Cross-Chain Bridge Security Checklist
17 security checks specifically for cross-chain bridges. Covering validator security, message verification, liquidity pools, and integrations with LayerZero, CCIP, Wormhole, and Axelar.
CATEGORIES
Validator Set Security
CriticalMulti-sig thresholds, validator rotation, slashing conditions, Byzantine fault tolerance
Relay Network Security
HighRelayer incentives, censorship resistance, delivery guarantees
Message Passing Security
CriticalMessage authentication, replay prevention, ordering guarantees, timeout mechanisms
Lock-and-Mint Mechanisms
CriticalSupply conservation, mint authority controls, burn proof verification
Liquidity Pool Bridges
HighRebalancing mechanisms, slippage protection, pool insolvency
Oracle Integration
HighPrice feed accuracy across chains, manipulation resistance, failover mechanisms
Circuit Breakers
HighPause mechanisms, volume limits, velocity controls, emergency governance
Finality Handling
CriticalSource chain finality, reorg protection, confirmation requirements
Emergency Recovery
HighStuck funds recovery, upgrade mechanisms, guardian actions
LayerZero Integration
HighEndpoint configuration, trusted remote setup, lzReceive safety
Chainlink CCIP
HighRouter configuration, ccipReceive implementation, fee handling
Wormhole Integration
HighVAA verification, guardian set validation, message parsing
Axelar Integration
HighGateway validation, GMP calls, token transfers
Signature Validation
CriticalReplay attacks, malleability, threshold signatures
Access Control
CriticalRole management, admin functions, upgrade authorization
Reentrancy
CriticalCross-function, callback reentrancy, state consistency
Integer Overflow
HighAmount calculations, fee handling, supply tracking
Need a Professional Bridge Audit?
Cross-chain bridges have lost $2B+ to exploits. Get your bridge audited by the team that understands the complex security model.

