Hashtag Web3 Logo

Bridge

A protocol that enables the transfer of tokens, data, or smart contract commands between different blockchain networks, facilitating interoperability in the multi-chain ecosystem.

Protocols & NetworksIntermediate
Cross-chain bridge connecting blockchains

A blockchain bridge is a protocol connecting two or more blockchain networks, allowing assets and information to move between them. Bridges are critical infrastructure in crypto's multi-chain reality, where value and users are distributed across dozens of networks.

Why Bridges Exist

Blockchains are isolated systems by design. Ethereum can't see Bitcoin transactions. Solana doesn't know Polygon's state. This isolation creates problems:

Liquidity Fragmentation: Your ETH on Ethereum can't be used on Arbitrum for DeFi without moving it.

User Experience: Moving between chains requires selling assets, bridging, buying back—multiple transactions and fees.

Capital Inefficiency: Can't leverage your Bitcoin to borrow stablecoins on Ethereum without converting.

Ecosystem Silos: Applications on one chain can't interact with those on another.

Bridges solve these problems by creating pathways between chains, enabling asset transfers and cross-chain communication.

How Bridges Work

Lock and Mint Model

Most common bridge mechanism:

  1. Lock Assets: User sends tokens to bridge contract on Source Chain. Tokens are locked, not destroyed.

  2. Verification: Bridge validators confirm the lock transaction.

  3. Mint Wrapped Tokens: Bridge mints equivalent "wrapped" tokens on Destination Chain (e.g., lock ETH on Ethereum, mint wETH on Polygon).

  4. User Receives: Wrapped tokens appear in user's wallet on Destination Chain.

Reverse Process (Withdraw):

  1. Burn wrapped tokens on Destination Chain
  2. Unlock original tokens on Source Chain
  3. Original tokens return to user

Example—Wormhole Bridge:

  • Send 1 ETH on Ethereum to Wormhole contract
  • Wormhole mints 1 wETH on Solana
  • Use wETH on Solana DeFi
  • To withdraw: Burn wETH on Solana, unlock ETH on Ethereum

Liquidity Pool Model

Some bridges use liquidity pools on both chains:

  1. Deposit: User deposits Token A on Source Chain into pool
  2. Receive: Instantly receive Token A from pool on Destination Chain
  3. Rebalancing: Liquidity providers or automated systems rebalance pools

Advantages: Faster, no wrapped tokens, better UX

Disadvantages: Requires deep liquidity, limited by pool depth

Examples: Hop Protocol, Across Protocol

Types of Bridges

Trusted Bridges (Custodial)

Centralized entity or federation controls locked assets.

Examples:

  • WBTC (Wrapped Bitcoin): BitGo custodian holds BTC, mints ERC-20 WBTC on Ethereum
  • Multichain (formerly Anyswap): Multi-party computation but still permissioned validators

Advantages:

  • Simpler to build
  • Faster transactions
  • Better UX

Disadvantages:

  • Trust required in bridge operator
  • Single point of failure
  • Regulatory risk

Trustless Bridges

Operate using smart contracts and algorithms without trusted intermediaries.

Examples:

  • Rainbow Bridge (Ethereum ↔ NEAR): Light client proofs validate cross-chain transactions
  • IBC (Inter-Blockchain Communication): Cosmos ecosystem standard
  • LayerZero: Omnichain messaging protocol

Advantages:

  • More decentralized
  • Censorship resistant
  • No trusted parties

Disadvantages:

  • More complex
  • May be slower
  • Higher technical requirements

Layer 2 Bridges

Connect Ethereum mainnet to Layer 2 rollups.

Canonical Bridges:

  • Arbitrum Bridge
  • Optimism Bridge
  • zkSync Bridge

These are native bridges built by L2 teams, inherit L2's security model.

Third-Party Bridges:

  • Hop, Across, Synapse enable faster L2-to-L2 transfers
  • Trade security assumptions for speed

Major Bridge Protocols

Wormhole

Connects Ethereum, Solana, BNB Chain, Avalanche, Polygon, and others.

Mechanism: 19 Guardian validators secure bridge

TVL: Billions (before $325M hack recovered)

Use Cases: Cross-chain DeFi, NFT transfers

Multichain

One of the oldest bridges, supports 70+ chains.

TVL: Previously $5B+ before shutdown concerns

Controversy: CEO went missing, leading to bridge concerns and declining usage

Synapse

Optimistic bridge using cross-chain AMM.

Features: Fast bridging, good UX

Supported: 15+ chains

Hop Protocol

Optimistic bridge specializing in L2 ↔ L2 transfers.

Innovation: Uses "bonders" who provide instant liquidity, reimbursed after settlement

Popular For: Moving between Arbitrum, Optimism, Polygon quickly

LayerZero

Omnichain interoperability protocol, not just asset bridge.

Features: Message passing between chains enables cross-chain applications

Backed: $260M raised from a16z and others

Vision: Any chain can communicate with any other chain

Axelar

Cross-chain communication platform with Proof-of-Stake security.

Validators: Network of validators secure message passing

Use Cases: Cross-chain DeFi, cross-chain governance

Bridge Security Risks

Bridges have become the biggest attack vector in crypto:

Bridge Hacks

Ronin Bridge Hack (2022): $625M stolen when attackers compromised validator keys.

Wormhole Hack (2022): $325M exploit (later recovered by Jump Trading).

Harmony Bridge (2022): $100M stolen through compromised private keys.

Nomad Bridge (2022): $190M drained due to smart contract vulnerability anyone could exploit.

BNB Bridge (2022): $570M exploit before white-hat intervention limited damage.

Total Bridge Losses: Over $2 billion stolen from bridges in 2022 alone.

Attack Vectors

Validator Compromise: Attacker controls enough validators to authorize fake transactions.

Smart Contract Vulnerabilities: Bugs in bridge contracts enabling unauthorized minting or withdrawals.

Oracle Manipulation: If bridges rely on price oracles, manipulating them can trick the bridge.

51% Attacks: Attacking source chain to reorganize and double-spend bridge deposits.

Social Engineering: Phishing validators or operators to gain access.

Why Bridges Are Vulnerable

High Value Targets: Bridges hold billions in locked assets, making them attractive to hackers.

Complex Systems: More complex than single-chain protocols, more surface area for bugs.

Multi-Sig Weaknesses: Many bridges use multi-sig wallets that can be compromised.

Cross-Chain Verification: Harder to verify proof from another chain than verify single-chain state.

Bridge Design Trade-offs

Security vs Speed: More validators = more secure but slower

Decentralization vs UX: Trustless bridges more complex for users

Generalization vs Optimization: Universal bridges versus chain-specific optimized bridges

Capital Efficiency: Lock-mint requires locked capital, liquidity pools require deep pools

Wrapped Tokens

Bridges create wrapped tokens representing assets from other chains:

WBTC (Wrapped Bitcoin): ERC-20 Bitcoin on Ethereum

wETH: ETH on Polygon, Arbitrum, BNB Chain

WETH (Wrapped ETH on Ethereum): ETH in ERC-20 format for DeFi

Wrapped Tokens Risk: Only as secure as the bridge. If bridge fails, wrapped tokens may lose peg to underlying asset.

The Multi-Chain vs Cross-Chain Debate

Multi-Chain: Different ecosystems coexist, users choose preferred chains. Assets stay mostly within ecosystems.

Cross-Chain: Seamless interoperability, users don't think about which chain they're on.

Current Reality: Multi-chain with bridges providing imperfect cross-chain capabilities. Significant UX friction remains.

Alternative Solutions

Atomic Swaps

Direct peer-to-peer exchange between chains without bridge.

Advantages: No intermediary

Disadvantages: Requires both parties online simultaneously, limited adoption

Native Multi-Chain Tokens

Tokens exist natively on multiple chains.

Example: USDC issued by Circle on Ethereum, Polygon, Avalanche, Solana

Advantages: No bridge risk

Disadvantages: Requires issuer to support each chain

Chain Abstraction

Projects like Cosmos, Polkadot, LayerZero envision future where users don't know which chain they're using.

Vision: Applications span multiple chains seamlessly

Status: Still early, significant technical challenges

Bridge Aggregators

Services that route bridge transactions across multiple bridges for best price/speed:

Socket: Aggregates 10+ bridges

LI.FI: Routes across bridges and DEXs

Advantages: Better rates, single interface

Disadvantages: Adds complexity layer

The Future of Bridges

Trends:

Intent-Based Bridging: Describe desired outcome, solvers compete to fulfill

Shared Security: Bridges inherit security from underlying chains (IBC model)

ZK Bridges: Zero-knowledge proofs enable trustless verification

Modular Architecture: Separate messaging, settlement, validation layers

Institutional Bridges: Regulated, insured bridges for institutional users

Regulatory Clarity: Governments may regulate bridges as money transmitters

Career Opportunities

Bridge Protocol Engineer ($160k-$450k+): Builds cross-chain communication protocols, implements light clients, designs validator networks. Distributed systems expertise essential.

Bridge Security Researcher ($150k-$400k+): Audits bridge contracts, finds vulnerabilities, designs attack-resistant architectures. Critical given hack history.

Validator Operations ($80k-$180k): Runs bridge validator nodes, maintains uptime, monitors security.

Bridge Integration Engineer ($130k-$320k): Helps protocols integrate bridges, implements cross-chain features.

UX Designer ($90k-$180k): Simplifies bridge interfaces, abstracts complexity from users.

DevRel Engineer ($100k-$200k): Creates bridge documentation, educates developers, builds example integrations.

On-Chain Analyst ($90k-$180k): Monitors bridge volumes, tracks fund flows, analyzes cross-chain activity.

Bridges are critical but problematic infrastructure. They enable multi-chain ecosystem functionality but introduce massive security risks. The $2B+ in bridge hacks demonstrates that cross-chain security is unsolved. As crypto matures, better bridge designs, security practices, and potentially chain abstraction may reduce these risks. For now, users must carefully evaluate bridge trust assumptions and security records. Understanding bridge mechanics, risks, and trade-offs is essential for anyone moving assets across chains or evaluating cross-chain protocols. Bridges represent both crypto's multi-chain future and its most vulnerable infrastructure—an unsolved problem that billions of dollars depend on daily.

Find Bridge Jobs

Explore positions at companies working with Bridge technology

Browse open roles

Learn More

Read in-depth articles and guides about Web3 careers and technology

Explore the blog