Cross-chain bridges are critical infrastructure for enabling payments across different blockchain ecosystems. Unlike simple token swaps, payments often involve moving significant value with specific requirements for finality, cost predictability, and recipient confirmation. A bridge that works for a small NFT transfer may be unsuitable for a large corporate settlement. This guide provides a structured methodology to evaluate bridge protocols based on the core needs of payment systems: security guarantees, transaction finality, fee structure, and liquidity depth.
How to Evaluate Cross-Chain Bridge Protocols for Payments
How to Evaluate Cross-Chain Bridge Protocols for Payments
A framework for assessing the security, cost, and reliability of bridges for transferring value between blockchains.
The first and most critical evaluation criterion is the bridge's security model. Bridges can be broadly categorized by their trust assumptions: trust-minimized (using light clients or optimistic verification), federated/multi-sig (controlled by a known set of validators), or custodial (managed by a single entity). For payments, the security of the bridged assets must be commensurate with the value at risk. A trust-minimized bridge like the IBC protocol or a rollup's native bridge offers stronger cryptographic guarantees but may have higher latency. Federated bridges like Multichain (formerly Anyswap) or Axelar rely on the honesty of their validator set, requiring you to audit their governance and slashing mechanisms.
Next, analyze the economic and operational characteristics that directly impact payment viability. Examine the fee structure: is it a flat fee, a percentage of volume, or a dynamic gas cost? Protocols like Stargate (LayerZero) charge a fee for guaranteed cross-chain delivery, while others may have hidden costs in the form of slippage or liquidity provider fees. Assess finality time—the point after which a transaction is irreversible. Bridges that wait for Ethereum's 15-minute finality are slower but more secure than those using instant proofs. Furthermore, evaluate liquidity depth on the destination chain; a bridge must have sufficient liquidity to fulfill your payment amount without excessive slippage, which can be checked via protocols like Socket's Liquidity Layer or Li.Fi's aggregator.
Finally, practical evaluation requires testing and monitoring. Start with small test transactions to verify the complete flow: initiation, bridging, and confirmation on the destination chain. Use block explorers like Etherscan and the destination chain's explorer to track the transaction hash through the bridge's contract. Monitor for bridge-specific risks such as validator censorship, contract upgradeability (who can change the code?), and the historical record of outages or exploits. For ongoing payments, consider integrating with a bridge aggregator API (like Squid or Router Protocol) that can dynamically select the optimal route based on real-time conditions of cost, speed, and security, abstracting away the complexity of direct protocol evaluation.
How to Evaluate Cross-Chain Bridge Protocols for Payments
Before integrating a cross-chain bridge for payments, you must assess its security, cost, and reliability. This guide outlines the critical technical and economic factors to analyze.
Evaluating a cross-chain bridge for payments requires a multi-faceted approach. The primary considerations are security architecture, economic guarantees, and operational reliability. Unlike simple token transfers, payment systems demand near-instant finality and predictable costs. You must examine the bridge's underlying mechanism: is it a validated bridge like Wormhole using guardian networks, a liquidity network like Stargate, or a trust-minimized bridge using light clients like IBC? Each model presents different trade-offs between speed, cost, and trust assumptions that directly impact payment viability.
Security is the paramount concern. Analyze the bridge's attack surface and failure modes. For validated bridges, investigate the validator set's decentralization, slashing conditions, and governance controls. For liquidity-based bridges, assess the capital efficiency and risks of liquidity pool depletion. Always review historical audits from firms like Trail of Bits or OpenZeppelin, but treat them as a starting point, not a guarantee. Check real-world performance by searching for past exploits on platforms like Rekt.news. A bridge's security is defined by its weakest consensus or cryptographic assumption.
Economic factors determine the practical cost of payments. Calculate the total cost of ownership, which includes gas fees on source and destination chains, bridge protocol fees, and any liquidity provider fees. For frequent, small payments, a rollup-based bridge like Hop Protocol or a liquidity network might offer lower costs. For large settlements, a validated bridge with strong security may be preferable despite higher fixed costs. Always model worst-case latency; some bridges have optimistic challenge periods that can delay finality for hours, making them unsuitable for real-time payments.
Operational reliability and decentralization are critical for uptime. Examine the bridge's downtime history and censorship resistance. A bridge reliant on a centralized sequencer or a small multisig is a single point of failure. Prefer protocols with live, verifiable on-chain fraud proofs or validity proofs. Tools like Chainscore provide real-time metrics on bridge latency, success rates, and costs across different asset pairs. For developers, the quality of API documentation, SDK support, and error handling is essential for building robust payment integrations that can gracefully handle reverts and congestion.
Finally, conduct a technical integration analysis. Review the smart contract code for the bridge's send and receive functions on GitHub. Test the transaction lifecycle end-to-end on a testnet, monitoring events like BridgeTransferSent and BridgeTransferReceived. Ensure the bridge supports the specific token standards (e.g., ERC-20, ERC-677) and chain IDs you require. Your evaluation should conclude with a clear matrix comparing 2-3 shortlisted bridges across the axes of security, cost, speed, and developer experience, allowing you to select the optimal protocol for your payment flow's specific requirements.
Key Evaluation Criteria
Selecting a bridge for payments requires analyzing security models, liquidity, and finality guarantees. These criteria help assess risk and operational reliability.
Trust Model & Security Architecture
The underlying security model is the most critical factor. Evaluate the validator set and consensus mechanism.
- Trust-minimized bridges (e.g., IBC, rollup bridges) rely on the security of the connected chains.
- Externally verified bridges (e.g., Wormhole, LayerZero) depend on a separate validator or oracle network. Assess the economic security (stake size, slashing) and decentralization of this network.
- Federated or custodial bridges concentrate trust in a small multisig, presenting a higher centralization risk.
For payments, opt for bridges with battle-tested, decentralized validation where possible.
Liquidity Depth & Slippage
Payment efficiency depends on available liquidity for the required asset pairs. A bridge with shallow pools causes high slippage, increasing cost.
- Check Total Value Locked (TVL) in the bridge's canonical pools as a baseline metric.
- Assess if the bridge uses a locked/minted model (wrapped assets) or a liquidity pool model (like Stargate). Pool-based bridges can suffer from imbalanced liquidity, leading to failed transactions.
- For frequent payments, verify supported chains and assets. A bridge supporting USDC on 10 chains is more useful than one with deep liquidity on only two.
Finality & Speed
Transaction finality determines how long a user must wait before funds are usable on the destination chain. This varies by source chain consensus.
- Ethereum PoS requires ~15 minutes for full finality, though many bridges offer optimistic assumptions.
- Fast-finality chains (e.g., Cosmos, Avalanche, BNB Chain) settle in seconds.
- Bridges often have their own confirmation thresholds. For example, a bridge may require 32 block confirmations on Ethereum.
For point-of-sale or real-time payments, prioritize bridges supporting fast-finality chains or offering instant guarantees with fraud proofs.
Cost Structure & Fee Predictability
Bridge fees are complex, combining gas costs on both chains, protocol fees, and liquidity provider fees.
- Gas Costs: Who pays? Some bridges (e.g., Socket) let users pay on the source chain; others (e.g., some CCTP routes) require gas on the destination.
- Protocol Fees: Fixed percentage or dynamic based on congestion? Transparent fee models are essential for business calculations.
- Slippage Fees: Built into the exchange rate in pool-based models.
Unpredictable fees make reconciliation difficult. Prefer bridges with clear, upfront fee quotes before transaction signing.
Audit History & Incident Response
Examine the protocol's security track record and operational maturity.
- Audits: Look for multiple audits from reputable firms (e.g., Trail of Bits, OpenZeppelin, Quantstamp). Check if findings are public and have been addressed.
- Bug Bounties: An active, well-funded program (e.g., on Immunefi) indicates proactive security.
- Incident History: Has the bridge been exploited? Review past incidents (e.g., Wormhole, Nomad, Multichain) and assess the team's response, recovery process, and whether user funds were made whole.
A strong security posture is non-negotiable for transferring value.
Contract Upgradeability & Admin Controls
Understand who can change the bridge's core logic and under what conditions. Centralized upgrade keys are a systemic risk.
- Proxy Patterns: Most bridges use upgradeable proxy contracts. Identify the admin key holder: a single EOA, a multisig, or a decentralized governance DAO (e.g., Hop, Across).
- Timelocks: A mandatory delay (e.g., 48 hours) between a governance vote and execution allows users to react to malicious upgrades.
- Pause Mechanisms: Can a single entity freeze funds? While sometimes necessary for security, this represents a central point of failure.
Prioritize bridges with decentralized, timelocked governance for upgrades.
Step 1: Assess the Security Model
The security model of a cross-chain bridge is the single most critical factor for payments, determining who controls the assets and how they can be moved.
When evaluating a bridge for payments, you must first identify its trust model. This defines the set of entities or mechanisms you must trust to secure your funds. The primary models are: trusted (federated/custodial), where a known group of entities holds keys; trust-minimized, which relies on cryptographic proofs and decentralized networks; and hybrid models that combine elements of both. For high-value or institutional payments, trust-minimized bridges are generally preferred as they reduce counterparty risk and reliance on specific validators.
Next, examine the bridge architecture. Does it use lock-and-mint (assets locked on source chain, minted on destination) or liquidity pools (assets are swapped from a pool on the destination chain)? Lock-and-mint models, like those used by many canonical bridges (e.g., Polygon PoS Bridge), centralize risk on the custodian or validator set securing the lock contract. Liquidity pool models, common in many third-party bridges (e.g., across.to), shift risk to the solvency of the pool and the security of its on-chain contracts. Each has different failure modes to audit.
For trust-minimized bridges, scrutinize the underlying verification mechanism. The gold standard is light client verification, where the destination chain verifies block headers from the source chain (e.g., IBC, Near Rainbow Bridge). More common is optimistic verification, which uses a challenge period (e.g., Nomad, Optimism bridges). The weakest common form is multi-signature or MPC validation, where a committee signs off on transfers. Always check the economic security (stake slashable) and decentralization (number of independent operators) of the validating set.
Your assessment must include a review of proven, audited code. Look for bridges whose core contracts have been audited by multiple reputable firms (e.g., OpenZeppelin, Trail of Bits, Quantstamp) and where the audit reports are public. Check if the protocol has a bug bounty program on platforms like Immunefi. Crucially, verify that the deployed contract addresses match the audited code. Use a block explorer to check that the contract on-chain was verified from the specific, tagged repository commit that was audited.
Finally, analyze the economic and cryptographic security. For bridges secured by a validator set, what is the total value secured (TVS) versus the total value locked (TVL)? A low TVS/TVL ratio is a red flag. Are the validators' stakes slashable for malicious behavior? For bridges using zero-knowledge proofs (e.g., zkBridge), what is the setup (trusted or universal) and who maintains the prover network? Document the exact steps for your assessment, creating a checklist for each bridge you evaluate.
Step 2: Analyze Economic Security
This step focuses on assessing the financial guarantees and incentive structures that ensure a bridge's security and reliability for high-value transactions.
Economic security refers to the financial resources and incentive mechanisms that protect a bridge's assets and ensure honest validator behavior. For payments, you're not just trusting code—you're trusting that the economic cost of attacking the system outweighs any potential profit. The core metric here is Total Value Secured (TVS), which is the combined value of all assets locked in the bridge's smart contracts. A higher TVS generally indicates a larger economic moat, but you must analyze what backs it.
The security model defines the source of this economic guarantee. Lock & Mint bridges (e.g., Polygon PoS Bridge) secure value with assets locked on the origin chain. Liquidity Network bridges (e.g., Hop, Across) use professional liquidity providers (LPs) who stake capital. Wrapped Asset bridges rely on the security of the underlying custodian, like a multi-sig or a separate blockchain. For payments, Lock & Mint or audited Liquidity Network models often provide clearer, on-chain guarantees compared to opaque custodial models.
Examine the slash conditions and bonding requirements for network validators or relayers. Systems requiring participants to post a high-value bond (e.g., 100,000 USD equivalent) that can be destroyed (slashed) for malicious actions create strong disincentives. Check if the protocol's documentation specifies these amounts and the governance process for slashing. A bridge with vague or non-existent slashing logic relies more on social consensus than cryptographic economics.
Finally, analyze the profitability of attack versus the cost of defense. For a bridge holding $500M TVS, an attacker might profit by minting fraudulent assets. If the total bonded value by all validators is only $10M, the economic security is insufficient (attack cost << potential profit). Look for protocols where the cumulative bonded stake or locked value is a significant fraction, ideally exceeding 10-20%, of the TVS. This creates a robust economic barrier.
Step 3: Measure Performance and Latency
Quantifying a bridge's speed and reliability is critical for payment applications. This step covers the key metrics to measure and the tools to gather this data.
For payments, latency is the most critical performance metric. It's the total time from initiating a transaction on the source chain to its final, irreversible confirmation on the destination chain. This is not just the block time. It includes the time for the source chain to finalize the transaction, the bridge's validation or proving mechanism (e.g., generating a zero-knowledge proof or reaching consensus among validators), and the waiting period on the destination chain. A bridge like Hop Protocol might advertise sub-10 minute transfers for certain routes, while a canonical bridge like the Arbitrum L1→L2 Gateway can take ~10 minutes due to Ethereum's challenge period.
You must also measure throughput and success rate. Throughput is the maximum value or number of transactions a bridge can process per second. A high-throughput bridge like LayerZero can handle many concurrent messages. The success rate is the percentage of transactions that complete without requiring manual intervention or failing. Monitor for transaction reversals or stuck transfers, which indicate reliability issues. Tools like Chainlink CCIP provide transparency into latency and success rates through their public dashboard, which is a good benchmark for service-level expectations.
To collect this data, you need to perform active monitoring. Write a script that periodically sends test transactions of a fixed amount (e.g., 0.001 ETH) across the bridge and logs timestamps at key stages: tx_submitted_on_source, tx_finalized_on_source, event_observed_by_bridge, tx_submitted_on_dest, tx_finalized_on_dest. Calculate the latency for each component. Use RPC providers for both chains and listen for bridge-specific events. Here's a simplified conceptual outline:
javascript// Pseudocode for latency measurement const start = Date.now(); const sourceTx = await sendTx(sourceChain, bridgeContract, 'lock', [amount]); await sourceTx.wait(); // Wait for finality const sourceFinalityTime = Date.now(); // Listen for bridge event indicating processing const event = await listenForEvent(bridgeRelayer, 'TokensLocked'); const bridgeProcessTime = Date.now(); // Monitor destination chain for completion const destTxReceipt = await waitForDestTx(event.proof); const totalLatency = Date.now() - start; console.log(`Total Latency: ${totalLatency}ms`); console.log(`Bridge Processing Delay: ${bridgeProcessTime - sourceFinalityTime}ms`);
Analyze the consistency of latency. A bridge with an average latency of 3 minutes is unusable for payments if the 99th percentile latency spikes to 3 hours during congestion. Check historical data from block explorers and community reports. For bridges using off-chain relayers, like many L2-to-L2 bridges, latency can be low but more variable depending on the relayer's uptime and fee incentives. Compare these real-world measurements against the bridge's advertised specifications to assess truth in advertising.
Finally, consider the cost-latency trade-off. Some bridges offer multiple speed tiers. For example, you might pay a 0.5% fee for a transfer that completes in 10 minutes, or a 0.1% fee for one that takes 24 hours. Your payment application's requirements will dictate which trade-off is acceptable. Document your findings for each bridge protocol, creating a clear matrix of average latency, P95 latency, success rate, and cost under normal network conditions.
Bridge Protocol Comparison
Key metrics and features for evaluating cross-chain bridges for payment applications.
| Feature / Metric | Wormhole | LayerZero | Circle CCTP |
|---|---|---|---|
Trust Model | Optimistic (Guardian Network) | Ultra Light Node (ULN) | Centralized (Permissioned Validators) |
Time to Finality | ~15 minutes | < 2 minutes | < 15 minutes |
Supported Chains | 30+ | 50+ | 8 |
Native Gas Payment | |||
Avg. Transfer Fee | $5-15 | $2-8 | $1 + 0.1% |
Maximum Throughput (TPS) | ~1,000 | ~10,000 | ~100 |
Programmability | Arbitrary messages | Arbitrary messages | USDC mint/burn only |
Audit Status | Multiple (Kudelski, OtterSec) | Multiple (Zellic, Trail of Bits) | Internal + Third-Party |
Step 4: Review Supported Assets and Fee Structure
A bridge's utility and total cost are defined by which assets it can move and the fees it charges. This step is critical for operational planning.
The supported asset list determines your bridge's utility. A protocol may support native ETH, wrapped assets (like WETH, WBTC), or specific ERC-20 tokens. Check for chain-native assets versus bridged representations, as this affects composability on the destination chain. For example, bridging USDC from Ethereum to Polygon via the official Polygon POS bridge yields canonical USDC, while some third-party bridges might deliver a wrapped, bridged version (e.g., USDC.e) with different liquidity. Always verify the token contract address on the destination chain's block explorer.
Bridge fees are rarely a single charge. They typically comprise: gas fees paid to both source and destination chains, a protocol fee (often a percentage of the transfer amount), and potentially a liquidity provider fee. Some bridges like Hop Protocol use a bonded liquidity model with dynamic fees based on pool depth, while others like Across use a relayer network competing on speed and cost. Always calculate the total cost of transfer, not just the quoted bridge fee. For large transfers, a 0.1% protocol fee can be significant.
Fee structures reveal the bridge's economic model and security. A bridge with excessively low or zero fees may be subsidizing operations or have a different revenue model (like token inflation), which can be unsustainable. Analyze if fees are fixed, tiered, or dynamic. Dynamic fees based on network congestion (common in optimistic rollup bridges) are more complex to forecast. Use the bridge's fee estimator API, if available, to model costs under different conditions. For developers, integrating this estimator into your application can provide users with accurate quotes.
Liquidity depth for each asset directly impacts user experience and cost. A bridge with shallow liquidity for a specific token may have high slippage, failed transactions, or inflated fees during high demand. Check if the bridge uses a pooled liquidity model (like Stargate's Omnichain Fungible Tokens) or a mint/burn model (like most canonical bridges). Pooled models are faster but require active liquidity provisioning. You can often query liquidity levels via the bridge's frontend or subgraph before initiating a transfer.
Finally, review the supported chains and routes. A bridge might support Ethereum to Arbitrum but not the reverse, or it may only support specific asset pairs. Verify withdrawal times: optimistic rollup bridges have a 7-day challenge period for canonical withdrawals, while third-party liquidity bridges offer near-instant finality for a premium. Your choice depends on the trade-off between speed, cost, and trust assumptions. Documenting these parameters is essential for building reliable cross-chain payment flows.
Resources and Tools
Practical tools and evaluation frameworks for assessing cross-chain bridge protocols used in payment flows, treasury transfers, and onchain settlement.
Bridge Security Models and Trust Assumptions
Start by classifying the bridge security model, because this determines the real risk profile for payments.
Key dimensions to evaluate:
- Custodial vs non-custodial: Multisig-controlled bridges introduce operator risk. Light-client and ZK bridges reduce trust but increase complexity.
- Validation mechanism: Look for onchain verification (light clients, zk-SNARKs) versus offchain relayers or oracles.
- Upgrade authority: Identify who can upgrade contracts and under what conditions (DAO vote, multisig, timelock).
- Failure modes: Check whether funds are locked, delayed, or permanently lost if relayers go offline.
For payment use cases, prefer bridges where message verification is cryptographically enforced onchain, even if latency is higher. Faster bridges often trade speed for trust assumptions that are unacceptable for recurring payments or treasury movements.
Liquidity Depth and Transfer Finality
Payment reliability depends on liquidity availability and finality guarantees, not just advertised throughput.
What to measure:
- Available liquidity per route: Bridges with fragmented liquidity may fail on larger transfers or spike fees unpredictably.
- Rebalancing mechanics: Check how liquidity is replenished (market makers, protocol incentives, or native mint/burn).
- Settlement finality: Determine when a transfer is economically irreversible, not just "optimistically confirmed".
- Timeout behavior: Understand how long users wait before refunds if a transfer stalls.
For B2B or high-value payments, prefer bridges with deterministic finality windows and transparent liquidity dashboards. Avoid bridges that rely solely on optimistic execution without clear dispute resolution timelines.
Frequently Asked Questions
Common questions developers ask when assessing cross-chain bridge protocols for secure and efficient payment integrations.
The trust model is the most critical factor. Bridges operate on a spectrum from trust-minimized to trusted. For high-value payments, prioritize bridges that use cryptoeconomic security (like optimistic or zero-knowledge proofs) over those relying solely on a multisig committee. A trust-minimized bridge secures assets using the underlying blockchains' validators, while a trusted bridge depends on the honesty of its external operators. Always audit the bridge's smart contracts and review its historical security record on platforms like DeFiLlama or ChainAegis before integration.
Step 5: Implementation and Monitoring Checklist
A systematic checklist for deploying and maintaining a cross-chain bridge payment system, focusing on security, reliability, and cost-efficiency.
Before initiating any transfers, conduct a final pre-flight check. This involves verifying the current network status of both source and destination chains—check for congestion, high gas fees, or recent incidents on block explorers like Etherscan or Solana Explorer. Confirm the exact recipient address format for the destination chain (e.g., a 0x-hex address for EVM chains versus a base58 address for Solana). Ensure your wallet holds sufficient native tokens to cover all transaction fees, including the bridge fee and the gas for the claim transaction on the target chain. A common failure point is funding only for the initial approval and bridge operation, forgetting the final claim.
Initiate the transfer with a small, test amount—often called a "canary transaction." This is a non-negotiable security step. Send a minimal value (e.g., $10 worth of tokens) and wait for it to complete the entire journey: approval, bridging, and successful claim in the destination wallet. Monitor this transaction using the bridge's dashboard and the destination chain's explorer. This test validates your configuration, confirms the bridge's operational status, and ensures no address formatting errors exist before committing significant capital. Document the transaction hashes for both the source and destination chains for your records.
For mainnet deployments, implement a robust monitoring system. This goes beyond watching a single transaction. Use services like Tenderly or OpenZeppelin Defender to set up alerts for specific smart contract events emitted by the bridge contracts, such as TransferStarted or TransferCompleted. Monitor the bridge's official social channels (Twitter, Discord) and status pages for real-time incident reports. For critical payment flows, consider implementing a circuit-breaker pattern in your own application logic that can pause automated bridging if abnormal conditions are detected, such as a spike in failed transactions or a drop in bridge validator participation.
Establish a clear post-transaction reconciliation process. After a batch of payments, verify the final state on the destination chain. Use a block explorer or a node RPC call to confirm the token balances of recipient addresses match the expected amounts, accounting for any bridge fees. For accounting and compliance, maintain an immutable log linking source chain transaction IDs with their corresponding destination chain transaction IDs and the bridge's internal transfer ID. This audit trail is essential for resolving disputes, proving fund movement, and for financial reporting. Tools like The Graph can be used to index and query this cross-chain data programmatically.
Plan for failure scenarios and edge cases. What is your action if a transaction appears stuck in the bridge's pending state for longer than the advertised delay? Know the bridge's official support channels and dispute resolution process. Understand the recovery mechanism, if any, for funds if the claim transaction fails (e.g., some bridges allow re-triggering the claim). For maximum resilience, design your system to support multiple bridge protocols, allowing for dynamic routing away from a bridge that is experiencing downtime or security concerns, using liquidity aggregators like Socket or Li.Fi for this logic.
Conclusion and Next Steps
Evaluating a cross-chain bridge for payments requires a systematic approach that prioritizes security, cost, and user experience. This guide has outlined the critical factors to consider.
The evaluation framework for a payment-focused bridge rests on three pillars: security, cost efficiency, and user experience. Security is non-negotiable; always verify the bridge's trust model (native, validated, or hybrid), audit history, and the operational status of its underlying components like relayers and oracles. For high-value transactions, prioritize bridges with battle-tested, audited smart contracts and a proven track record of uptime. Tools like DeFi Llama's Bridge Dashboard and community forums are essential for this due diligence.
Cost analysis must extend beyond simple gas fees. Calculate the total cost of a transfer, which includes source chain gas, bridge protocol fees, destination chain gas, and any liquidity provider fees or slippage. For frequent, smaller payments, a low-latency bridge with optimized gas on popular L2s like Arbitrum or Optimism might be ideal. For large, infrequent transfers, a slower but more secure native bridge could be the cost-effective choice when considering value at risk.
Your next step is to test the bridge with small amounts. Deploy a simple script using a Web3 library like Ethers.js or Viem to interact with the bridge's smart contracts. Monitor the transaction on both block explorers and note the time to finality. Compare this experience across 2-3 shortlisted protocols. Document any errors, unclear status messages, or unexpected fees encountered during the dry run.
Finally, stay informed. The cross-chain landscape evolves rapidly. Subscribe to security newsletters like the ChainSecurity blog or follow protocol governance forums. New vulnerabilities, like the signature malleability issue that affected some bridges, are discovered regularly. Your evaluation is not a one-time task but an ongoing process integral to operating safely in a multi-chain ecosystem.