โ ๏ธ Security Models: Trusted vs Trustless
Compare bridge security trade-offs and attack vectors
Transfer assets between different blockchains
Your Progress
0 / 5 completedโ ๏ธ Bridge Security Risks
Bridges are the most attacked DeFi infrastructure. Over $2.5 billion stolen from bridges in 2022 aloneโmore than all other DeFi hacks combined. Why? They're high-value targets (billions in locked assets), complex (multi-chain logic), and often use centralized trust assumptions (multisigs). The three catastrophic hacksโRonin ($625M), Poly Network ($611M), Wormhole ($325M)โweren't theoretical vulnerabilities. They were real exploits that drained user funds in hours. Understanding attack vectors is critical for developers building or auditing bridge contracts, and for users deciding which bridges to trust with their assets.
๐ฎ Interactive: Attack Scenario Explorer
Select an attack type to see real-world exploits, how they work step-by-step, and how to prevent them. Learn from $1.6B+ in actual losses.
Validator Compromise
CriticalAttackers steal validator private keys and forge cross-chain messages
- 1Bridge secured by N-of-M multisig (e.g., 5-of-9 validators)
- 2Attacker targets validators via social engineering, phishing, or infrastructure hacks
- 3Once threshold keys obtained (5 in Ronin case), attacker can sign any message
- 4Forge withdrawal message: "Mint 173,600 ETH + 25.5M USDC to attacker address"
- 5Destination chain sees valid signatures, mints tokens without actual lock
- 6Attacker drains funds before detection (Ronin took 6 days to notice)
- โHardware security modules (HSMs) for key storage
- โDistributed key generation (DKG) - no single party knows full key
- โIncrease validator set size and geographic diversity
- โRate limiting: Cap withdrawal amounts per hour
- โMulti-factor authentication and IP whitelisting for validators
- โReal-time monitoring and anomaly detection
Total loss of bridged funds. Ronin had to raise $150M to reimburse users.
๐ Bridge Hack Statistics (2021-2022)
5-of-9 validator keys compromised via social engineering. Attacker minted 173,600 ETH and 25.5M USDC.
Smart contract vulnerability allowing attacker to replace keeper keys. Funds returned (whitehat?).
Signature verification bypass. Attacker minted 120k WETH without backing. Jump Crypto bailout.
Merkle root validation bug. Anyone could forge withdrawal proofs. 41 attackers drained funds.
Bridges account for 69% of all DeFi hacks by value. More than hacks, rug pulls, and exploits combined.
๐ก๏ธ Defense in Depth
No single security measure prevents all attacks. Bridges need layered defenses:
- โข Multi-sig with HSMs
- โข Threshold signatures (BLS, FROST)
- โข Zero-knowledge proofs
- โข Multiple audits + formal verification
- โข Bug bounties ($1M+ rewards)
- โข Upgradeable with time locks
- โข Bonded validators (slashing)
- โข Insurance pools
- โข Rate limits + daily caps
- โข Real-time monitoring
- โข Emergency pause mechanisms
- โข Incident response playbooks
๐ก User Security Best Practices
- โขTest Small First: Bridge $10-50 before moving large amounts. Confirm receipt on destination.
- โขCheck Audits: Only use bridges audited by reputable firms (Trail of Bits, OpenZeppelin, Certora).
- โขMonitor TVL Drops: Sudden TVL decrease = possible exploit. Check Twitter, Discord before bridging.
- โขDiversify: Don't keep all assets on one chain via one bridge. Spread risk.
- โขUnderstand Trust Model: 3-of-5 multisig = 3 parties control your funds. Acceptable?