Research framework for bridge exploit classes: key compromise, message forgery, proof bypass, and replay/finality edge cases.