Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Guides

Setting Up a Cross-Chain Audit and Security Review Process

A technical guide for developers on establishing a continuous security framework for cross-chain arbitrage systems, covering audits, bounties, and operational reviews.
Chainscore © 2026
introduction
CROSS-CHAIN DEVELOPMENT

Introduction: The Need for Continuous Security

Why a one-time audit is insufficient for securing cross-chain applications in a dynamic threat landscape.

In the context of cross-chain applications, the security model is inherently more complex than that of a single-chain dApp. A smart contract on a single chain interacts with a predictable, bounded environment. In contrast, a cross-chain application's security perimeter extends across multiple, heterogeneous blockchains, each with its own consensus rules, validator sets, and client implementations. This creates a vastly expanded attack surface that includes the application's contracts on each chain and the bridging infrastructure (relayers, oracles, off-chain services) that connects them. A vulnerability in any single component can compromise the entire system.

The blockchain ecosystem is not static. Key dependencies that form the foundation of your application's security are in constant flux. Consider the Chainlink CCIP roadmap, the Axelar Virtual Machine upgrade, or a new LayerZero endpoint version. Each protocol upgrade, while adding functionality, can introduce new risks or alter security assumptions. Furthermore, the economic conditions and validator/delegator dynamics of connected chains (like changes in Ethereum's stake distribution or Avalanche subnet validator sets) directly impact the security guarantees your application relies upon. A security review is only valid for the specific code and ecosystem state at the moment it was conducted.

Adversaries operate in real-time, employing automated tools to scan for newly deployed contracts and exploit vulnerabilities within minutes or hours. The infamous Poly Network hack in 2021, resulting in a $600M+ exploit, demonstrated how a flaw in cross-chain logic could be catastrophically leveraged across multiple chains simultaneously. A traditional development cycle that secures code only at the point of mainnet deployment creates a dangerous gap. Once live, the application is exposed without a formal process to reassess security after dependencies change, new features are added, or novel attack vectors are discovered in the wild.

Therefore, security must be modeled as a continuous process, not a one-time event. This process integrates automated monitoring, scheduled re-audits, and structured response plans. It begins with establishing a Cross-Chain Security Review Framework—a living document that defines the scope (all smart contracts, relayers, multisigs), sets review triggers (protocol upgrades, major TVL inflows, scheduled quarterly reviews), and outlines emergency response procedures. This framework ensures that security assessments keep pace with the evolution of both your application and the interconnected ecosystems it depends on.

prerequisites
FOUNDATION

Prerequisites and System Scope

Before initiating a cross-chain audit, you must define the system's boundaries and ensure the correct tools and access are in place. This section outlines the critical first steps.

A cross-chain audit's scope must be explicitly defined to be effective. This involves mapping the entire attack surface, which extends beyond a single smart contract. You must identify all components: the core application contracts on each supported chain (e.g., Ethereum, Arbitrum, Polygon), any bridge or messaging layer (like LayerZero, Axelar, or Wormhole), relayers, oracles for price feeds, and off-chain keepers. The scope document should list contract addresses, their verified source code links (e.g., Etherscan), and the specific functions that handle cross-chain logic, such as sendMessage or receiveMessage.

Technical prerequisites are non-negotiable. The auditing team requires full access to the codebase, typically via a private GitHub repository. This includes all smart contract code, deployment scripts, test suites, and any off-chain components. The code should be accompanied by comprehensive documentation detailing the architecture, data flow diagrams, and the intended security model. For dynamic analysis, access to a testnet or mainnet-forked environment (using tools like Foundry's anvil or Hardhat Network) with the contracts deployed is essential to simulate cross-chain interactions.

Establish a clear testing and validation framework. This means setting up a local environment that can simulate the multi-chain state. Use tools like Foundry's forge to write invariant tests that must hold across chains, such as "the total supply on all chains must equal the canonical supply." Define the specific trust assumptions for external dependencies: Is the bridge validator set trusted? What is the economic security of the bridge? Documenting these assumptions upfront frames the audit's focus on the code's adherence to its intended security model within a realistic, adversarial environment.

phase-1-initial-audit
SECURITY STRATEGY

Phase 1: Engaging Multiple Audit Firms

A systematic approach to selecting and coordinating multiple security firms for a comprehensive cross-chain smart contract audit.

Engaging multiple audit firms is a critical risk mitigation strategy for high-value, cross-chain protocols. A single audit, even from a reputable firm, can miss edge cases or have blind spots. By employing a diverse set of auditors, you leverage different expertise, methodologies, and perspectives. This multi-firm approach is the industry standard for major DeFi protocols, as it significantly increases the probability of discovering critical vulnerabilities before mainnet deployment. The goal is not to find a single "perfect" auditor, but to create a robust safety net through overlapping review processes.

The selection process should be deliberate and criteria-driven. Avoid choosing firms based solely on reputation or cost. Instead, evaluate each firm's specific expertise relevant to your stack. For a cross-chain protocol, prioritize firms with proven experience in: the specific virtual machines you use (EVM, SVM, Move), the bridging or messaging protocols you integrate (like LayerZero, Wormhole, Axelar), and complex DeFi mechanics (e.g., AMMs, lending, derivatives). Review their public audit reports for projects of similar complexity to assess their depth and reporting style.

Effective coordination between multiple firms is essential to avoid redundancy and ensure comprehensive coverage. Structure the engagement using a phased or scoped approach. A common model is to have a primary firm conduct a full-scope audit while a secondary firm performs a focused review on the highest-risk components, such as the cross-chain messaging validation logic or the novel economic mechanisms. Clearly define and communicate the scope for each firm to prevent overlap on well-tested libraries (like OpenZeppelin contracts) and focus their efforts on your custom, complex code.

Technical setup is crucial for a smooth audit process. Prepare a dedicated audit repository for each firm containing: the full, frozen codebase tagged with a specific commit hash, comprehensive documentation (specifications, architecture diagrams, threat models), a detailed test suite with >95% coverage, and a local development environment setup script (e.g., using Foundry or Hardhat). Providing a working fork of relevant testnets (like Sepolia or Solana Devnet) for cross-chain component testing can drastically improve an auditor's efficiency and depth of review.

Establish a single channel for communication and findings management, typically using a platform like GitHub Issues or a dedicated security portal. Require all firms to submit findings in a standardized format (e.g., including severity, proof of concept, location, and recommendation). This allows your internal team to triage, deduplicate, and track fixes across all reports in one place. Schedule a kickoff call with all firms present to align on scope, timelines, and communication protocols, followed by regular syncs to address clarifying questions without revealing other firms' findings.

audit-tools-checklist
CROSS-CHAIN SECURITY

Pre-Audit Preparation: Tools and Checklists

A systematic approach to auditing cross-chain applications requires specialized tools and defined processes. This guide covers essential steps for setting up a robust security review.

01

Define the Audit Scope and Threat Model

Start by mapping the system architecture. Identify all components: source and destination chains, the bridge protocol (lock-and-mint, burn-and-mint, liquidity pools), relayers, oracles, and governance contracts. Document all trust assumptions for each component. Create a threat model focusing on cross-chain-specific risks like:

  • Message validation failures
  • Relayer or oracle manipulation
  • Replay attacks across chains
  • Liquidity pool exhaustion
  • Governance takeover affecting bridge parameters
03

Cross-Chain Message Flow Validation

Manually trace and validate the lifecycle of a cross-chain message. Use a checklist:

  1. Initiation: Is the user request on the source chain authenticated and signed correctly?
  2. Observation: How do relayers/oracles observe the event? Is the event data susceptible to log poisoning?
  3. Verification: What is the proof mechanism (e.g., Merkle proofs, zk-SNARKs, signature aggregation)? Who are the validators?
  4. Execution: On the destination chain, does the receiving contract correctly verify the proof before executing? Check for reentrancy and gas limits. Document each step with potential failure points.
04

Economic and Incentive Analysis

Audit the economic security of the bridge. This is critical for protocols with staking, slashing, or liquidity pools.

  • Staking/Slashing: Calculate the cost to attack vs. the slashing penalty. Is it economically irrational?
  • Liquidity Pools: For liquidity network bridges, model scenarios like a bank run on the pool. What happens if 80% of liquidity is withdrawn suddenly?
  • Oracle Pricing: If the bridge uses price oracles for asset valuation, test for manipulation scenarios (e.g., flash loan attacks).
  • Fee Mechanics: Are fees sufficient to pay relayers and secure the network long-term?
06

Create a Final Verification Checklist

Compile findings into a final pre-audit checklist. This ensures no critical area is missed before engaging an external firm. Key items:

  • All address parameters are immutable or governed by timelock.
  • No single point of failure in the relayer/oracle set.
  • Cross-chain messages have a unique nonce and are checked for replay.
  • All value transfers use the checks-effects-interactions pattern.
  • Pause mechanisms exist and are accessible under defined conditions.
  • All external calls are to trusted, audited contracts.
  • Gas costs are bounded and will not cause transactions to revert on target chains.
SERVICE FOCUS

Comparing Audit Firm Specializations

Leading blockchain security firms differ in their core expertise, team structure, and delivery models. This table compares their specializations to help you match a firm to your project's specific needs.

Audit Focus & TeamTrail of BitsOpenZeppelinQuantstampConsenSys Diligence

Core Specialization

Protocol & cryptography research, low-level systems

Smart contract security, library development

Automated scanning, high-volume audits

EVM-based DeFi, formal verification

Typical Team Composition

Security researchers, cryptographers

Smart contract engineers, auditors

Auditors, tooling engineers

Smart contract auditors, researchers

Audit Methodology

Manual review, custom tooling, threat modeling

Manual review, standardized checklists, Slither

Proprietary scanning engine, manual validation

MythX platform, manual review, Certora for formal verification

Average Audit Duration

3-6 weeks

2-4 weeks

1-3 weeks

2-5 weeks

Public Report Repository

Primary Client Profile

Layer 1 protocols, infrastructure, complex systems

Token standards, DeFi protocols, upgradeable contracts

High-throughput projects, new chains, startup programs

Enterprise Ethereum, large-scale DeFi, consortia

Formal Verification Offering

Custom engagements

Via Certora partnership

Limited scope

Integrated via MythX and Certora

Post-Audit Support

Advisory, re-audits

Re-audits, monitoring

Re-scans, monitoring dashboard

Re-audits, advisory services

phase-2-bug-bounty
BUG BOUNTY PROGRAM

Setting Up a Cross-Chain Audit and Security Review Process

A structured audit process is critical for identifying vulnerabilities across multiple blockchain environments before launching a bug bounty. This guide outlines the steps for a comprehensive cross-chain security review.

A cross-chain audit extends beyond a single blockchain's Virtual Machine (VM). It must assess the security of the core protocol, all connected bridge contracts, and the integrity of message-passing mechanisms between chains. For example, a protocol using LayerZero must audit its Endpoint.sol interactions, while a Wormhole-based project needs to review its implementation of the core bridge and token bridge modules. The first step is to create a detailed technical specification document that maps all system components, their interdependencies, and the expected data flow across each supported chain (e.g., Ethereum, Arbitrum, Polygon).

Engage specialized audit firms with proven cross-chain expertise. A single audit is insufficient; a multi-layered approach is recommended. Start with a code review focusing on logic errors and standard vulnerabilities (reentrancy, overflow). This should be followed by a protocol-level review analyzing economic incentives, governance mechanisms, and centralization risks. Finally, conduct a cross-chain integration review, which simulates asset transfers and message relay under adversarial network conditions (e.g., chain reorganizations, validator downtime). Firms like Trail of Bits, OpenZeppelin, and Spearbit offer services tailored to multi-chain systems.

The audit scope must explicitly include upgrade mechanisms and emergency pause functions, as these are high-value targets for attackers. All onlyOwner or admin functions require rigorous checks for access control flaws. For maximum coverage, combine automated tooling with manual review. Use static analyzers like Slither or MythX for initial scanning, but rely on manual auditors to find complex, business-logic flaws that tools miss. The final audit report should categorize findings by severity (Critical, High, Medium, Low), provide clear proof-of-concept exploits, and recommend specific code patches.

Before the bug bounty begins, all Critical and High severity issues from the audit must be remediated and verified. Publicly share a summary of the audit report, including the firms involved and the scope, to build trust with the security researcher community. This transparency demonstrates due diligence and sets a clear baseline, ensuring bounty hunters focus on discovering novel vulnerabilities rather than reporting known, patched issues. The completed audit acts as the foundational security certificate for your protocol's public bug bounty program launch.

CROSS-CHAIN SECURITY

Bug Bounty Scoping and Management FAQ

Common questions and best practices for structuring a security review process that spans multiple blockchain networks and smart contract environments.

The primary goal is to identify vulnerabilities that arise from the integration points between different blockchains, which are often more complex than single-chain audits. This includes analyzing:

  • Bridge or messaging layer logic (e.g., Wormhole, LayerZero, Axelar)
  • Asset representation contracts (wrapped tokens, canonical bridges)
  • State synchronization mechanisms
  • Relayer or oracle security assumptions

Unlike a standard audit, a cross-chain review must assess the security of the entire system's trust assumptions, failure modes, and recovery processes across heterogeneous environments. The focus is on ensuring asset safety and message integrity as they move between chains with different consensus models and validator sets.

phase-3-operational-reviews
PHASE 3: REGULAR OPERATIONAL SECURITY REVIEWS

Setting Up a Cross-Chain Audit and Security Review Process

A systematic process for continuous security assessment across multiple blockchain networks.

A cross-chain security review process is a structured, recurring evaluation of the entire multi-chain system, not just individual smart contracts. This moves beyond the one-time audit of a single deployment to a holistic view of operational risks. The core components include the smart contract logic, the off-chain relayers or oracles that facilitate cross-chain communication, the governance mechanisms controlling upgrades, and the economic security of the underlying networks. Regular reviews ensure that new vulnerabilities introduced by protocol updates, dependency changes, or novel attack vectors are identified and mitigated.

The first step is establishing a review cadence. A common model is a quarterly deep-dive audit supplemented by monthly automated scanning. For high-value Total Value Locked (TVL) protocols, this frequency may increase. Each review should have a defined scope document. For a cross-chain lending protocol, this scope might cover: the core bridging contracts (e.g., Wormhole, LayerZero, Axelar integrations), the liquidity pool managers on each chain, the price oracle configurations, and the emergency pause/upgrade multi-sigs. Using tools like Slither or Mythril for static analysis and Foundry's forge inspect for dependency checks provides automated baseline coverage.

Manual review focuses on cross-chain specific threats. Auditors test for consistency of logic across different Virtual Machines (EVM, SVM, Move). A critical check is verifying that a user's action on Chain A (like depositing collateral) correctly and securely updates their state on Chain B (like minting a synthetic asset). They analyze the trust assumptions of the underlying messaging layer—assessing validator sets, fraud proof windows, and liveness guarantees. Code examples should demonstrate how to verify a cross-chain message, such as checking the messageId and sourceChain in a Wormhole VAA (Verified Action Approval) to prevent replay attacks from unauthorized chains.

Findings must be tracked in a dedicated vulnerability registry, such as a private GitHub repository using the Open Source Security Foundation (OpenSSF) Scorecard or a dedicated audit management platform. Each finding is logged with a severity (Critical, High, Medium, Low), status (Open, Mitigated, Accepted), and the specific commit hash or contract address where it was discovered. This creates an immutable history of the protocol's security posture. For transparency, mitigated Critical and High findings from past audits should be summarized in public reports, building trust with users and stakeholders.

Finally, the process must include a post-review action plan. This involves scheduling and executing fixes, retesting the mitigations, and updating incident response playbooks. For example, if a review finds a vulnerability in a relayer's transaction signing process, the fix (e.g., implementing a more secure key rotation schedule) should be tested on a testnet fork before mainnet deployment. The playbook should be updated with steps for pausing the vulnerable module across all supported chains. This closed-loop process transforms security reviews from a checklist item into a core component of operational resilience.

monitoring-tools
SECURITY

Continuous Monitoring and Alerting Tools

A reactive audit is not enough. These tools provide ongoing surveillance for smart contracts and cross-chain infrastructure, alerting teams to suspicious activity and vulnerabilities in real-time.

phase-4-incident-response
INCIDENT RESPONSE PHASE 4

Setting Up a Cross-Chain Audit and Security Review Process

A proactive audit process is your first line of defense against cross-chain exploits. This guide details how to establish a rigorous, multi-layered security review for smart contracts and bridge configurations.

A formalized audit process is non-negotiable for cross-chain applications. Unlike single-chain dApps, vulnerabilities in a bridge or cross-chain messaging layer can lead to catastrophic, multi-chain fund loss. Your process should mandate audits before mainnet deployment and after any significant upgrade. Key components include selecting auditors with proven cross-chain expertise (e.g., experience with IBC, LayerZero, Wormhole, or CCIP), defining a clear scope covering all bridge validator logic, relayer incentives, and message verification, and establishing severity classification for findings (Critical, High, Medium, Low).

Don't rely on a single audit. Implement a defense-in-depth strategy combining different review types. Start with automated analysis using tools like Slither, Mythril, or Certora Prover to catch common bugs. Follow this with at least one, but ideally two, independent manual audits from different firms. For critical protocol upgrades, consider a bug bounty program on platforms like Immunefi to crowdsource security insights from white-hat hackers before and after launch. Maintain a public audit repository, as transparency builds trust; protocols like Uniswap and Aave publicly list all their audit reports.

The audit scope must be exhaustive for cross-chain systems. It should cover: the core smart contracts on each connected chain (Ethereum, Arbitrum, Polygon, etc.), the off-chain relayer or validator infrastructure and its governance, the cryptographic proofs (e.g., Merkle proofs, zk-SNARKs), the upgrade mechanisms and timelocks, and the emergency pause functions. For example, an audit of a cross-chain swap bridge must review the liquidity pool contracts on both chains and the message-passing layer that synchronizes them, ensuring atomicity of transactions.

Creating and tracking the Audit Action Plan is critical. For every finding, log it in a dedicated tracker (like a GitHub Issue or spreadsheet) with the auditor's recommended fix, your team's implementation status, and the auditor's final verification. For a Critical finding like "Relayer can mint unlimited tokens," the action is clear: fix and re-audit. For a Medium finding like "Lack of event emission on failure," you must decide on a risk-acceptance threshold. All decisions and rationales must be documented for internal governance and future reference.

Finally, integrate audit findings into your monitoring and response playbooks. If an audit identified a specific attack vector (e.g., signature replay across chains), configure your monitoring alerts to watch for related transaction patterns. The post-audit phase also involves setting a schedule for periodic re-audits, especially when new chains are integrated or underlying libraries (like OpenZeppelin) are updated. This continuous cycle of review, fix, and verify forms the bedrock of a resilient cross-chain security posture.

RESPONSE PROTOCOL

Incident Severity and Response Matrix

A framework for classifying security incidents and defining the required response actions, timelines, and stakeholders.

Severity LevelDefinition & ExamplesResponse Time (TTR)Key ActionsStakeholders

Critical (Sev-1)

Active exploit draining funds, protocol insolvency, governance takeover.

< 15 minutes

Immediate pause of all contracts, public disclosure, engage emergency multisig, coordinate with whitehats.

Core Devs, Security Lead, Legal, PR

High (Sev-2)

Critical vulnerability discovered (e.g., reentrancy, logic flaw) with no active exploit, major oracle failure.

< 4 hours

Deploy emergency patch, prepare post-mortem, notify key partners, plan upgrade.

Core Devs, Security Lead, Auditors

Medium (Sev-3)

Non-critical bug that could degrade service (e.g., front-running risk, UI bug causing failed txs), partial data unavailability.

< 24 hours

Schedule fix in next regular upgrade, monitor for exploitation, internal review.

Dev Team, Product Manager

Low (Sev-4)

Minor UI/UX issues, informational errors, or gas inefficiencies with no security impact.

Next sprint cycle

Add to backlog, prioritize against other features.

Dev Team

AUDIT PROCESS

Frequently Asked Questions on Cross-Chain Security

Common questions from developers on establishing a robust security review process for cross-chain applications, covering tooling, scope, and best practices.

A comprehensive cross-chain audit must extend beyond the core smart contract logic. The scope should be segmented into distinct layers:

Core Smart Contracts:

  • Business logic and access control for the application's main functions.
  • Token standards, mint/burn mechanisms, and fee structures.

Cross-Chain Messaging Layer:

  • Validation of all message formats, payload encoding/decoding, and replay protection.
  • Security of the relayer or oracle network integration (e.g., Wormhole, LayerZero, Axelar).
  • Correct implementation of the receiving chain's message verification (e.g., verifying Wormhole VAA signatures).

Chain-Specific Integration:

  • Gas optimization and reentrancy guards tailored to each connected EVM chain.
  • Correct handling of native assets vs. wrapped assets on each chain.
  • Validation of bridge-specific token canonicalization and decimal handling.

Operational Security:

  • Key management for admin and upgrade functions across all deployed contracts.
  • Emergency pause and recovery mechanisms with clear multi-sig governance.

Failing to audit the messaging layer is a critical oversight, as it's the most common attack vector.

conclusion-next-steps
OPERATIONAL FRAMEWORK

Conclusion and Implementing Your Process

A systematic, repeatable process is the foundation of effective cross-chain security. This section outlines how to implement a formal audit and review workflow for your team or organization.

To formalize your cross-chain security review, begin by establishing a standard operating procedure (SOP) document. This document should define the scope of every review, including the target chains, the specific bridge protocol or messaging layer (e.g., LayerZero, Axelar, Wormhole), and the connected smart contracts. It must mandate a multi-phase approach: 1) Architecture Review of the protocol's security model and trust assumptions, 2) Smart Contract Audit of the on-chain components, and 3) Operational Security Check of the off-chain relayers or guardians. Tools like Slither or Foundry's forge inspect can be integrated into CI/CD pipelines for automated vulnerability detection in Solidity code.

Next, create a risk assessment matrix tailored to cross-chain threats. This matrix should catalog specific risks—such as validator set compromise, signature verification flaws, economic attacks on liquidity pools, and reorg attacks on light clients—and assign them a severity score based on likelihood and impact. For each identified risk, document the verification steps. For instance, to assess economic security, you would need to analyze the staking economics of the bridge's validators, the slashing conditions, and the value of the bonded capital relative to the total value locked (TVL). Reference real-world incidents, like the Nomad Bridge hack, to contextualize these risks.

Finally, implement a continuous monitoring and reporting system. Security is not a one-time audit but an ongoing process. Set up alerts for on-chain events related to your bridged assets using services like Tenderly or OpenZeppelin Defender. Monitor for anomalous transaction volumes, changes in guardian sets, or upgrades to proxy contracts. All findings from reviews and monitoring should be logged in a structured report template, detailing the vulnerability, its proof-of-concept, the assessed risk level, and a recommended mitigation. This documented history creates an institutional knowledge base, making future reviews more efficient and thorough.

How to Set Up a Cross-Chain Security Audit Process | ChainScore Guides