Blockchain bridges enable decentralized finance (DeFi) users to utilize the exact same tokens throughout numerous blockchains. For example, a trader can utilize USD Coin (USDC) on the Ethereum or Solana blockchains to engage with the decentralized applications (DApps) on those networks.
While these procedures might be hassle-free for DeFi users, they are at threat of exploitation by destructive stars. For example, in the previous year, the Wormhole bridge — a popular cross-chain crypto bridge in between Solana, Ethereum, Avalanche and others — was hacked, with enemies taking over $321 million worth of covered Ethereum (wETH), the biggest hack in DeFi history at the time.

Just over a month later on, on March 23, 2022, the Ronin Network bridge — Axie Infinity’s Ethereum-based sidechain — was hacked for over $620 million, and on Aug. 2, the Nomad bridge was hacked for over $190 million. In overall, over $2.5 billion was taken from cross-chain bridges in between 2020 and 2022.
Trustless bridges, referred to as noncustodial or decentralized bridges, might enhance users’ security of cross-chain transfers.
What is a blockchain bridge?
A cross-chain bridge is an innovation that enables sending out of properties or information from one blockchain network to another. These bridges enable 2 or more different blockchain networks to speak to each other and share info. The interoperability supplied by cross-chain bridges makes it possible to move properties from one network to another.
Recent: SEC vs. Kraken: A one-off or opening salvo in an attack on crypto?
Most bridging innovations utilize smart agreements on both blockchains to make cross-chain deals possible.
Cross-chain bridges can move lots of properties, such as cryptocurrencies, digital tokens and other information. Using these bridges makes it much easier for various blockchain networks to collaborate and for users to benefit from each network’s special functions and advantages.
Trusted bridges vs. Trustless bridges
When it concerns bridging procedures, there are 2 primary types, centralized (relied on) bridges and decentralized (trustless) bridges. Trusted bridges are handled by central entities that take custody of the tokens once they are moved to the bridge. A significant threat with custodial bridges is the single point of failure (the centralized custodian), that makes it a much easier target for hacking efforts.
Instead of utilizing central custodians to move tokens throughout blockchains, trustless bridges usage smart agreements to finish the procedure.

Smart agreements are automated programs performing specific actions once the conditions are fulfilled. Due to this, trustless bridges are viewed as a much safer option because each user preserves custody of their tokens throughout the transfer procedure.
However, trustless bridges can still be jeopardized if the smart contract code has actually vulnerabilities not recognized and repaired by the advancement group.
Pascal Berrang, blockchain scientist and core designer at Nimiq, a blockchain-based payment procedure, informed Cointelegraph, “In general, the use of cross-chain bridges introduces additional risks over the use of a single blockchain.”
“It increases the attack surface through blockchains, potential custodians and smart contracts. There are various types of cross-chain bridges, which come with different trade-offs in terms of these risks.” He continued:
“Cross-chain bridges naturally involve two or more blockchains, typically using distinct security mechanisms. Hence, the security of bridged assets depends on the weakest blockchain involved in the bridge. For example, if one of the blockchains is attacked, it would make it possible to revert a cross-chain swap on one of the chains but not on the other – resulting in an imbalance of assets.”
Berrang likewise worried the vulnerabilities linked to the bridged properties being locked into the bridge. “Funds are usually stored or locked in a central place, constituting a single failure point. Depending on the type of the bridge, these funds are subject to different risks: In a smart-contract-based bridge, bugs in those contracts can make bridged assets worthless,” Berrang stated.
“An example could be a bug that allows infinite minting of new bridged tokens. Bridges that trusted custodians operate are subject to counterparty risks if the custodians misbehave or their keys are stolen,” he included.
Jeremy Musighi, head of development at Balancer, an automatic market maker, thinks that extra dangers depend on the intricacy of blockchain bridges, informing Cointelegraph that “Cross-chain bridges come with several significant risks. Security is one of the biggest risks; due to the complexity and difficulty of implementing cross-chain bridges, they’re prone to errors and vulnerabilities that malicious actors can exploit to steal assets or perform other malicious actions.”
Musighi likewise kept in mind that scalability problems present additional dangers for the bridging procedure, specifying, “Another risk is scalability, as cross-chain bridges may not be able to handle large amounts of traffic, leading to delays and increased costs for users.”
Protecting bridges versus exploits
Developers can avoid cross-chain bridges from being hacked by carrying out numerous security steps that help make sure the moved properties’ privacy, stability and credibility.
One of the most crucial steps is to make sure that the smart contract code that forms the core of cross-chain bridges is safe and secure and devoid of vulnerabilities. This can be attained through routine security audits, bug bounty programs and code evaluations, which help recognize and repair possible security problems.
Another procedure designers can take is utilizing cryptographic algorithms, such as digital signatures and hash functions, to protect the transfer of properties and info in between various blockchain networks. This assists to make sure that the moved properties are secured which any destructive stars cannot interfere with the transfer procedure.
Moreover, routine network tracking is important to discover suspicious activity and avoid attacks. By keeping an eye on the network, designers can discover any security problems and take suitable action to solve them prior to they trigger any damage.
Finally, establishing and releasing safe and secure cross-chain bridges needs following finest practices, such as safe and secure coding practices, screening and debugging, and safe and secure implementation techniques. In doing so, designers can help make sure cross-chain bridges’ security and stability.
Preventing cross-chain bridges from being hacked needs a mix of safe and secure code, cryptographic algorithms, robust agreement systems, network tracking and following finest practices.
Are trustless bridges a much better service?
Trustless bridges can supply a much safer service for bridging properties throughout blockchains just if the smart contract code has actually been completely examined to make sure no vulnerabilities exist.
The primary security advantage of trustless bridges is that users keep custody of their tokens throughout the entire procedure, with smart agreements looking after the transfer procedure. Additionally, the absence of a main authority to secure the tokens makes the bridges more difficult to assault because there is no single point of failure.
Recent: Binance banking issues highlight a divide in between crypto companies and banks
Musighi informed Cointelegraph, “I generally consider trustless bridges to be safer than trusted bridges since they operate transparently and rely on a decentralized network to validate and facilitate the transfer of assets between chains, whereas trusted bridges rely on a centralized third party, which means there is a single point of failure and a concentrated attack surface for hackers to target.”
“Trustless bridges are easier to audit and come with the clear benefit of trust minimization. Since many centralized bridges also leverage (simpler) smart contracts, trustless bridges can be considered a less risky but not risk-free option,” Berrang stated.
As the decentralized finance area grows, designers should take extra steps towards protecting cross-chain bridges. However, as crypto users end up being more thinking about self-custody and decentralization, trustless bridges might grow in appeal.