Checklists/EVM/Cross-Chain Bridges

Cross-Chain Bridge Security Checklist

17 security checks specifically for cross-chain bridges. Covering validator security, message verification, liquidity pools, and integrations with LayerZero, CCIP, Wormhole, and Axelar.

📄
Want this as a PDF? DM me on Telegram →
Showing 17 of 17 vulnerabilities
#1

Validator Set Security

Critical

Multi-sig thresholds, validator rotation, slashing conditions, Byzantine fault tolerance

#2

Relay Network Security

High

Relayer incentives, censorship resistance, delivery guarantees

#3

Message Passing Security

Critical

Message authentication, replay prevention, ordering guarantees, timeout mechanisms

#4

Lock-and-Mint Mechanisms

Critical

Supply conservation, mint authority controls, burn proof verification

#5

Liquidity Pool Bridges

High

Rebalancing mechanisms, slippage protection, pool insolvency

#6

Oracle Integration

High

Price feed accuracy across chains, manipulation resistance, failover mechanisms

#7

Circuit Breakers

High

Pause mechanisms, volume limits, velocity controls, emergency governance

#8

Finality Handling

Critical

Source chain finality, reorg protection, confirmation requirements

#9

Emergency Recovery

High

Stuck funds recovery, upgrade mechanisms, guardian actions

#10

LayerZero Integration

High

Endpoint configuration, trusted remote setup, lzReceive safety

#11

Chainlink CCIP

High

Router configuration, ccipReceive implementation, fee handling

#12

Wormhole Integration

High

VAA verification, guardian set validation, message parsing

#13

Axelar Integration

High

Gateway validation, GMP calls, token transfers

#14

Signature Validation

Critical

Replay attacks, malleability, threshold signatures

#15

Access Control

Critical

Role management, admin functions, upgrade authorization

#16

Reentrancy

Critical

Cross-function, callback reentrancy, state consistency

#17

Integer Overflow

High

Amount calculations, fee handling, supply tracking

Need a Professional Bridge Audit?

Cross-chain bridges have lost $2B+ to exploits. Get your bridge audited by the team that understands the complex security model.

oog
zealynx

Subscribe to Our Newsletter

Stay updated with our latest security insights and blog posts

© 2024 Zealynx