Cross-chain bridges let different blockchains share data or assets (like tokens). Here’s how they work:
- When you send tokens from Chain A to Chain B, the bridge locks or burns (destroys) them on Chain A.
- It then mints (creates) equivalent tokens on Chain B using smart contracts (automated rules) or trusted middlemen.
Why are they often hacked?
- Complex code: Bridges rely on complicated software. Small coding errors can let hackers steal funds.
- Centralization: Some bridges use a small group of validators or companies to manage transfers. If these are compromised, attackers can drain funds.
- Large funds: Bridges hold huge amounts of locked assets, making them tempting targets.
- Security gaps: Weaknesses in smart contracts or validator systems (like stolen passwords) are common attack points.
In short, bridges connect blockchains but face risks due to technical flaws, central control, and high-value targets.