필사 모드: Cross-Chain Interoperability 2026 Complete Guide - BIFROST · LayerZero v2 · Wormhole · Axelar · Cosmos IBC · Polkadot XCM · Chainlink CCIP · Hyperlane Deep Dive
EnglishIntro — May 2026, bridges hide behind verifier networks and intent protocols
The history of cross-chain bridges is the history of hacks. Poly Network $611M in 2021, Ronin $625M in 2022, Wormhole $326M, Nomad $190M, Harmony Horizon $100M, Multichain roughly $130M in 2023 followed by effective collapse — a cumulative $2.8B vanished from bridges. Half of the top ten on the rekt.news leaderboard are bridges.
So by May 2026 cross-chain has solidified along two tracks. One is **light-client or validator-network message passing** (LayerZero v2 DVN, Wormhole guardians, Axelar GMP, Hyperlane ISM, Chainlink CCIP, Cosmos IBC, Polkadot XCM, Hyperlane permissionless validators), the other is **intent-based fast execution with eventual settlement** (Across, Squid, UniswapX cross-chain, CoW Swap CCT, deBridge DLN). In Korea, **BIFROST Network** drives EVM-compatible multichain DeFi anchored by its BFC token and the BiFi protocol. This article looks not at marketing but at trust models, validator sets, hack history, TVL, and EigenLayer AVS integration honestly.
Bridge taxonomy — five models cleanly separated
Do not lump bridges into a single line. Trust assumptions differ completely. As of May 2026 there are five meaningful models.
1. **Light client / native verification**: directly verifies the consensus of the counterparty chain. Cosmos IBC, Polkadot XCM, NEAR Rainbow Bridge are representative. The weakest trust assumption but expensive to implement.
2. **External validator set (M-of-N)**: an outside committee attests messages by majority. Wormhole (19 guardians), Axelar (about 75 validators), the old Polygon zkEVM Bridge, Ronin (9 validators with 5/9 keys stolen in 2022).
3. **Optimistic verification**: a message is sent first and can be challenged during a dispute window. Nomad was the standard-bearer and effectively dead after the August 2022 $190M exploit. Across uses UMA Optimistic Oracle only at settlement.
4. **Liquidity pool / mint-burn hybrid**: pools on both sides do lock-and-mint or burn-and-mint. Stargate, Hop, Synapse, Connext. Capital-inefficient but fast UX.
5. **Intent / cross-chain solver**: the user signs only an intent and external solvers fill assets on both sides, settling later. Across v3, UniswapX cross-chain, CoW CCT, deBridge DLN, Squid Router, Sockets Bungee, 1inch Fusion+.
LayerZero v2, Chainlink CCIP, and Hyperlane sit one tier up as "general message passing (GMP) plus routing" — they carry arbitrary read/write messages, not just assets.
Trust models — 1-of-N, M-of-N, N-of-N
The essence of bridge security is "how many do you have to bribe to steal funds."
- **1-of-N**: one honest party is enough. All validators must collude to steal. Optically the safest. Optimistic, light-client, and ZK proof verification approach this.
- **M-of-N (M < N/2)**: a minority colluding can forge a message. Wormhole 13/19, Ronin 5/9, the opaque Multichain MPC roughly ?/21. One key compromise threatens all funds.
- **N-of-N**: everyone must be honest. Very weak. Rarely used.
- **Validator-as-stake (Cosmos, Polkadot, Axelar)**: validators lock stake and get slashed for misbehavior. Economic security applies but depends on token price.
Vitalik Buterins January 2022 essay "the multi-chain future, not cross-chain" still resonates here. Because the 51% attack zone of sovereignty differs, assets are safe only at the security of their origin chain and the bridge itself demands extra trust.
BIFROST Network — multichain DeFi infrastructure born in Korea
BIFROST Network is an EVM-compatible L1 plus multichain middleware that Korean firm PiLab Solutions has been building since 2018. As of May 2026:
- **Chain ID**: mainnet 0xBFC0 (48851), testnet 0xBFC0 (49088)
- **Native token**: BFC; BFC and BiFi coexist as gas tokens
- **Consensus**: a PoSDAO variant of BFT-PoS
- **BiFi**: multichain lending plus swap DeFi on top of Bifrost. ETH, WBTC, BNB, USDC pulled in via in-house multisig plus relayers
- **BiFi X**: a cross-chain interface that directly calls BiFi pools from external chains
- **Domestic exchange listings**: Upbit BFC/KRW, Bithumb BFC/KRW
What makes it meaningful in Korea is that it is not a single-chain token but multichain infrastructure built by Korean engineers, and it remains KYC-friendly even after the first stage of the FSCs Virtual Asset User Protection Act took effect in July 2024. BFC is a listed coin and thus regulated, but the BIFROST chain itself is EVM-compatible and reachable directly from MetaMask.
Below is a simplified BiFi lending pool interface.
// BiFi-style cross-chain lending pool (simplified)
// SPDX-License-Identifier: Apache-2.0
pragma solidity ^0.8.20;
interface IBiFiPool {
struct UserAccount {
uint256 deposit; // underlying units
uint256 borrow; // underlying units
uint256 lastUpdated; // block timestamp
}
event Deposit(address indexed user, uint256 amount, uint16 srcChainId);
event Borrow(address indexed user, uint256 amount, uint16 dstChainId);
event Repay(address indexed user, uint256 amount, uint16 srcChainId);
function deposit(uint256 amount, uint16 srcChainId) external;
function borrow(uint256 amount, uint16 dstChainId, address to) external;
function liquidate(address borrower, uint256 repay, address collateralAsset) external;
function getAccount(address user) external view returns (UserAccount memory);
function utilizationRate() external view returns (uint256); // 1e18 scale
}
`srcChainId` and `dstChainId` arrive through an external message relay (the Bifrost Relayer). This pattern is now standard not only for BIFROST but for LayerZero-based dApps.
Polkadot — shared security and XCM v3/v4
Polkadots interoperability is a different model. Because every parachain **shares the relay chains validator pool**, messages between parachains have no external validator. **XCM (Cross-Consensus Message Format)** v3/v4 is the message format.
XCM messages are sequences of instructions. Representative ones:
- `WithdrawAsset`: pulls assets from the source sovereign account.
- `BuyExecution`: pays fees.
- `DepositAsset`: deposits assets into the destination account.
- `Transact`: dispatches an arbitrary dispatchable call.
A JSON-like XCM example:
{
"V3": [
{ "WithdrawAsset": [{ "id": { "Concrete": { "parents": 0, "interior": "Here" } }, "fun": { "Fungible": "1000000000000" } }] },
{ "BuyExecution": { "fees": { "id": { "Concrete": { "parents": 0, "interior": "Here" } }, "fun": { "Fungible": "1000000000000" } }, "weight_limit": "Unlimited" } },
{ "DepositAsset": { "assets": { "Wild": "All" }, "beneficiary": { "parents": 0, "interior": { "X1": { "AccountId32": { "network": null, "id": "0x..." } } } } } }
]
}
XCM is more expressive than LayerZero messaging because `Transact` lets you call pallet functions on another chain, not just move assets. The downside is that leaving the Polkadot ecosystem requires a separate bridge (Snowbridge, t3rn).
Cosmos IBC — the oldest light-client standard
Cosmos **IBC (Inter-Blockchain Communication)** has zero cumulative hacks since mainnet in 2021, validating the most conservative design in the wild. Core ideas:
- Both chains keep **light clients** of each other (Tendermint header verification).
- Messages move as **packets** in four steps: commit/relay/receive/ack.
- Channels are ordered or unordered; ports identify applications.
IBC v2 (Eureka) has been expanding to EVM chains since 2025. ICS-20 covers fungible token transfer, ICS-27 covers interchain accounts (remote signing transactions on another chain), ICS-721 is NFTs.
Example IBC packet structure:
{
"sequence": 12345,
"source_port": "transfer",
"source_channel": "channel-141",
"destination_port": "transfer",
"destination_channel": "channel-2",
"data": "eyJkZW5vbSI6InVhdG9tIiwiYW1vdW50IjoiMTAwMDAwMCIsInNlbmRlciI6Imdvc21vc..." ,
"timeout_height": { "revision_number": 4, "revision_height": 19000000 },
"timeout_timestamp": 0
}
The `data` field is the ICS-20 JSON payload (base64). Relayers (hermes, go-relayer) shuttle header proofs and packet commitments between chains. Verifying only the consensus of both chains without external trust makes it the most optically safe generalizable model.
LayerZero v2 — DVN (Decentralized Verifier Network) architecture
LayerZero launched v1 in 2022 as a 2-of-2 Endpoint + Oracle + Relayer model and switched to the **DVN (Decentralized Verifier Network)** model with v2 in 2024. As of May 2026 it supports more than 90 chains.
Core of v2:
- **Endpoint**: one canonical contract per chain. Standard ABI for send/receive.
- **DVN**: a pool of verifier nodes. The dApp picks N DVNs and a message commits when X signatures aggregate (e.g., "Google Cloud DVN + Polyhedra DVN + Nethermind DVN, 3-of-3").
- **Executor**: the party executing the transaction on the destination.
- **ULN (UltraLightNode)**: chain-by-chain pluggable light-client-style header verification.
LayerZeros security assumption is "the DVNs I selected do not all collude." Because the dApp owns the DVN configuration, critics argue it does not enforce a uniform security level.
A canonical LayerZero OApp interface:
// OApp pattern (LayerZero v2)
contract MyCrossChainCounter is OAppSender, OAppReceiver {
uint256 public counter;
function increment(uint32 dstEid, bytes calldata options) external payable returns (MessagingReceipt memory) {
bytes memory payload = abi.encode(counter + 1);
MessagingFee memory fee = _quote(dstEid, payload, options, false);
require(msg.value >= fee.nativeFee, "fee");
return _lzSend(dstEid, payload, options, fee, payable(msg.sender));
}
function _lzReceive(
Origin calldata,
bytes32,
bytes calldata payload,
address,
bytes calldata
) internal override {
counter = abi.decode(payload, (uint256));
}
}
The dApp only deals with `dstEid` (endpoint id) and `options` (gas hint, native drop); DVN selection is preconfigured via OAppConfig.
Wormhole — guardian set and NTT
Wormhole still carries the trauma of February 2022 when 120k wETH (about $326M) was stolen from its Solana-Ethereum bridge (a signature verification bypass in the contract). Since then it has strengthened guardian governance and in 2024 introduced the **Native Token Transfers (NTT)** standard to make burn-and-mint without wrapping the default.
- **Guardian Set**: 19 validators (Jump Crypto, Certus One, others). 13/19 majority signs a VAA (Verified Action Approval).
- **VAA**: a bundle of guardian signatures. The destination chain verifies it before accepting the message.
- **NTT**: token issuers set their own burn-and-mint policy. Native USDC moves between ETH and Solana without a wrapped variant.
- **Wormhole Connect**: SDK plus a UI widget.
Wormholes security assumption is "at least 7 of the 19 guardians are honest." Because the threshold is 13/19, bribing 7 enables forgery — and contract-level exploits like the 2022 bug remain a separate risk.
Axelar — GMP and validator staking
Axelar runs its own Cosmos SDK chain plus gateway contracts on external EVM and non-EVM chains to provide GMP (General Message Passing).
- About 75 validators (May 2026), staking AXL.
- **Gateway**: a contract deployed on each chain. Handles message send/receive plus asset lock.
- **GMP**: ships arbitrary contract-call payloads to other chains. Squid Router lays its swap-and-bridge UX on top of this GMP.
- **ITS (Interchain Token Service)**: deploys your token across many chains simultaneously and syncs balances.
Axelar is an integrated security model where dApps do not need to pick validators, but security depends on the market value of AXL. Misbehaving validators get slashed.
Hyperlane — permissionless ISM
Hyperlane appeared in 2023 with the motto "interoperability as middleware." Its differentiator is letting **the dApp choose its ISM (Interchain Security Module) directly**. Multisig ISM, optimistic ISM, ZK ISM, EigenLayer AVS ISM can be combined plug-and-play.
- **Mailbox**: the per-chain send/receive contract.
- **Validator + Relayer + Watcher**: the off-chain infrastructure.
- **ISM**: verification policy. multisig, aggregation, routing.
- **Warp Routes**: token bridge standard.
In 2024 it integrated with EigenLayer AVS, adding a mode that borrows restaked ETH security. Hyperlane allows permissionless deployment so anyone can spin up a Mailbox on a new chain.
Chainlink CCIP — Risk Management Network and ARM
Chainlink CCIP, mainnet since July 2023, aims at the "enterprise standard." Differentiators:
- **Risk Management Network (ARM)**: a separate validator pool independently re-verifies messages alongside the main commit pool. Both must pass for finality.
- **Programmable Token Transfers**: ships assets plus arbitrary payload in one transaction.
- **Rate limits**: per-lane capacity and refill rate. Caps the loss from any exploit.
- **CCIP Active Risk Management**: auto-pauses on anomalous traffic.
CCIPs security model is "Commit DON + Executive DON + ARM, a triple majority," which is the most conservative. That is one reason SWIFT picked it for its 2023–2024 PoCs.
// CCIP send pattern
contract CCIPSender {
IRouterClient router;
address feeToken;
function send(uint64 dstSelector, address receiver, bytes calldata data, address token, uint256 amount) external returns (bytes32) {
Client.EVMTokenAmount[] memory tokens = new Client.EVMTokenAmount[](1);
tokens[0] = Client.EVMTokenAmount({ token: token, amount: amount });
Client.EVM2AnyMessage memory message = Client.EVM2AnyMessage({
receiver: abi.encode(receiver),
data: data,
tokenAmounts: tokens,
extraArgs: Client._argsToBytes(Client.EVMExtraArgsV2({ gasLimit: 200_000, allowOutOfOrderExecution: false })),
feeToken: feeToken
});
uint256 fee = router.getFee(dstSelector, message);
return router.ccipSend{ value: fee }(dstSelector, message);
}
}
`dstSelector` is CCIPs own 64-bit chain selector, feeToken is LINK or native ETH.
Comparison — six message-passing protocols
|Protocol|Model|Validators|Hack history|TVL (May 2026)|Notes|
|---|---|---|---|---|---|
|Cosmos IBC|Light client|N/A (per chain)|0|cumulative ~$10B flow|most conservative|
|Polkadot XCM|Shared security|~300 validators|0|relatively low|ecosystem-internal only|
|LayerZero v2|DVN multisig|dApp-configurable|0 direct|highest message volume|flexible security config|
|Wormhole|Guardian 13/19|19|$326M in 2022|~$3B|wrapping removed via NTT|
|Axelar|PoS validators|~75|0 direct|~$800M|GMP plus ITS|
|Hyperlane|Pluggable ISM|dApp-configurable|0|~$300M|permissionless|
|Chainlink CCIP|DON + ARM triple|2 DONs + ARM|0|~$500M|enterprise-friendly|
Figures are approximate as of May 2026 from DefiLlama, L2Beat, and each protocols dashboard.
Liquidity-pool bridges — Stargate, Hop, Synapse, Connext
The fast-transfer cohort:
- **Stargate (LayerZero-based)**: a single unified pool with instant guaranteed finality. STG governance.
- **Hop Protocol**: L2-to-L2 focused. AMM-based hToken system.
- **Synapse**: nUSD/nETH synthetic assets plus optimistic verification.
- **Connext**: NXTP protocol plus the Amarok upgrade. Router network.
- **deBridge**: supports both DLN (intent) and GMP.
These layer liquidity on top of messaging like LayerZero or CCIP, so security depends on the underlying messaging.
Intent protocols — Across, Squid, UniswapX cross-chain
The trend from 2024 to 2026 is clear. Users sign only an intent ("what I want") not the path ("how"), and solvers fill it quickly and settle later.
- **Across v3**: UMA Optimistic Oracle settlement. User deposits, a relayer instantly fills on the destination, after the optimistic challenge window the relayer is repaid. Median under 7 seconds.
- **Squid Router**: Axelar GMP plus DEX integration. Swap-and-bridge in one transaction.
- **UniswapX cross-chain**: Dutch-auction-based. Solvers compete on price.
- **CoW CCT (Cross-Chain Trade)**: CoW Swaps cross-chain extension.
- **1inch Fusion+**: limit orders plus Dutch auction plus cross-chain.
Intents are powerful on UX. Downsides are solver-market centralization (a few MEV teams dominate) and settlement security still tied to the underlying messaging.
Security incident chronicle — where the $2.8B went
Major bridge hacks in summary.
- **Poly Network (2021-08)**: $611M. EthCrossChainManager keeper change bug. The hacker returned the funds voluntarily.
- **Wormhole (2022-02)**: $326M. Solana program signature verification bypass. Jump Crypto reimbursed.
- **Ronin (2022-03)**: $625M. Five of nine validator keys stolen. Axie Infinity Discord social engineering.
- **Nomad (2022-08)**: $190M. Replica contract init bug that let arbitrary messages pass. Copycats swarmed.
- **Harmony Horizon (2022-06)**: $100M. Two of five multisig keys stolen.
- **Multichain (2023-07)**: about $130M. CEO arrest plus loss of MPC key control. Effectively dead.
- **Orbit Chain (2024-01)**: $82M. A Korean project; presumed multisig key theft.
- **Ronin (2024-08)**: $12M white-hat recovery case.
Common pattern: multisig/MPC key theft plus contract verification bypass. Light-client models (IBC, XCM) have zero hacks, which is telling.
EigenLayer AVS plus Symbiotic — restaking arrives at bridge security
From 2024 to 2026 EigenLayer became a big variable in bridge security. **Restaking** lets ETH stakers delegate their validation duty to additional services (AVS, Actively Validated Service).
- **EigenDA, EigenLayer AVS**: Hyperlane, Omni Network, Polyhedra, and Lagrange are AVS registrants. Bridge validators face slashing of restaked ETH.
- **Symbiotic**: an EigenLayer alternative. Permissionless restaking plus multi-token collateral (stETH, cbETH, sUSDe).
- **Karak**: restaking of non-ETH assets too.
The point is bridges no longer have to rely on their own token value — they can borrow ETH security. The downside is AVS slashing mechanisms remain not fully battle-tested in 2026.
CAIP-2, SLIP-44, ENS — chain identifier standards
As cross-chain expanded, identifier standards became necessary.
- **CAIP-2 (Chain Agnostic Improvement Proposal)**: namespace plus reference format. Examples: `eip155:1` (Ethereum mainnet), `cosmos:cosmoshub-4`, `solana:5eykt4UsFv8P8NJdTREpY1vzqKqZKvdpKuc7UM7Q`.
- **SLIP-44**: BIP-44 derivation paths coin type. BTC=0, ETH=60, XTZ=1729.
- **CAIP-10**: account ID. `eip155:1:0x...`.
- **CAIP-19**: asset ID. `eip155:1/erc20:0xa0b8...`.
- **ENS resolvers**: cross-chain address resolution. CCIP-Read (EIP-3668) reads L2 addresses from L1.
LayerZero `eid`, Wormhole `chainId`, Axelar chain name, Chainlink `chainSelector` — each protocol has its own ID, so a mapping table is mandatory.
Meeting gas abstraction and Account Abstraction
Cross-chain UX evolves alongside ERC-4337 (Account Abstraction).
- **Paymaster**: the user executes transactions without native gas. Even without origin-chain gas, cross-chain works.
- **Bundler + UserOp**: message sends are wrapped as UserOperations and processed by solvers on other chains.
- **EIP-7702**: temporary code delegation for EOAs. Mainnet via the Pectra upgrade in 2025.
- **Privy, ZeroDev, Pimlico, Alchemy AA**: SaaS paymaster plus bundler offerings.
Cross-chain + AA + intent together define the 2026 user experience. Almost every step finishes with a single signature.
ZK bridges — a new security frontier
Pinning verification to zero-knowledge proofs is maturing.
- **Polyhedra zkBridge**: zkLightClient proofs of BLS signature aggregation.
- **Succinct SP1**: a zkVM. Proves arbitrary Rust programs in ZK.
- **RISC Zero**: a RISC-V zkVM.
- **=nil; Foundation**: zkLLVM, a multi-chain proof aggregator.
- **Espresso, Astria**: shared sequencer plus DA. More rollup infrastructure than bridges but useful for cross-rollup messages.
ZK verification provides stronger cryptographic-soundness security than a 1-of-N honest assumption, but proving is expensive so ROI relative to asset value matters.
Korean regulation — Virtual Asset User Protection Act and bridges
The Korean FSCs Virtual Asset User Protection Act took effect in its first stage in July 2024. Discussion of stage two (2026 onward) is underway. Key impacts:
- **Listed coins** (BFC, KLAY, WEMIX) fall under the law. Exchanges must enforce KYC and AML monitoring.
- **Assets arriving via bridges** now practically require origin tracing. The current Travel Rule threshold is one million won.
- **Direct DeFi protocol use** (BiFi, Aave) is read as P2P trading, but once an exchange touches it KYC applies.
- **Foreign-currency or KRW pairs** may fall under foreign exchange law rather than virtual asset law.
A Korea-born project like BIFROST has BFC under the law as a listed coin, while the chain itself stays KYC-free EVM. That duality is the gray zone of 2026.
Japanese regulation — JVCEA and the Travel Rule
Japans crypto regulation rests on the Payment Services Act, the Financial Instruments and Exchange Act, and the Travel Rule.
- **JVCEA (Japan Virtual and Crypto Assets Exchange Association)**: a self-regulatory body. Runs the white/green list for new listings.
- **Travel Rule**: since June 2023 transfers above JPY 300k must include sender and receiver info.
- **Stablecoins**: under the 2023 amended Payment Services Act, JPY-pegged stablecoins can only be issued by banks, trust banks, or money transfer agents.
- **DeFi / bridges**: no explicit rule, but the moment an exchange handles them the rules apply.
Japans big variable for 2026 is the expected enforcement of **stricter segregation of crypto custody** plus **full implementation of FATF Recommendation 16 (Travel Rule)** by country. Cross-chain plus exchange integration becomes harder.
Indexing — TheGraph, Subsquid, and Goldsky tying cross-chain data together
A cross-chain dApp needs multichain indexing too.
- **TheGraph Network**: a decentralized indexer. EVM-friendly; supports more than 50 chains as of May 2026.
- **Subsquid**: Rust plus TypeScript SDK with a generous free hosted tier.
- **Goldsky**: real-time streams plus mirroring to webhooks and Kafka.
- **Envio**: HyperSync-powered ultra-fast indexing.
- **Dune Analytics**: SQL-based dashboards.
A bridge transaction spans four steps across multiple chains — origin send, destination commit, validator commit, relayer execute — so multichain joins are mandatory.
Dev setup — Foundry, Hardhat, Anchor
If you build a cross-chain dApp, add multichain plugins to the tools you already know.
- **Foundry + Forge + Anvil**: the Solidity standard. After `forge install`, pull in LayerZero and CCIP contracts.
- **Hardhat**: TypeScript-friendly. hardhat-deploy plus multichain config.
- **Anchor**: Solana. Integrates the Wormhole SDK.
- **CosmWasm**: Cosmos. Rust smart contracts.
- **ink!**: a Polkadot parachain framework. Rust-based.
Fork tests are mandatory. `forge test --fork-url $ETH_RPC` plus a fork of the destination chain. LayerZero ships a mock endpoint via `lz-evm-protocol-v2`.
Foundry multichain fork-test setup
forge install LayerZero-Labs/devtools
forge install smartcontractkit/ccip
forge install OpenZeppelin/openzeppelin-contracts
Environment variables
export ETH_RPC=https://eth.llamarpc.com
export ARB_RPC=https://arb1.arbitrum.io/rpc
export BIFROST_RPC=https://public-01.mainnet.bifrostnetwork.com/rpc
Run tests
forge test --fork-url $ETH_RPC --match-contract CrossChainTest -vv
forge test --fork-url $BIFROST_RPC --match-contract BiFiTest -vv
MEV and cross-chain — atomic vs eventual
Cross-chain is fundamentally **non-atomic**. The origin commit and destination execute are decoupled, leaving room for MEV.
- **Cross-chain sandwiching**: a solver spots a price gap and fills their own assets first.
- **Toxic flow**: information asymmetry that pushes losing orders onto solvers only.
- **Flashbots, MEV-Share**: the main solution. Order-flow privacy.
- **Cross-chain atomicity (experimental)**: HTLC, atomic swap, BTC Lightning-style.
- **Solver auction (UniswapX, CoW)**: Dutch auctions for price discovery.
The 2026 solver market is dominated by five to seven firms (Anton, Wintermute, Flashbots, Pyth, GSR). Decentralization is in progress.
Index tokens and LSTs across chains
The multichain rollout of staking tokens is another big topic.
- **Lido stETH/wstETH**: LayerZero-based multichain wstETH.
- **Rocket Pool rETH**: CCIP multichain.
- **EtherFi eETH/weETH**: uses both LayerZero and CCIP.
- **Renzo ezETH**: LayerZero.
- **Mellow LRT, KelpDAO rsETH**: multi-protocol.
When LSTs and LRTs scatter across chains, synchronization and slash protection get hairy. Burn-and-mint standards like NTT reduce wrapping pileups.
Practical checklist — launching a new cross-chain dApp
Finally, a security and UX checklist for launching.
1. **Pick messaging**: choose among LayerZero, CCIP, IBC, Hyperlane, Axelar, Wormhole by trust assumption and cost matrix. If dApp TVL exceeds $10M, multi-routing.
2. **DVN / ISM config**: at least 3-of-5 with different operators. No two validators sharing the same key infrastructure.
3. **Rate limits**: per-lane and per-token capacity. Chainlink CCIP ships them by default; elsewhere implement them yourself.
4. **Pause + circuit breakers**: auto-pause on abnormal patterns.
5. **Replay protection**: nonces plus message hashes. All protocols ship this, but verify it yourself.
6. **Gas / native drop**: fallback when the destination lacks gas.
7. **Front-end UX**: estimated send/arrival times, in-flight status (commit→relay→execute), refundability.
8. **Monitoring**: alarms on abnormal traffic via Tenderly, OpenZeppelin Defender, Forta.
9. **Legal**: KYC, sanctions screening (Chainalysis, Elliptic), Travel Rule compatibility.
10. **External audits**: Trail of Bits, Sigma Prime, OpenZeppelin, Spearbit. On every change.
References
- BIFROST Network official: [bifrostnetwork.com](https://bifrostnetwork.com/)
- BiFi protocol docs: [docs.bifrostnetwork.com/bifi](https://docs.bifrostnetwork.com/bifi)
- LayerZero v2 docs: [docs.layerzero.network](https://docs.layerzero.network/v2)
- Wormhole docs: [wormhole.com/docs](https://wormhole.com/docs)
- Axelar network docs: [docs.axelar.dev](https://docs.axelar.dev/)
- Polkadot XCM official: [wiki.polkadot.network/docs/learn-xcm](https://wiki.polkadot.network/docs/learn-xcm)
- IBC Protocol docs: [ibcprotocol.dev](https://ibcprotocol.dev/)
- Chainlink CCIP: [chain.link/cross-chain](https://chain.link/cross-chain)
- Hyperlane docs: [docs.hyperlane.xyz](https://docs.hyperlane.xyz/)
- EigenLayer: [eigenlayer.xyz](https://www.eigenlayer.xyz/)
- Symbiotic: [symbiotic.fi](https://symbiotic.fi/)
- Across Protocol: [across.to](https://across.to/)
- CoW Swap CCT: [docs.cow.fi](https://docs.cow.fi/)
- Ethereum.org bridges guide: [ethereum.org/en/developers/docs/bridges](https://ethereum.org/en/developers/docs/bridges/)
- Vitalik Buterin "Multi-chain not cross-chain" (2022): [vitalik.eth.limo](https://vitalik.eth.limo/general/2022/01/07/eip4844.html)
- Trail of Bits bridge audit reports: [github.com/trailofbits/publications](https://github.com/trailofbits/publications)
- Sigma Prime audits: [sigmaprime.io/audits](https://sigmaprime.io/audits.html)
- rekt.news leaderboard: [rekt.news/leaderboard](https://rekt.news/leaderboard/)
- DefiLlama Bridges: [defillama.com/bridges](https://defillama.com/bridges)
- L2Beat bridges: [l2beat.com/bridges](https://l2beat.com/bridges/summary)
- CAIP standards: [github.com/ChainAgnostic/CAIPs](https://github.com/ChainAgnostic/CAIPs)
- Korea FSC Virtual Asset User Protection Act: [fsc.go.kr](https://www.fsc.go.kr/)
- JVCEA: [jvcea.or.jp](https://jvcea.or.jp/)
현재 단락 (1/287)
The history of cross-chain bridges is the history of hacks. Poly Network $611M in 2021, Ronin $625M ...