You deploy a token on Arbitrum, list it on a DEX, and watch liquidity grow. Then your community asks for a Base deployment. And Optimism. And Solana. Suddenly you are managing four separate token contracts, four liquidity pools, and users are asking why they cannot move tokens between chains without losing 2% to slippage on a wrapped asset nobody trusts.
This is the multi-chain fragmentation problem. With 159+ Ethereum rollups, 30+ Optimism Superchain networks, and 120+ IBC blockchains in production, assets and users are scattered across dozens of isolated environments. Blockchains cannot natively read each other's state - Ethereum has no idea what is happening on Solana, and Arbitrum cannot verify a transaction on Polygon.
Cross-chain bridges solve this. They connect isolated blockchains, enabling asset transfers, data passing, and cross-chain smart contract calls. Bridge volume hit $17.3 billion in May 2025 - up 30% month-over-month and 10x from January 2023 lows. Understanding how bridges work, where they fail, and which one fits your use case is essential for developers building multi-chain applications.
How Cross-Chain Bridges Work
Every bridge addresses the same fundamental problem: verifying that something happened on Chain A so Chain B can act on it. The mechanisms differ in how they achieve this verification and what trade-offs they accept.
Lock-and-Mint
The original bridging mechanism. A user locks tokens in a smart contract on the source chain. The bridge verifies the lock event and mints equivalent wrapped tokens on the destination chain. WBTC is the canonical example - Bitcoin locked by a custodian, ERC-20 tokens minted on Ethereum.
The risk is straightforward: wrapped tokens are only as secure as the bridge's custody mechanism. A compromised bridge means stolen locked tokens and worthless wrapped tokens. This is exactly what happened in the Ronin and Wormhole exploits.
Burn-and-Mint
A cleaner model that eliminates wrapped token risk. Tokens are burned on the source chain and native equivalents are minted on the destination. Circle's CCTP (Cross-Chain Transfer Protocol) uses this approach for USDC - when you bridge USDC from Ethereum to Arbitrum via CCTP, the Ethereum USDC is burned and native USDC is minted on Arbitrum. No wrapped asset, no third-party custody risk.
CCTP V2, launched in 2025, adds Fast Transfer for reduced settlement times and Hooks for automated post-transfer contract calls - letting developers trigger actions on the destination chain the moment funds arrive.
Liquidity Pools
Pre-funded pools on both chains enable instant transfers without waiting for cross-chain verification. Users deposit into a pool on the source chain and withdraw from a corresponding pool on the destination.
Stargate pioneered unified cross-chain liquidity with its "Delta algorithm" - instead of fragmenting liquidity into separate pools per route, all liquidity is shared across chains. The result: a 0.06% flat fee, sub-second settlement, and deeper liquidity than route-fragmented alternatives. Stargate's "Bus" feature batches multiple transfers into a single LayerZero message, cutting gas costs by 90%+.
Atomic Swaps (HTLC)
Hash Time-Locked Contracts (HTLCs) enable trustless peer-to-peer swaps without any intermediary. Alice generates a secret, both parties lock funds with a hash lock and a time lock. If Alice reveals the secret within the time window, both locks release. If she does not, both parties get their funds back.
This is the most trust-minimized mechanism - either both sides execute or neither does. The trade-off is practical: both chains must support HTLCs, coordination is manual, and settlement is slower than pool-based or intent-based alternatives. HTLCs suit high-value bilateral transfers but scale poorly for general-purpose bridging.
Bridge Architecture Types
The transfer mechanism matters, but the trust model determines security. Bridge architectures sit on a spectrum from fully trusted to cryptographically verified.
Trusted (Centralized) Bridges
A small validator set - typically a 3-of-5 or 5-of-9 multisig - attests to cross-chain events. Fast and simple to implement, but the validator set is a single point of failure.
This architecture produced the largest bridge exploits in Web3 history. Early Multichain relied on a custodial model where the CEO controlled private keys, leading to a $130 million loss. Harmony's Horizon bridge used a 2-of-5 multisig that was compromised for $100 million. When a handful of keys control billions in locked assets, the attack surface is obvious.
Optimistic Bridges
Messages are assumed valid unless proven fraudulent within a challenge period. Watchers monitor cross-chain messages and submit fraud proofs if they detect invalid claims, with a security window of typically 30+ minutes.
Across Protocol uses the UMA Optimistic Oracle with a 60-minute dataworker aggregation window. Relayers front capital to users immediately, absorbing finality risk, while settlement happens optimistically in the background. Across V4 adds ZK-proven settlement via Succinct zkVM - a hybrid model combining optimistic speed with cryptographic verification.
ZK-Verified Bridges
Validity proofs (ZK-SNARKs or ZK-STARKs) cryptographically verify cross-chain state without trusting any external validator set. A ZK proof on Chain B mathematically confirms that an event occurred on Chain A. No multisig, no challenge period, no trust assumptions beyond cryptography.
Berkeley RDI's zkBridge paper demonstrated the feasibility of this approach. ZK-verified bridges offer the highest security guarantees but proof generation remains computationally expensive. As proving costs decline and ZK infrastructure matures, this architecture is growing rapidly.
Canonical (Native) Bridges
Built directly into Layer 2 rollup protocols, canonical bridges like Arbitrum Bridge, Optimism Gateway, and Base Bridge are secured by Ethereum L1 consensus - the highest trust level available. No additional validator set, no external oracle.
The trade-off is speed and flexibility. Optimistic rollup withdrawals require a 7-day challenge period, and canonical bridges only support transfers between L1 and their specific L2. Moving from Arbitrum to Optimism via canonical bridges means a 7-day withdrawal to Ethereum followed by a deposit to Optimism.
For detailed L2 provider comparisons, see Best Arbitrum RPC Providers and Top Optimism RPC Providers.
Message-Passing Protocols
The most general architecture. Rather than transferring tokens alone, message-passing protocols enable arbitrary cross-chain communication - governance votes, NFT transfers, smart contract calls, and any data that can be encoded in a message.
Four protocols dominate this space:
- LayerZero: Configurable DVN (Decentralized Verifier Network) architecture across 150 chains with $50B+ in transfer volume and 140M+ messages delivered.
- Wormhole: 19 Guardian validators using a 13-of-19 multisig for Verifiable Action Approvals (VAA) across 40+ chains with $70B+ cumulative volume.
- Hyperlane: Permissionless ISM (Interchain Security Module) that lets any chain deploy cross-chain messaging without permission from the protocol.
- Axelar: Cosmos SDK-based PoS chain acting as a hub-and-spoke relay across 70+ chains via Gateway Contracts.
Top Cross-Chain Bridges Compared
With the architectural foundations covered, here is how the leading protocols compare in practice. This section focuses on bridges most relevant to developers building multi-chain applications today.
Comparison Table
| Bridge | Type | Chains | Speed | Fee | Trust Model | Volume |
|---|---|---|---|---|---|---|
| LayerZero | Message passing | 150 | Varies by DVN | Gas only | Configurable DVNs | $50B+ |
| Wormhole | Message passing | 40+ | Minutes | Gas + protocol | 13/19 Guardian PoA | $70B+ cumulative |
| Across | Intent-based | 20 | ~2 seconds | 0.06-0.12% | Optimistic + UMA Oracle | $1.3B/30d |
| Stargate | Liquidity pool | 80+ | Sub-second | 0.06% | LayerZero DVNs | $4B/month |
| CCTP | Burn-and-mint | 10+ | Minutes | Gas only | Circle attestation | N/A |
| Canonical | Native rollup | 2 (L1+L2) | 7 days (withdraw) | Gas only | Ethereum consensus | N/A |
| Li.Fi | Aggregator | 30+ | Varies | Varies | Depends on route | $30B+ cumulative |
LayerZero
LayerZero's architecture centers on its DVN (Decentralized Verifier Network) model. Applications configure their own security stack by selecting required and optional DVNs for each cross-chain route - a departure from monolithic bridge security where one validator set covers all traffic.
The DVN operator set includes 35 operators such as Google Cloud and Deutsche Telekom. The CryptoEconomic DVN Framework, built on EigenLayer, adds slashable stake to the verification process, meaning DVN operators risk real capital if they sign invalid messages.
LayerZero's OFT (Omnichain Fungible Token) Standard enables burn-and-mint token deployments across all 150 supported chains without liquidity fragmentation. The 2025 acquisition of Stargate for $110-120 million integrates unified liquidity pools directly into LayerZero's messaging stack.
Wormhole
Wormhole operates a Guardian network of 19 validators that observe and attest to cross-chain events. A 13-of-19 multisig produces Verifiable Action Approvals (VAA) - signed messages that destination chains verify before executing.
The NTT (Native Token Transfers) standard supports 100+ tokens representing $170 billion in market capitalization. Wormhole's enterprise focus and institutional adoption make it a strong choice for projects prioritizing proven volume ($70B+ cumulative, $17.6B in 2025 alone).
Wormhole recovered from a $320 million exploit in February 2022 where a deprecated function allowed an attacker to bypass signature verification and mint 120,000 wETH in 36 minutes. Jump Crypto restored the funds, security measures were overhauled, and the incident remains a key case study in bridge vulnerability and recovery.
Across Protocol
Across takes an intent-based approach with a 3-layer architecture: an RFQ (Request for Quote) mechanism, a relayer network, and a settlement layer. Users express transfer intent, relayers compete to fill orders by fronting capital on the destination chain, and settlement happens asynchronously.
The result: a 2-second median fill time, among the fastest in the bridge ecosystem. Relayers absorb finality risk, so users receive funds before cross-chain verification completes. The UMA Optimistic Oracle handles settlement, with V4 adding ZK settlement via Succinct zkVM.
Across co-developed ERC-7683 (the cross-chain intent standard) with Uniswap Labs. This specification standardizes how cross-chain intents are expressed, enabling any compatible filler to execute orders across any participating bridge.
Stargate
Now owned by LayerZero, Stargate provides unified liquidity pools via its Delta algorithm. Rather than maintaining separate pools for each source-destination pair (which fragments liquidity), Stargate pools liquidity across all connected chains.
The numbers: 80+ chains, $345 million TVL, $4 billion monthly volume (as of July 2025). A flat 0.06% fee and sub-second finality make Stargate a strong default for applications prioritizing speed and cost on standard token transfers. The "Hydra" mechanism extends liquidity to new chains without separate pool bootstrapping, and supported assets include native USDC, USDT, ETH, and BTC.
Circle CCTP
For USDC-specific transfers, CCTP is the most trust-minimized option. Circle directly controls the burn-and-mint process - no wrapped tokens, no third-party bridge risk. CCTP is deployed on Ethereum, Arbitrum, Optimism, Base, Polygon, Avalanche, and Solana.
V2 adds Fast Transfer and Hooks. CCTP V1 deprecation is scheduled for July 31, 2026, so new integrations should target V2.
Bridge Aggregators (Li.Fi and Socket)
If choosing a single bridge feels limiting, aggregators route through 100+ bridges and DEXes to find the optimal path. Li.Fi has 600+ integration partners and $30B+ in cumulative volume, with integration available via a JS/TS SDK or embeddable widget.
Aggregators abstract bridge selection entirely. You specify source chain, destination chain, token, and amount. The aggregator handles routing through the cheapest, fastest, or most secure path depending on your priority.
Bridge Security: Lessons from $2.8 Billion in Exploits
Bridge exploits account for approximately 40% of all Web3 security incidents, with over $2.8 billion lost since 2022. Understanding how these attacks happened is essential for evaluating bridge security today.
Major Bridge Exploits
Ronin Bridge - $625 million (March 2022): The Lazarus Group compromised 5 of 9 validator keys via spear phishing. The breach went undetected for 6 days due to the absence of active transaction monitoring. A social engineering attack on a small validator set with no alerting.
Wormhole - $320 million (February 2022): A deprecated load_instruction_at function failed to verify the sysvar account. An attacker passed a fake sysvar, bypassed signature verification, and minted 120,000 wETH in 36 minutes. A code-level vulnerability in an unaudited deprecated function.
Nomad Bridge - $190 million (August 2022): A routine upgrade set bytes32(0) as a trusted root, meaning any message with an unrecognized hash passed verification. This became a "crowdsourced hack" - once the first attacker demonstrated the exploit, anyone could copy the transaction and change only the recipient address.
Multichain - $130 million (July 2023): The CEO's private keys were breached. A single individual controlled access to locked funds with no multisig, no distributed key management, and no governance safeguards.
Harmony Horizon - $100 million (June 2022): A 2-of-5 multisig was compromised. Two keys were sufficient to drain the bridge - the threshold was too low for the value at stake.
Common Attack Vectors
These exploits reveal recurring patterns:
- Insecure private key management - Validator keys stored without hardware security modules, compromised via phishing (Ronin, Multichain)
- Unaudited smart contract code - Deprecated or edge-case functions with exploitable logic (Wormhole)
- Unsafe upgrade processes - Deployments that invalidate security invariants (Nomad)
- Insufficient validator decentralization - Low multisig thresholds or concentrated key holders (Harmony)
- No active transaction monitoring - Exploits running for hours or days without detection (Ronin - 6-day detection gap)
- Missing rate limits - No caps on withdrawal amounts or velocity to contain damage during an exploit
Security Evaluation Framework
When evaluating a bridge for production use, assess these dimensions systematically:
- Validator decentralization: How many independent validators? What is their geographic and organizational distribution?
- Verification mechanism: Ranked by trust minimization - multisig < optimistic with fraud proofs < ZK light client verification
- Audit history: When was the last audit? By whom? Were findings addressed?
- Bug bounty program: What is the maximum payout? Active programs attract white-hat researchers before black-hat attackers find vulnerabilities
- Rate limiting: Does the bridge cap withdrawal amounts or velocity? Rate limits contain damage during exploits.
- Emergency pause capability: Can the protocol halt operations if anomalous activity is detected?
- Upgrade security: Are upgrades behind timelocks? Multi-sig governed? Subject to community veto?
- Track record: Years of operation, total volume processed without incident
Developer Integration Patterns
Evaluating security is one thing - integrating a bridge is another. The right integration pattern depends on your use case. Here are three primary approaches and the infrastructure requirements behind them.
Path 1: Bridge SDK (LayerZero OFT Example)
For deploying a cross-chain token using LayerZero's OFT Standard:
# Scaffold a new LayerZero OApp projectnpx create-lz-oapp@latest
Deploy an OFT contract that inherits both ERC-20 and OApp functionality. Configure the DVN Security Stack per route - selecting which verifiers must attest to messages on each chain pair. Initiate transfers by calling send() on the source chain OFT contract.
This pattern suits token issuers who want native cross-chain transfers without liquidity fragmentation. The trade-off is deployment complexity - you manage contracts on every target chain.
Path 2: Bridge Aggregator API (Li.Fi Example)
For routing through the optimal bridge without choosing one directly:
// Get a quote for cross-chain transfer via Li.Ficonst quote = await LiFi.getQuote({fromChain: 'ARB',toChain: 'OPT',fromToken: 'USDC',toToken: 'USDC',fromAmount: '1000000' // 1 USDC (6 decimals)});// Execute the best routeawait LiFi.executeRoute(signer, quote.routes[0]);
This pattern suits applications that need bridging as a feature - wallets, DeFi aggregators, portfolio managers - rather than as core infrastructure. A few API calls replace months of bridge protocol research.
Path 3: Intent Standard (ERC-7683)
The emerging standard for intent-based bridging. Users sign a GaslessCrossChainOrder off-chain specifying the desired outcome (token, amount, destination chain). Fillers compete to execute the order on the destination chain, fronting capital for the fastest settlement.
This pattern suits protocols building cross-chain user experiences where the user should not need to know or care which bridge executes their transfer.
Monitoring Bridge Events with RPC
Regardless of which bridge you integrate, monitoring cross-chain transactions requires reliable RPC access on both source and destination chains. Bridge contracts emit events (DepositInitiated, TokensLocked, MessageSent) that your application needs to track in real time.
// Monitor Across Protocol SpokePool deposits on Arbitrumconst SPOKE_POOL = "0xe35e9842fceaCA96570B734083f4a58e8F7C5f2A";const DEPOSIT_TOPIC = "0x..."; // V3FundsDeposited event signatureconst logs = await provider.send("eth_getLogs", [{address: SPOKE_POOL,topics: [DEPOSIT_TOPIC],fromBlock: "0x" + startBlock.toString(16),toBlock: "latest"}]);// Process each deposit eventfor (const log of logs) {const decoded = decodeDepositEvent(log);console.log(`Deposit: ${decoded.amount} to chain ${decoded.destinationChainId}`);}
For real-time monitoring, WebSocket subscriptions are preferred over polling:
// Subscribe to bridge events via WebSocketconst ws = new WebSocket("wss://your-rpc-endpoint");ws.send(JSON.stringify({jsonrpc: "2.0",method: "eth_subscribe",params: ["logs", {address: SPOKE_POOL,topics: [DEPOSIT_TOPIC]}],id: 1}));ws.on("message", (data) => {const event = JSON.parse(data);// Handle bridge deposit event in real-time});
Two critical infrastructure considerations for bridge monitoring:
Block range limits on eth_getLogs: Public RPCs and many providers reject eth_getLogs queries spanning more than 2,000 to 5,000 blocks. Bridge monitoring often requires scanning larger ranges, especially when catching up after downtime. Dwellir provides eth_getLogs support without block range restrictions - useful for bridge event indexing at scale. See Dwellir's Ethereum RPC documentation for endpoint details.
Chain reorg handling: Finality times vary across chains, so a bridge event confirmed on the source chain may be reorganized before reaching true finality. Build configurable block delays into your monitoring logic:
| Chain | Finality Time | Recommended Confirmations |
|---|---|---|
| Ethereum | ~12.8 minutes (cryptographic) | 64 blocks |
| Arbitrum / Optimism | Soft confirmation ~1s, L1 finality 20-30 min | 100+ blocks for high value |
| Solana | ~400ms (deterministic) | 32 slots |
| Avalanche | ~2 seconds | 1 block (instant finality) |
Infrastructure Requirements for Bridge Operations
With integration patterns established, the underlying infrastructure becomes the next consideration. Cross-chain bridges are among the heaviest RPC consumers in the Web3 ecosystem. A bridge relayer needs endpoints on every chain it supports, and monitoring systems need multi-chain RPC access with specific capabilities.
What Bridge Infrastructure Demands
Multi-chain coverage: A relayer operating on 10 chains needs 10 reliable RPC endpoints. Bridge aggregators routing across 30+ chains need even more. Managing multiple RPC vendors - each with different pricing models, rate limits, and API quirks - adds operational complexity that compounds with every new chain.
Real-time event subscriptions: Bridge relayers and monitoring systems need WebSocket connections for instant event detection. Polling introduces latency that costs relayers money and users patience.
Archive access for verification: Bridge protocols performing historical state verification, proof generation, or dispute resolution require archive node access. Optimistic bridges in particular need historical state to validate or challenge claims.
High-volume, cost-predictable pricing: A bridge relayer making 500 million requests per month across 10 chains needs pricing that scales predictably. Compute unit multipliers on debug_traceTransaction or eth_getLogs create unpredictable costs at bridge-scale volumes.
Dwellir's 150+ network coverage provides RPC for both source and destination chains from a single provider. At $1.96 per million requests on the Scale plan - with no compute unit multipliers on trace, debug, or archive methods - costs stay predictable at bridge-scale volumes, compared to $12-20 per million calls at providers using compute unit multipliers on heavy methods.
For teams evaluating multi-chain RPC costs, see Dwellir's pricing.
Choosing the Right Bridge: Decision Framework
There is no universal "best" bridge - the right choice depends on what you are building. Use this framework to map your requirements to the right protocol.
By Transfer Type
USDC transfers: Use CCTP. Native burn-and-mint eliminates wrapped token risk entirely. No bridge custody, no third-party validators for the USDC transfer itself.
Other standard token transfers: Use Stargate for speed (sub-second, 0.06% fee) or canonical rollup bridges when maximum security matters more than speed (L2-to-L1 withdrawals).
Custom token launches: Use LayerZero OFT Standard for burn-and-mint token deployment across 150 chains without liquidity fragmentation.
By Application Type
Cross-chain messaging (governance, NFTs, arbitrary contract calls): LayerZero for maximum chain coverage and configurable security. Wormhole for enterprise-grade institutional deployments. Hyperlane for permissionless deployment to any chain.
Aggregated routing (wallets, DeFi front ends): Li.Fi or Socket for optimal path routing across 100+ bridges and DEXes via a single API.
Maximum security (high-value transfers, institutional): Canonical rollup bridges (secured by Ethereum consensus) or ZK-verified bridges for cryptographic verification without trusted validator sets.
By Priority
| Priority | Recommended Bridge | Why |
|---|---|---|
| Speed | Across (~2s) or Stargate (sub-second) | Intent-based and pool-based settlement |
| Security | Canonical bridges or ZK-verified | Ethereum consensus or cryptographic proof |
| Chain coverage | LayerZero (150 chains) | Broadest network support |
| Cost | CCTP or Stargate (0.06%) | Gas-only or minimal flat fees |
| Simplicity | Li.Fi aggregator | Single API, optimal routing |
| USDC specifically | CCTP | Native burn-and-mint, no wrapped tokens |
The Future of Cross-Chain Infrastructure
Beyond today's bridge protocols, the landscape is evolving toward abstractions that make multi-chain complexity invisible to end users.
Chain Abstraction
The goal: users interact with applications without knowing or caring which chain they are on. EIP-7702 and protocols like Particle Network's Universal Accounts (558% quarter-over-quarter growth in Q1 2025) are building toward a future where chain selection is an implementation detail, not a user decision.
Intent-Based Bridging
ERC-7683 and the Open Intents Framework (backed by 30+ teams including Arbitrum, Optimism, Polygon, and zkSync) standardize how users express cross-chain outcomes. Users specify "I want 1,000 USDC on Optimism" and the infrastructure figures out the rest - no manual bridge, chain, or route selection required.
ZK Light Clients
The most trust-minimized verification approach. ZK light clients cryptographically prove cross-chain state without any trusted validator set. As proving costs decrease, this architecture will replace many of today's multisig and optimistic verification models.
Shared Sequencers
Shared sequencing environments enable atomic cross-chain transactions - operations that execute on multiple chains simultaneously or not at all. For chains within the same sequencing domain, this eliminates the fundamental bridge problem of asynchronous verification entirely.
Conclusion
Cross-chain bridges are critical infrastructure for a multi-chain ecosystem. The choice between lock-and-mint, burn-and-mint, liquidity pools, and intent-based architectures directly affects security, speed, cost, and user experience.
Three key takeaways:
Security is the primary differentiator. With $2.8 billion lost to bridge exploits since 2022, trust model evaluation is non-negotiable. Prefer ZK-verified or canonical bridges for high-value transfers. Evaluate multisig threshold, validator decentralization, audit history, and monitoring capabilities before committing to any bridge.
Match the bridge to the use case. CCTP for USDC. Stargate or Across for fast token transfers. LayerZero or Wormhole for general cross-chain messaging. Li.Fi for aggregated routing. Canonical bridges for maximum L1 security.
Infrastructure underpins everything. Bridge relayers, monitoring systems, and cross-chain applications depend on reliable, multi-chain RPC access. Block range restrictions, missing WebSocket support, or unpredictable pricing on heavy methods like eth_getLogs and debug_traceTransaction create operational problems that compound across every chain you support.
Dwellir provides RPC endpoints across 150+ networks with transparent 1:1 pricing, full eth_getLogs support, WebSocket subscriptions, and archive access without compute unit multipliers. For bridge developers managing multi-chain infrastructure, that translates to predictable costs at $1.96 per million requests across every supported chain.
- Try it out: Create a free account (100,000 requests/day)
- Multi-chain pricing: View plans from $49/month for 25M credits
- Dedicated bridge infrastructure: Contact the Dwellir team for dedicated clusters and custom configurations
- Related reading: State of DeFi 2026 | Best Arbitrum RPC Providers | Top Optimism RPC Providers
