Lock-and-Mint

A bridge mechanism where assets are locked on the source chain and equivalent wrapped tokens are minted on the destination chain.

Lock-and-mint is the most common mechanism for transferring assets across blockchain networks. When a user wants to move tokens from Chain A to Chain B, the original tokens are locked in a smart contract on Chain A, and corresponding "wrapped" tokens are minted on Chain B. To move back, the wrapped tokens are burned, and the original tokens are unlocked.

How Lock-and-Mint Works

The lock-and-mint process follows a specific sequence:

Step 1 - Lock: The user sends their tokens to a bridge contract on the source chain. These tokens are held in custody—either by a smart contract, a multi-signature wallet, or a combination of both.

Step 2 - Verify: Bridge validators or relayers observe the lock transaction and verify it has reached sufficient finality on the source chain. This verification step is critical—premature minting before finality could allow double-spending if the source chain reorganizes.

Step 3 - Mint: Once verified, the bridge mints an equivalent amount of wrapped tokens on the destination chain. These wrapped tokens represent a claim on the locked collateral.

Step 4 - Return (optional): When the user wants to return to the source chain, they burn the wrapped tokens on the destination chain. After verification, the original tokens are unlocked.

Security Considerations

Lock-and-mint bridges have specific security properties and risks that auditors and builders must understand:

Supply Conservation: The total supply of wrapped tokens across all destination chains must never exceed the locked collateral on the source chain. This invariant is fundamental—violating it means the bridge has created unbacked tokens.

The Wormhole exploit ($320M) demonstrated what happens when supply conservation fails. Attackers exploited a signature verification bug to mint wrapped ETH without actually locking ETH on Ethereum. The wrapped tokens were fully backed by nothing.

Mint Authority: Only the bridge protocol should be able to mint wrapped tokens. Any other mint path—admin functions, upgradeable proxies with excessive permissions, or logic bugs—represents a critical vulnerability.

Collateral Custody: The locked tokens on the source chain must be secure. This typically means:

  • Multi-signature or threshold signature schemes for withdrawals
  • Time-locks on large withdrawals to allow intervention
  • No admin functions that could drain funds
  • Upgrade mechanisms that cannot be abused

Finality Assumptions: Minting must wait for sufficient finality on the source chain. If the bridge mints after only a few confirmations and the source chain reorganizes, the lock transaction may be reverted while the minted tokens remain—creating unbacked supply.

Advantages of Lock-and-Mint

Capital Efficiency: Unlike liquidity pool bridges, lock-and-mint doesn't require pre-funded liquidity on the destination chain. The bridge can support arbitrary transfer sizes limited only by available collateral.

Consistent Pricing: Wrapped tokens maintain a 1:1 peg with the underlying asset (assuming the bridge is secure). There's no slippage or dynamic pricing based on pool ratios.

Clear Accounting: The locked collateral provides transparent backing. Anyone can verify that wrapped tokens are fully collateralized by checking the lock contract balance.

Risks and Limitations

Counterparty Risk: Users must trust that the locked collateral will remain secure and accessible. If the bridge is compromised, validator keys are stolen, or the lock contract has vulnerabilities, users may lose their funds.

Centralization Concerns: Many lock-and-mint bridges rely on relatively small validator sets or multisig arrangements. This concentrates trust in a small group of parties.

Wrapped Token Complexity: Users receive wrapped tokens, not native assets. They must trust the wrapped token contract, understand that their tokens are claims on collateral, and be aware of any protocol risks.

Redemption Risk: In extreme scenarios (bridge hack, validator collusion, smart contract bug), users may be unable to redeem their wrapped tokens for the underlying assets.

Lock-and-Mint vs. Liquidity Pools

Lock-and-mint and liquidity pool bridges represent different design philosophies:

AspectLock-and-MintLiquidity Pool
Capital needsNone upfrontPre-funded pools
PricingFixed 1:1Dynamic (slippage)
Transfer limitsUnlimited (up to collateral)Limited by pool depth
Trust modelBridge validatorsPool + validators
Token typeWrappedNative (often)

Many modern bridges combine both approaches, using liquidity pools for popular routes and lock-and-mint for long-tail assets.

Best Practices for Lock-and-Mint Security

For bridge builders implementing lock-and-mint:

  1. Enforce supply conservation invariants in code, with checks on both lock and mint operations
  2. Use threshold signatures or MPC for collateral custody—never single keys
  3. Implement time-locks on large withdrawals to enable intervention during attacks
  4. Wait for economic finality before minting, not just block confirmations
  5. Monitor wrapped token supply continuously and alert on any discrepancies
  6. Conduct regular audits of both lock contracts and mint authority logic

Lock-and-mint remains the dominant bridge architecture despite its risks, primarily because of its capital efficiency and simplicity. Understanding its security model is essential for anyone working with cross-chain infrastructure.

Need expert guidance on Lock-and-Mint?

Our team at Zealynx has deep expertise in blockchain security and DeFi protocols. Whether you need an audit or consultation, we're here to help.

Get a Quote

oog
zealynx

Subscribe to Our Newsletter

Stay updated with our latest security insights and blog posts

© 2024 Zealynx