How Blockchain Bridges Work

A blockchain bridge moves assets between separate chains by locking tokens on one side and minting representations on the other. The mechanism is simple. The trust assumptions behind it explain why bridges have been the most exploited category in crypto.
Lewis Jackson
CEO and Founder

Every blockchain is a closed system. Ethereum doesn't know what's on Solana. Arbitrum can't read Polygon's state. This isn't a flaw — it's a direct consequence of how blockchains achieve consensus. Each chain maintains its own ledger, validated by its own nodes, according to its own rules.

Bridges exist to solve the resulting problem: how do you move value between isolated systems that can't communicate natively?

The answer is more architecturally interesting than most explanations make it, and the trust assumptions baked into different bridge designs explain why bridges have been the most exploited category in crypto. More than $2 billion was lost to bridge exploits between 2021 and 2023. That number isn't a coincidence — it's a direct consequence of how the mechanism works.

The Core Mechanism: Lock-and-Mint

The most common bridge architecture is lock-and-mint. A user wants to move 1 ETH from Ethereum to Arbitrum. They send ETH to a bridge smart contract on Ethereum. The contract locks the ETH — it doesn't transfer anywhere, it becomes inaccessible within the Ethereum contract. An event is recorded: "1 ETH locked by address X, destined for Arbitrum."

Something then reads that event and communicates it to Arbitrum. On Arbitrum's side, a contract mints 1 wrapped ETH (WETH) to the user's address. The user now holds a token representing their locked position on the source chain.

To return: the user burns their Arbitrum WETH. The bridge contract destroys the token and signals Ethereum to unlock the original ETH. The user recovers what they deposited.

Clean in concept. The entire complication is in step two: how does the destination chain know something happened on the source chain?

The Trust Problem

Each chain is blind to the others. There's no native mechanism for Arbitrum to verify Ethereum state. Every bridge must solve this through some external layer — and each solution carries its own trust assumptions.

Trusted validators (multisig bridges): A set of validators monitors both chains. When they observe a lock event on the source chain, they sign a message confirming it, and the destination contract accepts that signature as proof. This is fast and cheap. The risk is obvious: if enough validators collude or get compromised, they can mint assets on the destination chain without anything being locked on the source. The Ronin bridge exploit worked exactly this way. Attackers gained control of 5 of 9 validator keys and minted $625 million worth of assets against nothing.

Optimistic bridges: These assume cross-chain messages are valid unless challenged. A relayer submits the message, a challenge window opens — typically 7 days for rollup-native bridges — and if no fraud proof is submitted, the message is accepted. This eliminates the validator trust assumption at the cost of withdrawal delay. Speed-oriented bridges like Hop and Across work around this by having liquidity providers front capital on the destination chain immediately, absorbing the wait in exchange for a fee.

Light client bridges: The destination chain contract cryptographically verifies the source chain's consensus state — no validators required, just cryptographic proof. This is the most trust-minimized approach but computationally expensive. ZK bridges use zero-knowledge proofs to compress and verify source chain state efficiently. This is where serious bridge infrastructure is heading.

Native/canonical bridges: For L2 rollups, there's a bridge built into the protocol itself. Arbitrum's canonical bridge uses Ethereum's own consensus to verify L2 state — Ethereum is the settlement layer, so no external validators are needed. Maximally secure. But it carries the 7-day optimistic withdrawal period for exiting back to Ethereum mainnet.

Why Bridges Get Exploited

The attack surface is large by design. A bridge requires at minimum: a smart contract on the source chain holding real value; a mechanism to communicate cross-chain (validators, oracles, relayers); and a contract on the destination chain that mints or releases assets. Any component can be attacked.

Validator key compromise got Ronin ($625M). Smart contract logic bugs got Wormhole — a missing validation check allowed an attacker to mint 120,000 WETH without depositing any ETH ($320M). Message verification errors got Nomad — a configuration bug allowed any user to spoof any message as valid, and once exploited by the first attacker, hundreds of copycats drained the bridge within hours ($190M).

The structural problem is this: a bridge's security ceiling is the weakest of its three components, but the value it holds equals the sum of everything bridged. That asymmetry makes bridges the highest-value targets in the ecosystem by a significant margin.

What's Changing

Two architectural shifts are worth tracking.

ZK bridges reduce trust assumptions by replacing validator sets with cryptographic proofs. The practical barrier has been computation time — generating a ZK proof verifying Ethereum's consensus was prohibitively slow until recently. Proving time has compressed significantly over the last two years, and production ZK bridge infrastructure is now in development. Succinct, Axiom, and others are building in this direction. If ZK bridges reach production at scale, the validator-compromise attack vector effectively disappears.

Intent-based bridging shifts the model from "bridge the asset" to "fulfill the intent." A user states: I have 1 ETH on Ethereum and want ETH equivalent on Arbitrum. Solvers compete to fulfill that immediately, fronting capital and settling cross-chain in the background. Across Protocol operates on this model. It doesn't solve the underlying bridge security problem — solvers still need settlement infrastructure — but it dramatically improves speed and pools liquidity rather than fragmenting it across individual pools.

Confirmation Signals

ZK bridge proving time compressing below 10 seconds for standard transactions would signal the architecture is approaching production viability. Intent-based protocols capturing the majority of high-value bridging volume would indicate solver competition is healthy. Canonical bridge adoption growing at the expense of third-party bridges would suggest users are choosing security over speed — a structural maturation of user behavior.

Invalidation

A successful exploit of a major ZK bridge implementation would be the most significant setback — it would suggest that the trust-minimized approach isn't yet production-ready and that the field's primary answer to the validator-compromise problem doesn't hold. Alternatively, if regulatory treatment of bridge operators as money transmitters forces centralization of the validator model, the architectural progress toward trust-minimized designs becomes temporarily irrelevant regardless of technical merit.

Timing

Now: Lock-and-mint bridges are operational at scale and handle substantial daily volume. The security record is mixed. If you need to bridge, canonical/native bridges for rollups carry the highest security at the cost of the 7-day withdrawal delay. Third-party bridges offer speed but carry validator and contract risk.

Next (2026): ZK bridge infrastructure reaching production grade is the most consequential architectural development to watch. Proving time is the key variable.

Later: Applications abstracting the bridge layer entirely — where cross-chain is invisible to the user — is a plausible direction but early. Worth knowing exists, not worth acting on yet.

This covers the mechanism. It doesn't address which bridges to use for specific chains, nor does it imply that bridged assets carry the same security guarantees as native assets on their home chain — they don't. A wrapped token is a claim on locked collateral, and that claim is only as strong as the bridge holding it. The tracked signals and risk metrics live elsewhere.

Related Posts

See All
Crypto Research
New XRP-Focused Research Defining the “Velocity Threshold” for Global Settlement and Liquidity
A lot of people looking at my recent research have asked the same question: “Surely Ripple already understands all of this. So what does that mean for XRP?” That question is completely valid — and it turns out it’s the right question to ask. This research breaks down why XRP is unlikely to be the internal settlement asset of CBDC shared ledgers or unified bank platforms, and why that doesn’t mean XRP is irrelevant. Instead, it explains where XRP realistically fits in the system banks are actually building: at the seams, where different rulebooks, platforms, and networks still need to connect. Using liquidity math, system design, and real-world settlement mechanics, this piece explains: why most value settles inside venues, not through bridges why XRP’s role is narrower but more precise than most narratives suggest how velocity (refresh interval) determines whether XRP creates scarcity or just throughput and why Ripple’s strategy makes more sense once you stop assuming XRP must be “the core of everything” This isn’t a bullish or bearish take — it’s a structural one. If you want to understand XRP beyond hype and price targets, this is the question you need to grapple with.
Read Now
Crypto Research
The Jackson Liquidity Framework - Announcement
Lewis Jackson Ventures announces the release of the Jackson Liquidity Framework — the first quantitative, regulator-aligned model for liquidity sizing in AMM-based settlement systems, CBDC corridors, and tokenised financial infrastructures. Developed using advanced stochastic simulations and grounded in Basel III and PFMI principles, the framework provides a missing methodology for determining how much liquidity prefunded AMM pools actually require under real-world flow conditions.
Read Now
Crypto Research
Banks, Stablecoins, and Tokenized Assets
In Episode 011 of The Macro, crypto analyst Lewis Jackson unpacks a pivotal week in global finance — one marked by record growth in tokenized assets, expanding stablecoin adoption across emerging markets, and major institutions deepening their blockchain commitments. This research brief summarises Jackson’s key findings, from tokenized deposits to institutional RWA chains and AI-driven compliance, and explains how these developments signal a maturing, multi-rail settlement architecture spanning Ethereum, XRPL, stablecoin networks, and new interoperability layers.Taken together, this episode marks a structural shift toward programmable finance, instant settlement, and tokenized real-world assets at global scale.
Read Now

Related Posts

See All
No items found.
Lewsletter

Weekly notes on what I’m seeing

A personal letter I send straight to your inbox —reflections on crypto, wealth, time and life.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.