Here's the concrete process. Before bridging significant value, run through these checks โ each one narrows your risk surface.
Start with DeFiLlama's bridge page (defillama.com/bridges). Sort by TVL and volume. A bridge with high TVL relative to its security budget is a riskier target. Then find the bridge's documentation and identify the verification model โ external, optimistic, or native. If external, find the validator set or multisig configuration. If optimistic, find the challenge window and dispute mechanism.
Next, check the contracts on-chain. For Ethereum-based bridges, go to the bridge contract on Etherscan. Look at the owner or admin address. If it's a multisig, check the signer threshold and signer addresses on app.safe.global. Check if there's a timelock contract between the multisig and the bridge โ a timelock gives users time to exit if a malicious upgrade is proposed. L2Beat (l2beat.com) maintains detailed risk assessments for rollup bridges including upgrade delays, and their "Bridges" section covers many third-party bridges with granular risk breakdowns.
Finally, check audit history. Not just "has it been audited" but by whom, when, and whether the current deployed contracts match the audited code. Bridge exploits have occurred in contracts that were audited but later upgraded to unaudited versions.
โ Common mistake: Checking security once and assuming it's static. Bridge contracts can be upgraded, multisig signers can change, and validator sets rotate. A bridge that was secure six months ago may have different parameters today.