The Kelp DAO exploit on April 18, 2026 did not just burn $292 million of rsETH. It reset the conversation about cross-chain bridges. If you hold assets on more than one chain — and most active Bitcoin, Ethereum and L2 users do — you need a working security framework, not vibes.

This guide is long on purpose. It is built from the lessons of roughly $2.8 billion in bridge losses accumulated across Web3 (close to 40% of all value ever stolen in crypto), and from the specific failure modes exposed by the Kelp DAO incident. By the end you will know how bridges actually work, where they break, how to evaluate one before sending a single satoshi across it, and what user-side hygiene separates people who survive these incidents from people who tweet screenshots of their empty wallets.

Why bridges exist — and why they are hard

Bitcoin, Ethereum, Solana, each layer 2 rollup, and each alt-L1 has its own ledger and its own security model. A "bridge" is anything that lets value on one ledger represent or trigger value on another. Users want bridges because they want to earn yield on one chain, trade on another, settle on a third, and not maintain five wallets.

The hard part is that a bridge must reproduce a fact from chain A ("Alice locked 10 ETH") on chain B, in a way that chain B can trust without running chain A's full consensus. Every design choice that makes that cheaper or faster introduces a trust assumption. Every trust assumption is a potential exploit. That is why bridges are structurally more fragile than either chain they connect.

A short taxonomy of bridges

Understanding which kind of bridge you are using is step one of safe use.

Lock-and-mint bridges hold the original asset on the source chain and mint a wrapped representation on the destination chain. Most rsETH-on-L2, wBTC-on-Ethereum and synthetic-ether products work this way. Fragile by design: a compromise of the lock contract means every wrapped unit on every chain loses its backing.

Burn-and-mint bridges are the canonical form for stablecoins like Circle's CCTP: the source token is burned, a message crosses, the destination token is minted. No pooled reserve to drain, but the cross-chain message must be unforgeable.

Native-swap bridges (Thorchain, Maya, certain DEX aggregators) route swaps through cross-chain liquidity pools without any wrapped asset — the user sends native ETH on Ethereum and receives native BTC on Bitcoin, with LPs absorbing the inventory risk.

Liquidity-pool bridges (many Stargate, Synapse, Across variants) maintain mirrored pools on each chain. Users deposit on one side, receive on the other, and LPs rebalance. No lock contract, but LP economics and rate-limit configuration become the security frontier.

Atomic-swap bridges and HTLCs use cryptographic escrows that unlock only if both sides deliver. Highly secure in theory, slow and illiquid in practice, which is why they are niche.

Lock-and-mint bridges — including the Kelp DAO bridge — concentrate risk the most. They are also, unfortunately, what most restaking and wrapped-asset products rely on.

Seven ways bridges get exploited

Almost every bridge hack in history falls into one of these patterns.

  1. Forged or replayed cross-chain messages. The attacker produces a message that looks valid to the destination contract but was never authorized by the source. This is what happened to Kelp DAO via LayerZero's messaging layer, and to Nomad in 2022.
  2. Validator or relayer compromise. If the bridge is guarded by an N-of-M multisig or an off-chain validator set, the attacker gets to M – N + 1 signers (Ronin, Harmony Horizon, Multichain).
  3. Oracle manipulation. Prices used by the bridge to settle or rebalance are pushed by a manipulated oracle, and the attacker walks out with the spread.
  4. Smart-contract bugs. Reentrancy, signature verification flaws, missing access control on admin functions, broken nonce handling. These account for a large share of historical losses.
  5. Frontend and DNS hijacks. A phishing UI or a hijacked domain routes legitimate approvals to an attacker-controlled contract. The bridge itself is fine; the interface is hostile.
  6. Approval abuse. Users grant unlimited spending approvals to a bridge contract; the contract is later upgraded or compromised and drains them without a further click from the user.
  7. Economic / MEV attacks. Rate-limit misconfiguration allows a single attacker to drain a pool in one transaction faster than monitoring can react.

How to evaluate a bridge before using it

Apply this checklist every single time, not just the first time.

Audits and formal verification

Look for at least two audits by reputable firms (Trail of Bits, OpenZeppelin, Certora, Sigma Prime, Spearbit) plus, for larger bridges, formal verification of the core contracts. One audit from a firm you have not heard of is not a substitute. Audits must cover the current version of the contracts deployed on mainnet, not a version from six months ago.

Bug bounties

Top-tier bridges maintain bug bounty programs in the $1–10 million range on platforms like Immunefi. A bridge carrying nine-figure TVL with a $50K bug bounty is telling you how seriously it takes its own security.

Rate limits

Serious bridges now implement per-lane rate limits — a cap on how much value can cross a given route in a given window. Rate limits are the reason a half-billion-dollar bridge is not drained in one transaction on day one of an exploit. Check the docs for a published rate-limit schedule; if there is none, assume there is none.

Validator / messaging model

For each bridge you use, answer three questions in plain language: who signs the cross-chain messages, what happens if a majority of them collude, and how many of them can be compromised before user funds are at risk? If the answer involves a single multisig or an undisclosed validator set, you have found a single point of failure.

Upgradeability and admin keys

Is the bridge contract upgradeable? By whom? With what timelock? A 48-hour timelock on upgrades is a meaningful safety margin; an immediately-upgradeable contract behind a 2-of-3 multisig is not.

History of incidents

A bridge that has survived a stress event (market crash, gas spike, partial compromise) with users whole is more trustworthy than a shiny new bridge that has never been stress-tested. Look at the team's response to prior issues.

What Kelp DAO got wrong — and what any bridge can learn from it

The Kelp DAO post-mortem will take weeks. From public information so far, three failures stand out.

First, the trust assumptions of LayerZero's default messaging configuration were not conservative enough for the scale of collateral Kelp's bridge was holding. LayerZero allows integrators to choose oracle and relayer sets; the default — which many projects adopt — is trust-minimized only within a certain threat model. Exceeding the scale that model assumes is a risk that integrators have to manage, not LayerZero.

Second, rate limits were insufficient or absent. Draining 18% of rsETH's circulating supply in a single attack window implies there was no meaningful per-transaction or per-block cap.

Third, the bridge concentrated too much collateral in one place. A single Ethereum contract backed rsETH on more than 20 chains. That was operationally efficient but financially catastrophic once the single contract was drained.

The generalized lesson for any user: do not treat the existence of a wrapped or restaked token as a guarantee of its backing. The collateral is only as safe as the bridge and the messaging layer behind it.

Your user-side security playbook

You cannot audit a bridge yourself. You can stack safer habits.

Do a small test transfer first. Always. Send a trivial amount, confirm it arrives, confirm the destination balance is correct, then send the real amount. This catches UI impersonation, wrong-address errors and broken contracts.

Prefer native-swap or burn-and-mint bridges for routine moves. If you are moving ETH between Ethereum and Arbitrum or USDC across chains via CCTP, you are on the safest rails the industry currently offers. Reserve lock-and-mint bridges for specific DeFi positions that actually need the wrapped token.

Revoke approvals aggressively. After using a bridge, revoke the token approval via Etherscan's token-approval tool or a wallet revoke app. Unlimited approvals that linger for months are how users get drained six months after a bridge compromise.

Use a dedicated bridging wallet. Keep a hot wallet with just enough funds to cover your bridge activity. Your long-term Bitcoin and ether sit in a hardware wallet that has never signed a bridge transaction and never will.

Bookmark the official URL. Phishing UIs of bridges are endemic. Always open the app from a bookmarked link or the project's official Twitter/X bio, never from a search ad.

Watch the monitoring feeds. Following ZachXBT and a handful of security researchers on X is not optional if you hold meaningful assets in DeFi. The gap between "exploit detected" and "your funds are gone" is often hours, not days.

Diversify bridges. If you need to move large value, split it across two or three independent bridges. The correlation of failure across different bridge designs is much lower than the correlation across wallet addresses.

Size your exposure. Never bridge more than you can afford to lose. This rule sounds tired; it is still the single most powerful mitigator of bridge risk.

Red flags that should stop you cold

Stop and reconsider if you see any of the following.

  • The bridge has no public audit reports, or only a single audit from an unrecognized firm.
  • Large admin privileges (contract upgrades, pause, parameter changes) with no timelock.
  • Aggressive yield incentives that do not match the bridge's published fee schedule — that is subsidized capital attraction, often a prelude to TVL inflation followed by a rug.
  • Withdrawal queues or paused withdrawals without a public incident post.
  • Unusual activity on the team's official social channels (handle changes, verified-badge removals, new admins).
  • Sudden spikes in bridge TVL not matched by protocol news.

If a bridge you used is exploited

Move fast, but move correctly.

  1. Confirm from at least two independent sources that the exploit is real. Panic moves cost money too.
  2. Revoke every approval associated with the bridge contracts.
  3. Move remaining funds to a fresh, isolated wallet you control.
  4. File a support ticket and a public on-chain record so you are in the documented victim list when recovery happens.
  5. Do not engage with DMs offering recovery services. Recovery scams follow every exploit within hours.
  6. Wait for official recovery plans. If the protocol offers a redemption or claims process, use the official channels only.

FAQ

What is a cross-chain bridge in simple terms? A cross-chain bridge is any system that moves value, data or messages between two blockchain networks that do not natively talk to each other. Some use locked collateral and wrapped tokens, some use mint-and-burn accounting, some use liquidity pools, and a few use cryptographic atomic swaps. Each approach trades off speed, cost, liquidity and trust assumptions.

Are bridges safe to use in 2026? Safer than in 2022 but still the highest-risk category in DeFi. Audits are better, rate limits are common, bug bounties are larger — but $292 million can still vanish in a single weekend, as the Kelp DAO incident shows. Safe usage depends on both the bridge's engineering and your own habits (test transfers, revoked approvals, wallet isolation).

Which cross-chain bridges are most reliable right now? There is no single right answer, but for most users the safest routes are Circle CCTP for USDC, canonical rollup bridges (Arbitrum, Optimism, Base) for their native L2s, Chainlink CCIP for institutional lanes, and native-swap protocols like Thorchain for cross-chain swaps that do not need a wrapped asset. For restaking and wrapped tokens, proceed with more caution after Kelp DAO.

How do I recover funds after a bridge exploit? Realistically, user-side recovery is limited. Your best leverage is to be on the protocol's documented victim list, follow official channels, and cooperate with any on-chain forensics efforts (ZachXBT, Chainalysis, Elliptic). Most successful recoveries in 2024–2025 involved law-enforcement coordination with centralized exchanges where the attacker tried to off-ramp.

Is using a hardware wallet enough to protect me when bridging? A hardware wallet protects your private key from malware; it does not protect you from signing a malicious or exploited bridge transaction. Review every transaction on the hardware wallet display, prefer bridges whose contract calls your device can decode, and keep a separate hot wallet for bridging when possible.

Sources

Disclaimer: This article is for informational and educational purposes only and does not constitute investment, legal or tax advice. Digital assets are highly volatile and can lose value quickly. Do your own research and consult a licensed advisor before making any investment decision.

À lire aussi