...
BTC$87,250.002.34%
ETH$4,120.001.18%
SOL$178.004.72%
BNB$645.000.95%
XRP$2.656.41%
ADA$0.82000.62%
AVAX$42.503.14%
DOGE$0.18002.07%
LINK$32.501.89%
DOT$8.900.44%
UNI$14.202.56%
MATIC$0.58000.71%
BTC$87,250.002.34%
ETH$4,120.001.18%
SOL$178.004.72%
BNB$645.000.95%
XRP$2.656.41%
ADA$0.82000.62%
AVAX$42.503.14%
DOGE$0.18002.07%
LINK$32.501.89%
DOT$8.900.44%
UNI$14.202.56%
MATIC$0.58000.71%
🌉 BridgesInteroperabilityUpdated March 14, 2026 · 15 min read · +125 XP

Cross-Chain Bridges Guide 2026: How They Work, Top Protocols & Security Risks

Bridges are the highways connecting blockchains — moving assets and data between Ethereum, Solana, Arbitrum, Base, and 50+ other chains. They're also the #1 target for hackers: over $2.5B lost to bridge exploits. This guide explains bridge mechanics, the safest protocols, and how to move assets without getting rekt.

How Bridges Work: 3 Models

Lock & Mint
You lock Token A on Chain 1. The bridge mints a wrapped version (e.g. wBTC) on Chain 2. Risk: the locked pool is a honeypot — if hacked, wrapped tokens become worthless. Used by: early Ethereum ↔ BSC bridges.
Liquidity Pool (Native)
Liquidity providers fund pools on each chain. You deposit on Chain 1, an LP fronts native assets on Chain 2 and is reimbursed. No wrapped tokens. Used by: Hop, Stargate.
Message Passing
The bridge passes a generic message between chains, not just tokens. Smart contracts on each side execute based on the message. Enables cross-chain DeFi (not just transfers). Used by: Axelar, Wormhole, CCIP.

Top Bridge Protocols (2026)

ProtocolHow it worksChainsBest for
Across ProtocolFast relay model — relayers front liquidity, settle with UMA optimistic oracleETH L2sFastest withdrawals (minutes), lowest fees
Stargate (LayerZero)Unified liquidity pools across chains via LayerZero messaging20+ chainsNative asset bridging (no wrapped assets)
Hop ProtocolBonders provide liquidity, canonical tokens on destinationETH L2sBattle-tested, strong L2 liquidity
WormholeGeneric message passing + token bridge; 19 guardian validators30+ chainsBroadest chain support, used by DeFi protocols
AxelarUniversal interoperability layer with proof-of-stake validators50+ chainsCross-chain calls (not just tokens)
Chainlink CCIPCross-Chain Interoperability Protocol by ChainlinkMajor EVM chainsEnterprise-grade, used by banks + TradFi

Bridge Hacks: A $2.5B Graveyard

Ronin Bridge (Mar 2022)Lost: $625M
5 of 9 validator keys compromised by North Korean hackers (Lazarus Group). Sky Mavis had inadvertently handed Axie DAO 4 of the keys.
Wormhole (Feb 2022)Lost: $320M
Signature verification bug — attacker faked guardian signatures to mint 120,000 wETH without depositing collateral.
Nomad (Aug 2022)Lost: $190M
Fraudulent messages accepted due to initialisation bug. A 'copy-paste' exploit — hundreds of addresses copied the attack tx once discovered.
Harmony Horizon (Jun 2022)Lost: $100M
2 of 5 multisig keys compromised. Again attributed to Lazarus Group.

🌉 Key takeaway

For most users: use Across for fast ETH L2 transfers, Stargate for multi-chain native assets, and Axelar for non-EVM chains. Never bridge more than you can afford to lose. Prefer bridges audited by multiple firms, with a track record of 12+ months without exploits. Avoid new bridges with large TVLs and small security teams.