Cross‑Chain Infrastructure

Crypto Bridges in 2026: How Cross-Chain Transfers Work, Best Options and How to Avoid Bridge Hacks

Understand how blockchain bridges move assets between chains, learn which bridges are safest in 2026, and avoid the mistakes that led to over $2.5B in bridge hacks.

Jump to section: How bridges work Lock‑and‑mint vs burn‑and‑mint Canonical vs third‑party Major hacks Safest bridges 2026 Retail tips FAQ

Loading...

The crypto ecosystem has grown from a single chain (Bitcoin) to over 100 active blockchains — Ethereum, Solana, Arbitrum, Optimism, Base, Avalanche, Polygon, and many more. But these chains operate like isolated islands. Cross-chain bridges are the infrastructure that connects them, allowing you to move assets like USDC, ETH, or BTC from one network to another. However, bridges have also become the single biggest target for hackers, accounting for over $2.5 billion in stolen funds since 2021. This guide explains exactly how bridges work, the security trade‑offs of different designs, the safest options in 2026, and how you can bridge without getting rekt.

$2.5B+
Total stolen from bridge hacks (2021–2025)
~70%
of all crypto hacks by value targeted bridges
5–30 min
Typical bridge transfer time (fast finality)

šŸŒ‰ What Are Crypto Bridges and Why Do We Need Them?

A blockchain bridge is a protocol that allows you to transfer assets from one blockchain to another. For example, moving USDC from Ethereum to Arbitrum, or moving ETH from Ethereum to BNB Chain. Without bridges, each chain is a silo — you cannot use Ethereum-based USDC directly on Solana. Bridges solve this by creating wrapped representations of assets on the destination chain.

Bridges are essential because different blockchains have different strengths: Ethereum has deep liquidity and security, Arbitrum and Optimism offer low fees, Solana has high throughput, and Bitcoin is the ultimate store of value. Bridges let you move capital to where it can earn the best yield or pay the lowest transaction fees. In 2026, over $15 billion in value is locked across various bridges, making them critical DeFi infrastructure.

Why not just use a centralised exchange?

You can deposit on one chain, trade for a native token, withdraw on another chain — but that requires KYC, exchange downtime, and withdrawal fees. Bridges are faster, non‑custodial (mostly), and integrate directly with DeFi protocols.

āš™ļø Core Mechanics: Lock‑and‑Mint vs Burn‑and‑Mint

Bridges use two primary models to move assets across chains. Understanding these is key to knowing where your funds go and what risks exist.

Lock‑and‑Mint (Liquidity Network Bridges)

In this model, you send your asset (e.g., 1 ETH) to a smart contract on the source chain. The contract locks the ETH. Then a validator or relayer confirms the lock, and a wrapped version of ETH (e.g., WETH or a bridge‑specific representation) is minted on the destination chain. When you want to move back, you burn the wrapped token on the destination, and the original ETH is unlocked on the source chain.

Examples: Polygon Bridge, Arbitrum Bridge, Optimism Bridge (canonical bridges).

Risk: The security depends on the validator set or multi‑sig that controls the minting function. If those validators are compromised, unlimited tokens can be minted.

Burn‑and‑Mint (Native to Native)

Some bridges burn the original asset on the source chain and mint an equivalent amount on the destination chain, usually with a canonical representation. This is similar to lock‑and‑mint but without a separate lock contract — the asset is destroyed and recreated. Used by some cross‑chain messaging protocols.

Liquidity Pools (Atomic Swaps / Stablecoin Bridges)

A newer, more secure model: instead of minting wrapped tokens, the bridge uses liquidity pools on both chains. For example, a user sends USDC on Ethereum into a pool, and the bridge uses a relayer to release USDC from a pool on Arbitrum. No wrapping, no minting. This is often called a liquidity bridge or AMM bridge (e.g., Across, Stargate, Hop).

Advantage: No centralised validator set that can mint unlimited tokens. The risk is limited to pool exploits or relayer misbehaviour.

Which model is safest?

Liquidity pool bridges (Across, Hop, Stargate) have no minting authority, so they cannot be exploited to create fake tokens. Canonical rollup bridges (Arbitrum, Optimism) inherit Ethereum's security but have centralised upgrade keys. Third‑party bridges with external validators (Wormhole, LayerZero) are more decentralised but have suffered hacks. Always check the bridge's security model before using.

šŸ›ļø Canonical Bridges vs Third‑Party Bridges

When moving assets to a Layer 2 (like Arbitrum or Optimism), you have two main types of bridges:

Canonical Bridges (Native Rollup Bridges)

These are the official bridges built by the rollup team. For example, the Arbitrum Bridge and Optimism Bridge are canonical. They are trust‑minimised because they inherit the security of the underlying Ethereum L1 — withdrawals are validated by Ethereum’s consensus. However, they are often slow (7‑day challenge period for withdrawals) and only support the native token (ETH) and a few major assets like USDC.

Third‑Party Bridges (External)

These are independent protocols that support many chains and assets. Examples: LayerZero, Wormhole, Across, Stargate, Hop, Connext. They offer faster transfers (minutes instead of days) and support many token types. The trade‑off: they rely on external validators, relayers, or liquidity providers, introducing additional trust assumptions.

For a deeper understanding of how Layer 2 networks compare, read our Layer 2 Ethereum comparison: Arbitrum vs Optimism vs Base vs zkSync.

šŸ”’ Security Trade‑offs: Trusted vs Trustless, Light Clients, ZK Bridges

Bridge security exists on a spectrum:

  • Trusted (multi‑sig): A small group of signers controls the bridge. Fast and cheap but centralised. Many hacked bridges (Ronin, Harmony) used 4/9 or 5/9 multisigs.
  • Validator networks (PoA): A set of external validators (e.g., Wormhole's 19 guardians) sign off on transfers. More decentralised but still requires trust in the validator set.
  • Light client bridges: A smart contract on the destination chain verifies consensus proofs from the source chain (e.g., IBC, Rainbow Bridge). Trustless but computationally expensive and slow.
  • ZK bridges (zero‑knowledge proofs): Use ZK‑SNARKs to prove that a transaction happened on the source chain. Highly secure and trustless, but still experimental. Examples: Succinct Bridge, Polymer.

For most retail users, liquidity pool bridges (Across, Hop) offer the best balance of speed, cost, and security because they avoid minting authority entirely.

šŸ’£ The Biggest Bridge Hacks and What They Teach Us

Bridges have been the most exploited sector in crypto. Here are the largest hacks and the lessons learned.

šŸ“Š Major Bridge Hacks (2021–2025)
BridgeAmount lostCauseYear
Ronin Bridge$625MCompromised 5/9 validator keys (Axie Infinity)2022
Wormhole$325MSignature verification vulnerability2022
Nomad Bridge$190MSmart contract initialisation bug allowed anyone to drain2022
Harmony Horizon$100MCompromised 2/4 multisig keys2022
Multichain$210MOperator key compromise + rogue withdrawals2023
Orbit Chain$81MSocial engineering + access control bypass2024

Key lessons: (1) Bridges with small multisigs are dangerously centralised. (2) Smart contract bugs can allow infinite minting. (3) Validator key management is critical — if keys are stored on centralised servers, they can be hacked. (4) Avoid bridges that have not been battle‑tested for at least 12 months.

To understand how to protect your wallet from other types of crypto scams, read our guide to crypto scams and how to avoid them.

šŸ›”ļø Safest Bridges in 2026 (Ranked by Security + Usability)

Based on security audits, track record, and decentralisation, these are the bridges you can trust for moving value in 2026.

1. Across Protocol (Liquidity Bridge, Intent‑Based)

Across uses a unique intent‑based model: users sign an "intent" to transfer, and relayers compete to fulfill it. No minting, no validator set. Backed by UMA’s optimistic oracle for dispute resolution. Across has processed over $10B with zero hacks. Best for moving USDC, ETH, and WBTC between Ethereum and L2s (Arbitrum, Optimism, Base, Polygon, ZKsync).

2. Stargate (Unified Liquidity Bridge)

Stargate is a fully composable liquidity bridge built on LayerZero. It uses a unified pool model (all assets in one pool per chain) and has a strong security record after a post‑launch vulnerability was quickly patched. Supports 15+ chains. Fees are competitive, and it’s integrated into most DeFi aggregators.

3. Hop Protocol (Rollup‑to‑Rollup)

Hop specialises in moving assets between Ethereum L2s (Arbitrum, Optimism, Base, Polygon, ZKsync, Linea). It uses liquidity pools and a bonding curve to ensure fast finality. No minting, no external validators. A solid choice for L2‑native users.

4. Wormhole (Validator Network)

Despite a $325M hack in 2022, Wormhole has since upgraded its security, implemented multiple audits, and introduced a guardian set of 19 reputable validators (Chorus One, Everstake, etc.). It supports 30+ chains including Solana, Ethereum, and all major L2s. For advanced users who understand the validator risk, Wormhole is reliable.

5. LayerZero (Omnichain Messaging)

LayerZero is not a bridge itself but a messaging layer that many bridges (Stargate, Rage Trade, etc.) build on. It uses a "Ultra Light Node" model with oracles and relayers. LayerZero has a strong security team and has not suffered a major exploit. It’s the infrastructure behind many of the safest bridges.

6. Chainlink CCIP (Cross‑Chain Interoperability Protocol)

Launched by Chainlink, CCIP is the most enterprise‑grade bridge, using Chainlink’s decentralised oracle network (DON) for message verification. It’s slower and more expensive but extremely secure. Ideal for large‑value institutional transfers. For retail, CCIP is available via some DeFi protocols but not as a direct user interface yet.

For a broader look at DeFi safety, check out our DeFi vs CeFi yield and safety comparison.

šŸ’° Fee Comparison Across Top Bridges (2026 Data)

Fees vary based on gas costs on source/destination chains and bridge protocol fees. Below are typical fees for transferring $1,000 USDC from Ethereum to Arbitrum (as of April 2026).

šŸ” Bridge Fee Comparison (Ethereum → Arbitrum, $1000 USDC)
BridgeTotal fee (gas + protocol)Transfer timeSecurity model
Across$2.50 – $4.001–3 minutesLiquidity pool + relayers
Stargate$3.00 – $5.002–5 minutesUnified liquidity pool
Hop$4.00 – $6.002–5 minutesLiquidity pool + bonding curve
Arbitrum Canonical$8.00 – $15.0010–20 minutes (deposit), 7 days (withdrawal)Rollup security
Wormhole$5.00 – $8.003–10 minutesValidator network

For moving between L2s (e.g., Arbitrum to Optimism), Across and Hop are often cheapest because they avoid expensive Ethereum L1 gas. Always check current fees on bridge aggregators like Li.Fi or Rango Exchange.

šŸ§‘ā€šŸ’» How to Avoid Bridge Hacks: A Retail User's Checklist

Even the safest bridges can have risks. Follow these steps every time you bridge:

  • Use only well‑known, battle‑tested bridges. Stick to Across, Stargate, Hop, or the canonical rollup bridges. Avoid new bridges with low TVL or no audit history.
  • Double‑check the URL. Phishing sites mimic bridge interfaces. Bookmark official links or use aggregators like Li.Fi that route through verified bridges.
  • Bridge small test amounts first. Send $10 worth of an asset to confirm the destination address and that the bridge is working.
  • Check for ongoing exploits before bridging. Follow @zachxbt, @rektnews, or check the bridge's status page. If a bridge was hacked recently, avoid it until patches are confirmed.
  • Prefer liquidity bridges over minting bridges. Across, Hop, and Stargate don’t mint wrapped tokens, so they have no infinite mint vulnerability.
  • Use bridge aggregators for best rates and security routing. Li.Fi, Rango, and Jumper automatically split and route through the safest bridges.
  • Don’t keep large amounts on a bridge contract. Bridge and then immediately move funds to your wallet or a DeFi protocol. Pending transactions can be front‑run or exploited if the bridge pauses.
Deep dive
MEV in Crypto 2026: How It Affects Every Transaction You Make

Learn how sandwich attacks and front‑running can affect your bridge transactions — and how to use private mempools to protect yourself.

ā“ Frequently Asked Questions About Crypto Bridges

Some are safe, others are risky. The safest are liquidity bridges (Across, Hop, Stargate) and canonical rollup bridges (Arbitrum, Optimism). Avoid bridges with small multisigs, unaudited code, or low TVL. Always check recent security news.
Canonical bridges are built by the rollup team (e.g., Arbitrum Bridge) and inherit Ethereum’s security. They are slow for withdrawals (7 days). Third‑party bridges are independent and faster, but add additional trust assumptions.
Across Protocol and Hop Protocol have never been hacked. Stargate had a non‑exploited vulnerability that was patched. Canonical rollup bridges (Arbitrum, Optimism) have not been hacked, but their centralised upgrade keys are a theoretical risk.
Liquidity bridges (Across, Hop) take 1–5 minutes. Validator bridges (Wormhole) take 3–10 minutes. Canonical rollup bridges take 10–20 minutes for deposits and up to 7 days for withdrawals to L1.
Yes, using bridges like Wormhole (wrapped BTC on Ethereum as WBTC) or tBTC. However, Bitcoin bridges are generally riskier because Bitcoin doesn’t natively support smart contracts. Use tBTC (Threshold) for a more decentralised option.
Immediately revoke any token approvals you gave to the bridge using Revoke.cash. If you have funds still in the bridge (pending), hope the team pauses the bridge. In most hacks, only funds in the bridge contract are stolen — not funds already bridged and in your wallet.