How Does NEAR Intents Work?
NEAR Intents is a cross-chain bridge infrastructure built on NEAR Protocol that lets users seamlessly transfer assets across ~25 blockchains including Ethereum, Bitcoin, and Solana. Instead of manually bridging, users simply declare what they want and competitive solvers handle the execution. With $48M in TVL and $5B in all-time volume, it is a growing cross-chain solution. The main risks are inherent to bridges — cross-chain verification exploits are among the highest-impact DeFi attacks historically.
TVL
$63M
Sector
Bridge
Risk Grade
B
Value Grade
C-
Core Mechanisms
8.1.3
NovelIntent-based cross-chain message passing: users declare desired outcomes and solvers compete to fulfill them across ~25 chains
Novel intent-based bridge architecture; users specify what, not how; solvers handle execution
8.4.1
Solver/relayer network: competitive market of solvers fulfills user intents by executing cross-chain transactions for fees
Similar to other intent-based systems but integrated into NEAR's chain abstraction layer
8.1.2
Cross-chain liquidity pools enabling asset swaps between supported chains
Standard liquidity pool bridge component for settlement
6.4.3
Cross-chain state verification using NEAR's chain signatures and light client proofs
Custom verification infrastructure leveraging NEAR's MPC network for chain signatures
2.1.2
Solver fees and bridging fees charged on cross-chain transactions
Standard percentage-based fee model for bridge operations
5.4.2
NEAR governance and security oversight of bridge operations with emergency pause capabilities
Standard governance guardian pattern for bridge security
How the Pieces Interact
If cross-chain state verification fails or is delayed, solver executions may proceed based on stale or incorrect state, leading to incorrect asset transfers
Solvers may manipulate execution order or route through low-liquidity pools to extract MEV from user intents
Insufficient solver competition could lead to poor execution quality; solver collusion could result in systematically worse prices for users
Verification delays across any of the ~25 supported chains could create temporary liquidity imbalances that are exploitable
Fee competition may drive solvers to cut corners on verification or take execution shortcuts that increase user risk
What Could Go Wrong
- Cross-chain bridge risk: any bridge carries inherent risk of fund loss from validator collusion, message forgery, or smart contract exploits across ~25 supported chains
- Intent resolution complexity: intent-based architecture introduces solver/relayer dependencies where incorrect or malicious execution could result in user losses
- Multi-chain attack surface: supporting ~25 chains means vulnerabilities on any single chain's integration could compromise the entire system
Cross-Chain Verification Exploit
ModerateTrigger: An attacker exploits a vulnerability in the light client verification or MPC chain signature system to forge cross-chain messages
- 1.Attacker discovers vulnerability in chain signature verification for one of the ~25 supported chains — Forged messages allow unauthorized minting or release of assets on destination chain
- 2.Attacker drains liquidity pools or mints unbacked assets across affected routes — Direct financial loss to liquidity providers; minted assets flood secondary markets
- 3.Other chains' integrations are paused while the vulnerability is assessed — All cross-chain operations halted; users with in-flight transactions face uncertainty
- 4.NEAR team deploys emergency fix and conducts security review — Bridge resumes after days to weeks; affected users may face permanent losses depending on insurance/recovery mechanisms
Risk Profile at a Glance
Overall: B (27/100)
Lower score = safer