โ†
Previous Module
GraphQL Indexer Simulator

โš ๏ธ Security Models: Trusted vs Trustless

Compare bridge security trade-offs and attack vectors

Transfer assets between different blockchains

โš ๏ธ Bridge Security Risks

Bridges are the most attacked DeFi infrastructure. Over $2.5 billion stolen from bridges in 2022 aloneโ€”more than all other DeFi hacks combined. Why? They're high-value targets (billions in locked assets), complex (multi-chain logic), and often use centralized trust assumptions (multisigs). The three catastrophic hacksโ€”Ronin ($625M), Poly Network ($611M), Wormhole ($325M)โ€”weren't theoretical vulnerabilities. They were real exploits that drained user funds in hours. Understanding attack vectors is critical for developers building or auditing bridge contracts, and for users deciding which bridges to trust with their assets.

๐ŸŽฎ Interactive: Attack Scenario Explorer

Select an attack type to see real-world exploits, how they work step-by-step, and how to prevent them. Learn from $1.6B+ in actual losses.

๐Ÿ”“

Validator Compromise

Critical

Attackers steal validator private keys and forge cross-chain messages

Real Case
Ronin Bridge (2022)
Amount Lost
$625 Million
โšก How the Attack Works
  1. 1Bridge secured by N-of-M multisig (e.g., 5-of-9 validators)
  2. 2Attacker targets validators via social engineering, phishing, or infrastructure hacks
  3. 3Once threshold keys obtained (5 in Ronin case), attacker can sign any message
  4. 4Forge withdrawal message: "Mint 173,600 ETH + 25.5M USDC to attacker address"
  5. 5Destination chain sees valid signatures, mints tokens without actual lock
  6. 6Attacker drains funds before detection (Ronin took 6 days to notice)
๐Ÿ›ก๏ธ Prevention Strategies
  • โœ“Hardware security modules (HSMs) for key storage
  • โœ“Distributed key generation (DKG) - no single party knows full key
  • โœ“Increase validator set size and geographic diversity
  • โœ“Rate limiting: Cap withdrawal amounts per hour
  • โœ“Multi-factor authentication and IP whitelisting for validators
  • โœ“Real-time monitoring and anomaly detection
๐Ÿ’ฅ Impact

Total loss of bridged funds. Ronin had to raise $150M to reimburse users.

๐Ÿ“Š Bridge Hack Statistics (2021-2022)

Ronin Bridge (March 2022)$625M

5-of-9 validator keys compromised via social engineering. Attacker minted 173,600 ETH and 25.5M USDC.

Poly Network (August 2021)$611M

Smart contract vulnerability allowing attacker to replace keeper keys. Funds returned (whitehat?).

Wormhole (February 2022)$325M

Signature verification bypass. Attacker minted 120k WETH without backing. Jump Crypto bailout.

Nomad Bridge (August 2022)$190M

Merkle root validation bug. Anyone could forge withdrawal proofs. 41 attackers drained funds.

Total Bridge Losses (2021-2022)$2.5B+

Bridges account for 69% of all DeFi hacks by value. More than hacks, rug pulls, and exploits combined.

๐Ÿ›ก๏ธ Defense in Depth

No single security measure prevents all attacks. Bridges need layered defenses:

Layer 1: Cryptographic
  • โ€ข Multi-sig with HSMs
  • โ€ข Threshold signatures (BLS, FROST)
  • โ€ข Zero-knowledge proofs
Layer 2: Smart Contract
  • โ€ข Multiple audits + formal verification
  • โ€ข Bug bounties ($1M+ rewards)
  • โ€ข Upgradeable with time locks
Layer 3: Economic
  • โ€ข Bonded validators (slashing)
  • โ€ข Insurance pools
  • โ€ข Rate limits + daily caps
Layer 4: Operational
  • โ€ข Real-time monitoring
  • โ€ข Emergency pause mechanisms
  • โ€ข Incident response playbooks

๐Ÿ’ก User Security Best Practices

  • โ€ข
    Test Small First: Bridge $10-50 before moving large amounts. Confirm receipt on destination.
  • โ€ข
    Check Audits: Only use bridges audited by reputable firms (Trail of Bits, OpenZeppelin, Certora).
  • โ€ข
    Monitor TVL Drops: Sudden TVL decrease = possible exploit. Check Twitter, Discord before bridging.
  • โ€ข
    Diversify: Don't keep all assets on one chain via one bridge. Spread risk.
  • โ€ข
    Understand Trust Model: 3-of-5 multisig = 3 parties control your funds. Acceptable?