corresponding representation, often called a wrapped token, on the destination chain. This process is typically managed by a combination of smart contracts and a set of validators or relayers. For example, to bridge USDC from Ethereum to Arbitrum, the bridge locks your USDC in an Ethereum smart contract, and its partner contract on Arbitrum mints an equivalent amount of bridged USDC for you to use. The integrity of the system depends on the bridge's specific trust model, which can range from decentralized, multi-signature councils to more centralized, federated setups.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team