← Back to Hack Database
🌉

Cross-Chain Bridge Threat Model

MethodologyETHARBOPBaseN/Amethodology
Overview

Research framework for bridge exploit classes: key compromise, message forgery, proof bypass, and replay/finality edge cases.

Research
Findings
4
Chains
N/A
Bounty Range
Research Details
CategoryMethodology
Affected ChainsETH, ARB, OP, Base
Date Published2026-02-27
Bounty ValueN/A
← Back to Hack DatabaseAll Research