Skip to main content
ResearchApr 16, 20265 min read

Security By Design In Cross-Chain Infrastructure

By Samuel Arogbonlo

Why bridge exploits keep repeating, how Fusion is architected differently, and what safer cross-chain infrastructure should look like.

Estimated reading time: 5 minutes.

Bridge exploits are starting to feel less like surprises and more like reminders. The names change, the mechanics change, and the code paths are never quite the same, but the pattern underneath is often familiar. What keeps showing up is not just bad luck or isolated bugs. It is concentration: too much trust, too much authority, or too much liquidity sitting in one part of the system, with too much damage riding on one assumption holding.

When that assumption breaks, the damage rarely stays local. It spreads outward into liquidity, user trust, integrations, and market confidence. That matters far beyond bridge headlines, because cross-chain infrastructure now sits underneath payments, liquidity routing, treasury operations, and tokenized assets. If crypto wants broader adoption, and especially institutional participation in cross-border settlement, security has to move upstream into architecture, authorization, and settlement logic. That is the standard this piece, and Fusion Protocol, are arguing for.

What Are We Doing At Fusion?

Fusion is a cross-chain settlement protocol built around HTLC-style atomic execution rather than wrapped-asset minting. In practice, that means solver-provided liquidity, explicit refund paths, and a design goal of keeping failures local instead of systemic.

Read the docs or join the waitlist.

The pattern is visible in some of the biggest incidents of the last few years:

  • Ronin (~$625M): validator and key-compromise failure
  • Wormhole (~$320M): verification failure
  • Nomad (~$190M): message-validation and replay failure
  • Harmony (~$100M): multisig compromise
  • Hyperbridge (~$2.5M realized): forged-proof path that escalated into wrapped-asset mint control

It is also important not to flatten every large exploit into the same category. Some failures are fundamentally bridge-architecture failures. Others are operational and authorization failures that reveal a different part of the stack is still weak. Drift Protocol's April 2026 exploit is useful here: the public reporting points to a privileged-access and signer-workflow failure, not a wrapped-asset bridge failure. Rhea Finance — the chain-abstracted liquidity hub merging Ref Finance and Burrow on NEAR — was drained of ~$7.6M around the same time through fake token contracts and manipulated oracle pricing in fresh liquidity pools, another reminder that oracle and validation layers remain soft targets even outside bridge architecture. The common lesson is that crypto still leaves too much room for a valid-looking action to be unsafe.

The Problem Is Bigger Than "Hacks"

Crypto loses money to contract exploits, key compromise, infrastructure failure, and social engineering, but one thing should be obvious by now: users are still far too easy to exploit through the normal product surface. If people keep getting drained because they sign things they do not understand, that is not just a user-education problem. It is a design problem. Broad approve permissions, opaque calldata, and irreversible execution still ask too much of the user at the exact moment the system should be protecting them most.

Developers inherit the same weakness from the stack beneath them. If they build on primitives with vague trust boundaries or unclear failure modes, no amount of frontend polish can fully remove that risk. Security-first in crypto should mean security for users and developers alike: safer defaults, narrower permissions, more readable intent, and systems that fail in contained ways rather than catastrophic ones. A secure system is not one that never fails. It is one where failure is bounded, visible, and recoverable.

The Collision Course

This matters because cross-chain security debt is colliding with tokenized finance. Institutions do not adopt infrastructure because it is interesting. They adopt it when it behaves like infrastructure.

That means:

  • clear settlement finality
  • bounded operational roles
  • survivable failure modes
  • strong resilience under stress
  • interoperability without uncontrolled fragmentation

BIS PFMI, the 2025 Annual Economic Report, Project Agora, Project Guardian, Swift's interoperability work, and DORA all point in the same direction: if cross-chain systems want to support serious financial flows, they will be judged more like settlement infrastructure and less like speculative apps.

The numbers now match the language. DeFi total value locked has grown from roughly $45 billion in 2023 to around $170 billion by mid-2025, and ~72% of stablecoin payment traffic on the WalletConnect network now settles through onchain rails (State of DeFi 2026, Reown). The infrastructure is no longer niche — the scale is already institutional. As stablecoin adoption accelerates and real financial activity continues to route through cross-chain systems, the industry has to stop treating these failures as isolated incidents and start addressing them as a category.

Why Bridges Keep Breaking The Same Way

Bridge exploits often look different on the surface, but they usually rhyme at the architectural level. The exploit path changes, the pressure point changes, but the failure category often does not. Some of the major patterns, though not limited to this list, are below.

1. Shared vault and reserve-pool risk

Many bridge designs lock user assets in a shared pool on the source side and issue wrapped representations elsewhere. Once that model breaks, the loss is no longer tied to one user or one route. It becomes a pooled-risk event, which is exactly why reserve-style bridges can fail so badly.

2. Validator and key compromise

Some bridges move trust away from vault logic and into validator committees, multisigs, or signer sets. That can reduce one category of risk while concentrating another. Ronin and Harmony showed what happens when signer concentration becomes the whole security model.

3. Smart contract and proof-verification bugs

Even systems that move away from multisigs and toward cryptographic verification are only as strong as the verifier implementation itself. Wormhole and Hyperbridge are both reminders that replacing human trust with proof systems is directionally stronger, but it does not forgive bugs in security-critical code. In the Hyperbridge case, independent analysis showed three verification gaps stacked into a single attack path: a proof checker with no bounds validation, proof and request verified as independent checks with no binding between them, and a privileged admin transfer with a zero timelock. One forged message became instant admin takeover and unlimited mint.

4. Mint authority and admin concentration

If a bridge controls a wrapped token on the destination chain, then somewhere in the system there is authority to mint, burn, pause, or administer that asset. Once an attacker reaches that path, the exploit is no longer about bypassing a check. It becomes a route into asset creation or control.

5. Finality and timing mismatch

Cross-chain systems also have to decide when an event on one chain is final enough to act on elsewhere. Different environments have different finality models, block times, and reorg assumptions, and when those are treated too casually, timing risk leaks straight into settlement logic.

In conclusion, the common thread in all of these is concentration of risk. Reserves, signer power, mint authority, proof validation, or finality assumptions end up sitting in one layer, and when that layer fails the blast radius is much larger than it should be. That is the deeper design failure. A validator mistake, a replay bug, a verifier bug, or an admin-takeover path should not all be capable of escalating into systemic loss, yet in much of bridge design they still can.

The Asset Is Not Always What Failed

One of the most important distinctions in cross-chain security is the difference between a native asset and its bridged representation. Arguably, this is where many post-incident conversations become confused. When a bridge representation of an asset is compromised, it does not necessarily mean the source asset itself was compromised. It often means the destination-side representation, and the control model around that representation, failed. Mind you, this distinction goes to the heart of how bridge risk generally works.

The recent exploit on Hyperbridge is a useful example. The attack did not compromise Polkadot consensus or the native DOT asset on Polkadot itself. What failed was the bridge-side representation of DOT on destination chains. It is also why the initially visible loss understated the severity of the incident. Hyperbridge later revised the realized loss to roughly $2.5 million after reconciling activity across Ethereum, Base, BNB Chain, and Arbitrum, but the structural point remained the same: the attacker minted a massive fake wrapped supply and could only extract what destination-side liquidity and escrow exposure would allow. Shallow liquidity may cap extraction in one venue. It does not make the vulnerability mild, and that is an important lesson for the industry.

Invariably, if a system design allows invalid wrapped supply to be created, the problem is not the headline amount lost in one pool. The problem is that the architecture turned one verification failure into asset creation.

The Alternative: Atomic Settlement Without Mint Authority

There is a different way to move value between chains that removes this entire class of wrapped-asset risk. The core idea is not new. It is the logic behind hashed timelock contracts: two parties lock assets against the same cryptographic condition, settlement completes only if that condition is satisfied before timeout, and if it is not, both sides recover through refund paths after the timelock expires. What matters here is not novelty for its own sake. It is that the shape of failure changes. There is no destination-side wrapped asset that needs mint authority, no shared reserve silently accumulating everyone’s risk into one honeypot, and no admin path that can suddenly turn a verification bug into unlimited synthetic supply. Each settlement stays tied to the assets actually locked for that route.

That does not mean HTLC-based systems are trivial or automatically safe. They still require careful timelock design, route-aware assumptions, good coordination, and strong operational guard rails. But they do avoid one of the biggest structural problems in traditional bridge architecture: the combination of centralized mint authority and shared failure surface. This is one of the reasons atomic execution matters. It does not solve every security problem, but it does eliminate a family of failure modes that wrapped mint-and-release designs keep reintroducing.

How Fusion Considers Those Failure Modes

This is where architecture matters more than branding.

Fusion is being built around the idea that cross-chain movement should reduce custody assumptions and reduce partial-settlement risk rather than abstract those risks away behind a more convenient interface.

At the architectural level, the key choice is straightforward: Fusion's direction is not "wrap an asset on one side and mint a representation on the other." It is a vault-free, solver-based model where liquidity is supplied by solvers and coordinated through HTLC-style atomic execution rather than a destination-side wrapped-asset mint path. That matters because it changes what a failure can become.

The Ronin and Harmony lesson was that signer concentration is a dangerous place to anchor the entire security model. Fusion's design direction avoids making a validator committee or multisig the thing that unilaterally creates value on another chain.

The Wormhole and Hyperbridge lesson was that a verification failure should not become infinite mint authority. Fusion's HTLC-centered direction avoids relying on destination-side wrapped-asset minting in the core path, so a proof or message failure is not supposed to escalate into counterfeit supply.

The Nomad lesson was that once a shared trust boundary breaks, reserve-style architectures spread the damage across everyone using the system. Fusion's direction is to keep exposure local to the assets actually locked for a given route rather than aggregating everyone into one bridge reserve.

The broader lesson from all of them is that failure must be containable. That is why Fusion leans toward:

  • atomic execution rather than asynchronous mint-and-release assumptions
  • explicit refund paths rather than operator-dependent rescue paths
  • solver-provided liquidity rather than pooled bridge reserves
  • cryptographic commitments and bounded settlement conditions rather than vague trust in a single gateway layer
  • operational guard rails, adversarial testing, and staged rollout rather than treating architecture alone as enough

The architecture is also built around making the critical guarantees legible: who is locking value, under what conditions, and what the recovery path is if a leg of the swap does not complete. And it is being developed with the view that security is not only about contracts but about the whole operating envelope: proof systems, settlement logic, solver accountability, circuit-breaking, adversarial testing, and the discipline not to make stronger claims than the system can yet support. These design choices, and the reasoning behind them, are laid out in more detail in the protocol documentation.

That does not mean the system is magically safe. It means the design is trying to ensure that the major exploit patterns of the last cycle do not map cleanly onto the protocol's core failure modes. Security by design is not a single feature and not a marketing line. It is a posture that has to be earned through architecture, public testing, operational hardening, and time under stress. The real goal is not to make failure impossible but to make failure local instead of systemic.

The real goal is not to make failure impossible. It is to make failure local instead of systemic.

What Security By Design Should Mean In Cross-Chain Systems

Security by design is not just "do an audit." It is a set of architectural choices about how much damage a mistake is allowed to cause, and in cross-chain infrastructure that should mean at least six things.

1. Minimize standing permissions

Permissions should be as narrow as possible and scoped to the exact action being performed whenever practical. The more systems rely on standing approvals or broad operational authority, the more users and integrators are exposed to abuse that persists beyond a single transaction.

2. Make authorization legible

Users should be able to understand what they are signing, developers should be able to understand what the system enforces on-chain versus off-chain, and operators should know exactly what their powers are and where those powers end — unreadable transaction data is not just a UX defect, it is a security defect.

3. Prefer atomic or contingent settlement

One of the most dangerous properties in cross-chain systems is partial completion: one side updates, another side does not, and the recovery path becomes a security event. Wherever possible, systems should be designed so value transfer either settles safely and completely, or reverts into a defined recovery path with minimal exposure. If atomicity is not fully possible, the contingent steps should still be explicit and bounded.

4. Replace hidden trust with verification

If a system depends on relayers, solvers, coordinators, proofs, or attestation flows, those assumptions should be explicit and constrained. The closer verification happens to execution, the less room there is for silent drift between what the system claims and what it actually guarantees.

5. Add real guard rails

Pause switches, circuit breakers, constrained admin roles, multi-party control, slashing, insurance mechanisms, rate limits, and timelocks are not cosmetic. They are how systems survive adverse conditions without relying on heroics. Cross-chain systems should be designed under the assumption that something will eventually go wrong, and guard rails are what determine whether that event becomes a contained incident or a chain reaction.

6. Treat operational resilience as part of security

A protocol is not secure if it only works in normal conditions. It has to behave predictably under congestion, node failure, chain reorgs, operator downtime, market stress, and adversarial behavior. Testing should reflect this, and so should deployment design, monitoring, recovery procedures, and governance. Recent incident response has reinforced this point: a serious cross-chain system should have explicit containment paths, cross-chain reconciliation, transparent restart criteria, and a rule that operations do not resume until fixes are patched, independently audited, and paired with additional safeguards.

The Phishing Problem Is Also Design Debt

Bridge exploits dominate headlines, but they are not the only security failure that matters. Hacken's Q1 2026 report put total Web3 losses at roughly $482.6 million across 44 incidents, with phishing and social engineering accounting for $306 million. Chainalysis's writeup on Drift points to the same broader lesson: valid-looking actions can still be unsafe when signer workflows, permissions, and human trust are weak.

Broad approve and transferFrom patterns, opaque transaction data, and poor authorization surfaces made dangerous behavior feel normal — that is not just a wallet problem, it is design debt, and security by design has to shrink dangerous surface area before the user ever sees it.

Call To Action - The Standard Has To Rise

Crypto will not become mature infrastructure because a small set of technical users can avoid the sharp edges. It becomes mature when the defaults get safer: when users are not expected to parse opaque signing under pressure, when developers build on explicit guarantees, and when incidents do not stay small by luck. That is especially important if cross-chain systems want real institutional and TradFi adoption. Bridges have lost more than $2.8 billion in the last two years alone, and that is not the backdrop under which serious financial institutions will commit to cross-chain rails at scale.

Security by design is not one tool, one audit, or one tweet after a hack. It is systems where the safest path is the default, trust is constrained instead of hand-waved, and failures are contained before they become systemic. If this is the direction you think cross-chain infrastructure needs to move, join the waitlist, or for the broader settlement case read my earlier piece on cross-chain settlement.

The industry does not need one more story about why the latest exploit was unfortunate. It needs architectures where failures stay contained instead of becoming systemic.

That is the standard. And that is the direction cross-chain infrastructure has to move.