Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Wrapped Asset

A token on one blockchain that represents a native asset from another blockchain, enabling cross-chain liquidity and DeFi interoperability.
Chainscore © 2026
definition
BLOCKCHAIN INTEROPERABILITY

What is a Wrapped Asset?

A technical mechanism for representing a native asset from one blockchain on a different blockchain, enabling cross-chain functionality.

A wrapped asset is a tokenized representation of a native cryptocurrency (like Bitcoin or Ether) on a different blockchain, created by locking the original asset in a custodial or non-custodial smart contract and minting a corresponding token on the destination chain. This process, often called "wrapping," allows assets to be used in decentralized applications (dApps), decentralized exchanges (DEXs), and lending protocols on blockchains for which they were not originally designed. The most prominent example is Wrapped Bitcoin (WBTC), an ERC-20 token on Ethereum that represents Bitcoin, enabling BTC to be used within the Ethereum DeFi ecosystem.

The wrapping mechanism relies on a network of custodians or a decentralized bridge to manage the reserve of the underlying asset. In a custodial model like WBTC, a merchant network holds the locked Bitcoin and mints the equivalent WBTC tokens, with the process being auditable on-chain. Non-custodial or trust-minimized bridges use cryptographic proofs and smart contracts to lock and mint assets without a central custodian. The value of the wrapped token is pegged 1:1 to the original asset, as it can be "unwrapped" or redeemed by burning the wrapped token to release the locked collateral from the reserve.

Wrapped assets are fundamental to blockchain interoperability and the growth of decentralized finance. They solve the problem of liquidity fragmentation by allowing the value and utility of major assets to flow between isolated networks. For instance, a user can wrap their Bitcoin to access yield farming opportunities on Ethereum or use wrapped Ether on a Layer 2 scaling solution like Arbitrum. However, they introduce specific risks, primarily counterparty risk in custodial models and smart contract risk in the bridge protocols that facilitate the wrapping process.

key-features
WRAPPED ASSET

Key Features

Wrapped assets are tokenized representations of native blockchain assets, enabling them to be used on other networks. Their core features revolve around interoperability, security, and utility.

01

Cross-Chain Interoperability

The primary function of a wrapped asset is to bridge liquidity between different blockchains. It allows a native asset like Bitcoin (BTC) to be represented as Wrapped Bitcoin (WBTC) on Ethereum, enabling it to be used in DeFi protocols, DEXs, and smart contracts that are native to the destination chain. This solves the problem of blockchain silos.

02

Custodial vs. Non-Custodial Models

Wrapping mechanisms differ in their trust assumptions:

  • Custodial (e.g., WBTC): A centralized entity or consortium holds the underlying asset in reserve and mints/burns the wrapped tokens. This introduces counterparty risk.
  • Non-Custodial (e.g., tBTC, RenBTC): Uses decentralized networks of validators or cryptographic proofs (like MPC or threshold signatures) to secure the underlying assets, minimizing trust requirements.
03

1:1 Asset Backing

Every unit of a wrapped token is fully collateralized by a corresponding unit of the native asset held in reserve. This is verified through on-chain proof of reserves or attestations. The minting and burning processes are the mechanisms that maintain this peg, ensuring the wrapped token's value tracks the underlying asset.

04

Smart Contract Programmability

By converting a non-programmable asset (like Bitcoin) into a token standard (like ERC-20 or SPL), wrapped assets inherit the programmability of their host chain. This unlocks functionality such as:

  • Automated trading on decentralized exchanges (DEXs).
  • Use as collateral in lending protocols.
  • Integration into yield farming strategies and liquidity pools.
05

Bridge Dependency & Risks

Wrapped assets are intrinsically linked to the cross-chain bridge that creates them. This introduces specific risks:

  • Bridge Exploit Risk: The smart contracts managing the wrapping process can be hacked.
  • Custodial Risk: For centrally managed wrappers, the custodian could become insolvent or malicious.
  • Liquidity Fragmentation: Different wrapping protocols for the same asset (e.g., WBTC, renBTC) can fragment liquidity.
06

Common Examples & Standards

Prominent examples illustrate the concept:

  • WBTC (Wrapped Bitcoin): The largest wrapped asset, an ERC-20 token backed 1:1 by Bitcoin, managed by a DAO.
  • WETH (Wrapped ETH): Wraps native Ethereum (ETH) into the ERC-20 standard for compatibility with dApps.
  • bridged USDC: USDC minted on Ethereum but bridged to chains like Avalanche or Polygon as a cross-chain token. These typically adhere to the destination chain's dominant token standard.
how-it-works
WRAPPED ASSET PRIMER

How It Works: The Lock-and-Mint Mechanism

A technical breakdown of the canonical process for creating a wrapped asset, which involves locking a native token on its source chain to mint a representative token on a destination chain.

The lock-and-mint mechanism is the foundational process for creating a wrapped asset, such as Wrapped Bitcoin (WBTC) or Wrapped Ether (WETH) on another blockchain. It is a two-step, cross-chain operation where a user first lock or deposit a native asset (e.g., BTC) with a designated custodian or smart contract on its original chain. Upon verification of this lock, an equivalent amount of the wrapped token is minted on the target chain (e.g., Ethereum). This mechanism ensures a 1:1 peg by guaranteeing the locked collateral exists for every minted wrapper, establishing a bridged representation of value.

The process is typically managed by a decentralized network of entities or a bridge protocol. For a trust-minimized model, a user interacts with a smart contract on the source chain to lock funds, which then emits a cryptographic proof. This proof is relayed to a corresponding minting contract on the destination chain, which validates it and mints the wrapped tokens to the user's address. More centralized models involve a custodian (a single entity or multi-signature wallet) holding the locked assets and authorizing the mint. The security and trust assumptions of the wrapped asset are directly tied to the integrity of this bridging mechanism.

A canonical example is Wrapped Bitcoin (WBTC) on Ethereum. A user sends BTC to a custodian's Bitcoin address, which is monitored by the WBTC DAO. After confirmations, the custodian authorizes the WBTC Ethereum smart contract to mint an equivalent amount of WBTC ERC-20 tokens to the user's Ethereum address. The original BTC remains locked and auditable. This allows the Bitcoin to be used within Ethereum's DeFi ecosystem—for lending on Aave, trading on Uniswap, or as collateral in MakerDAO—while its value is fully backed by the locked Bitcoin reserves.

The reverse of this mechanism is the burn-and-unlock or burn-and-release process, which redeems the underlying asset. To retrieve the native BTC, a user burns their WBTC tokens on Ethereum, destroying them. This burn event signals the custodian or bridge protocol to release the corresponding amount of locked BTC from reserve and send it to the user's specified Bitcoin address. This symmetrical process ensures the total supply of the wrapped token always matches the verifiable collateral held in reserve, maintaining the asset's peg and enabling seamless cross-chain value transfer.

examples
WRAPPED ASSETS

Common Examples

Wrapped assets are a foundational DeFi primitive. These are some of the most prominent and widely used examples across different blockchains.

ecosystem-purpose
INTEROPERABILITY

Purpose in the Ecosystem

Wrapped assets are a foundational interoperability primitive that enable value and functionality to move across disparate blockchain networks, solving the problem of isolated liquidity and functionality.

A wrapped asset is a tokenized representation of a native cryptocurrency or digital asset on a blockchain other than its origin chain, created to enable its use in decentralized applications and protocols on that foreign network. This is achieved by locking or burning the original asset in a secure, audited custodial or decentralized bridge, which then mints an equivalent amount of the wrapped token on the destination chain. The most prominent example is Wrapped Bitcoin (WBTC), an ERC-20 token on Ethereum that represents Bitcoin, allowing BTC to be used in Ethereum's DeFi ecosystem for lending, trading, and yield farming.

The primary purpose of wrapped assets is to unlock liquidity and functionality across blockchain silos. Without them, assets like Bitcoin are largely inert outside their native environment. Wrapping transforms them into programmable assets that can interact with smart contracts. This process effectively imports the value and credibility of established assets like BTC or ETH into newer or more specialized ecosystems, such as layer-2 rollups or alternative layer-1 chains like Avalanche or Polygon. It is a critical component for composability, allowing protocols to build financial products using a diverse basket of assets without requiring users to sell their original holdings.

The creation and redemption of wrapped tokens involve a bridging mechanism, which can be trust-based (custodial) or trust-minimized (decentralized). In a custodial model, a centralized entity holds the native assets and mints the wrapped tokens, introducing counterparty risk. Decentralized bridges use multi-signature wallets, federations, or cryptographic proofs to manage the collateral pool. The security and reliability of the bridge are paramount, as they are a central point of failure; bridge hacks have resulted in catastrophic losses, making the choice of wrapping service a critical risk assessment for users and integrators.

Beyond simple value transfer, wrapped assets enable sophisticated cross-chain DeFi strategies. A user can deposit WBTC as collateral on Ethereum to borrow stablecoins, then use those stablecoins on another chain. This creates interconnected financial markets. However, wrapping introduces complexities: users must trust the bridge's integrity, manage gas fees on multiple chains, and understand the peg mechanism that ensures 1:1 redeemability. The wrapped token's value is entirely derived from the promise it can be unwrapped for the original asset, making transparency and auditability of the reserve essential.

The ecosystem of wrapped assets is evolving with the advent of native cross-chain messaging protocols like LayerZero and Chainlink's CCIP, which aim to make asset wrapping more secure and permissionless. Furthermore, some blockchain designs, such as Cosmos's Inter-Blockchain Communication (IBC) protocol, facilitate native asset transfers without traditional wrapping. The long-term trajectory points toward a multi-chain future where wrapped assets, alongside other interoperability solutions, form the plumbing for a seamless and interconnected Web3 economy, reducing fragmentation and maximizing capital efficiency across all networks.

ASSET CLASS COMPARISON

Wrapped Asset vs. Native Asset vs. Bridged Asset

A technical comparison of three primary forms of digital assets based on their origin, canonical state, and trust model.

FeatureNative AssetWrapped AssetBridged Asset

Canonical Chain

Issuing chain (e.g., BTC on Bitcoin)

Host chain (e.g., WBTC on Ethereum)

Destination chain (e.g., USDC.e on Avalanche)

Underlying Asset

Itself (native ledger entry)

Custodied native asset (e.g., BTC in reserve)

Locked/minted asset on source chain

Trust Model

Consensus of native chain

Custodian or decentralized reserve

Security of the bridge protocol

Issuance/Minting

Protocol-level (e.g., mining, staking)

By a custodian or DAO via smart contract

By a bridge contract upon locking source assets

Redemption/Burning

N/A (spent or destroyed)

Redeemable 1:1 with custodian

Burn on destination, unlock on source chain

Primary Use Case

Base-layer settlement & security

Liquidity and composability on a foreign chain

Cross-chain liquidity and interoperability

Protocol Examples

BTC, ETH, AVAX

WBTC, WETH

USDC.e, axlUSDC, Multichain assets

Key Risk

Native chain consensus failure

Custodial risk / reserve insolvency

Bridge smart contract exploit or validator failure

security-considerations
WRAPPED ASSET

Security & Trust Considerations

Wrapped assets introduce unique security dependencies and trust assumptions, primarily centered on the custodian and underlying bridge infrastructure.

02

Bridge Exploit Vectors

The bridge contract is the most critical and frequently attacked component. Common exploit vectors include:

  • Smart Contract Bugs: Flaws in the mint/burn or validation logic.
  • Oracle Manipulation: Feeding incorrect price or state data to the bridge.
  • Validator Compromise: Gaining control of the multi-sig or consensus mechanism to mint unauthorized tokens.
  • Replay Attacks: Exploiting message verification across chains. Major incidents like the Wormhole ($325M) and Ronin Bridge ($625M) hacks underscore this risk.
03

Collateralization & Proof-of-Reserves

A wrapped asset is only as valuable as the verifiable collateral backing it. Proof-of-Reserves (PoR) is essential for trust. This involves:

  • On-chain attestations of the underlying assets (e.g., Bitcoin holdings).
  • Regular, transparent audits by reputable third parties.
  • Real-time dashboards showing minted supply vs. held reserves. Without robust PoR, a wrapped token risks becoming undercollateralized, leading to a potential de-peg and loss of user funds.
04

Regulatory & Legal Uncertainty

Wrapped assets exist in a complex regulatory gray area. Key considerations include:

  • Security Classification: Regulators may view the wrapped token or the custodian's activity as a security.
  • Cross-Jurisdictional Compliance: The custodian, users, and underlying asset may be subject to different legal regimes.
  • Sanctions & Censorship: Custodians may be forced to freeze assets or block addresses, compromising the permissionless ideal of blockchain. This legal risk can directly impact the token's liquidity and utility.
05

Liquidity & Depeg Risk

Wrapped assets must maintain a 1:1 peg to their underlying asset. This peg can break due to:

  • Loss of Trust: News of a potential hack or insolvency at the custodian.
  • Bridge Downtime: If minting/redemption is halted, arbitrage cannot correct the price.
  • Liquidity Fragmentation: Low liquidity on decentralized exchanges (DEXs) can cause significant price slippage away from the peg. Users must monitor peg stability on markets beyond the official bridge redemption.
06

Native vs. Wrapped Asset Security

It is critical to distinguish the security of the wrapped representation from the underlying native asset. For example:

  • Wrapped Ether (wETH) on a non-Ethereum chain inherits the security of the bridge and the destination chain, not Ethereum's consensus security.
  • A wrapped token's private keys are managed by the bridge protocol, not the end-user. Therefore, compromising the bridge can lead to mass theft of wrapped assets, even if the native asset's own blockchain (e.g., Bitcoin, Ethereum) remains perfectly secure.
evolution
WRAPPED ASSET ARCHITECTURE

Evolution: From Custodial to Trustless

The design and security model of wrapped assets has undergone a fundamental shift, moving from centralized intermediaries to decentralized, trust-minimized protocols.

The earliest wrapped assets, such as the original Wrapped Bitcoin (WBTC) on Ethereum, relied on a custodial model. In this system, a centralized entity or consortium holds the underlying asset (e.g., Bitcoin) in a vault and mints a corresponding token on another blockchain. This requires users to trust the custodian's solvency, security, and honesty, introducing significant counterparty risk. While this model successfully proved the concept of cross-chain value transfer, its centralized nature was antithetical to the core ethos of decentralization.

In response to these limitations, a new generation of trustless or non-custodial wrapping mechanisms emerged. These protocols use cryptographic proofs and smart contracts to eliminate the need for a trusted third party. Prominent examples include tBTC, which uses a randomly selected group of signers bonded with ETH, and RenVM, a decentralized virtual machine that securely manages private keys. In these systems, the custody of the underlying asset is distributed and secured by economic incentives and cryptographic verification, dramatically reducing systemic risk.

The technical evolution also includes native cross-chain messaging protocols like the Inter-Blockchain Communication (IBC) protocol used in the Cosmos ecosystem. IBC enables direct, trust-minimized asset transfers between connected chains without a traditional "wrapped" representation, as the asset's provenance and authenticity are verified by the relayers and light clients of each chain. This represents a paradigm shift from asset representation to asset teleportation, where the original asset's state is conclusively proven on the destination chain.

This architectural shift from custodial to trustless has profound implications for DeFi composability and security. Trustless wrappers can be integrated into lending protocols, decentralized exchanges, and derivatives platforms without introducing a centralized point of failure. The security of billions in value no longer hinges on a single entity's integrity but on battle-tested cryptography and well-designed incentive mechanisms, creating a more resilient and permissionless financial infrastructure.

WRAPPED ASSETS

Frequently Asked Questions

Wrapped assets are tokenized representations of one blockchain's native asset on another blockchain, enabling cross-chain liquidity and functionality. This section answers common technical and operational questions.

A wrapped asset is a tokenized representation of a native cryptocurrency (like Bitcoin or Ether) on a different blockchain, created by locking the original asset in a custodial or non-custodial vault and minting an equivalent amount of the new token on the destination chain. The process, known as a 1:1 peg, involves a user sending the native asset to a designated custodian (like a multi-signature wallet or a decentralized bridge smart contract). Upon verification of the deposit, a corresponding amount of the wrapped token (e.g., WBTC for Bitcoin on Ethereum) is minted and sent to the user's address on the new chain. This enables the asset to interact with DeFi applications, DEXs, and smart contracts on a blockchain for which it was not originally designed.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team