How Does tBTC Work?
tBTC is a decentralized Bitcoin bridge operated by the Threshold Network, enabling BTC holders to use their Bitcoin across Ethereum and 7+ other blockchains. With $376M in locked BTC and over 25,000 tBTC minted, it is one of the leading decentralized BTC wrappers. Its B- grade reflects moderate bridge risk inherent to cross-chain operations, balanced by years of operation without loss-of-funds incidents.
TVL
$437M
Sector
Bridge
Risk Grade
B-
Value Grade
C-
Core Mechanisms
8.1.1
Threshold cryptography bridge: lock BTC, mint tBTC via threshold signature scheme
Lock-and-mint pattern is standard. The threshold cryptography implementation is a specific variant but the bridge pattern itself is well-established.
3.1.1
T token staking for node operators providing threshold cryptography services
Standard pro-rata staking for service provision. Operators stake T tokens and earn rewards for running bridge nodes.
5.1.1
Threshold DAO governance with T token voting
Standard token-weighted governance via DAO. T holders vote on network upgrades and parameter changes.
8.2.1
Canonical tBTC on Ethereum with bridged versions on Arbitrum, Base, Sui, Starknet, etc.
Standard canonical token on primary chain with bridged versions elsewhere.
8.3.1
NovelMulti-chain tBTC deployment with unified supply tracking across 8+ networks
Managing a unified Bitcoin-backed token across 8+ heterogeneous chains (EVM, Sui, Starknet) with supply invariant guarantees is a novel challenge beyond standard multi-chain deployments.
How the Pieces Interact
Each new chain integration (Sui, Starknet, etc.) introduces a new messaging layer dependency. A vulnerability in any chain's bridge adapter could allow minting of unbacked tBTC on that chain.
Bridge security depends on honest node operators. If T token value drops significantly, the economic security (staked value) may become insufficient relative to the BTC being custodied.
Cross-chain supply invariant violations could result in more tBTC circulating than BTC locked. Accounting complexity increases with each new chain.
Governance controls operator curation. A governance attack could add malicious operators or change threshold parameters to reduce security.
What Could Go Wrong
- Threshold cryptography relies on a group of randomly selected node operators to custody deposited Bitcoin. If a sufficient threshold of operators is compromised or colluding, BTC could be stolen, though the random selection and threshold requirement mitigate single-point-of-failure risk.
- Cross-chain bridge operations between Bitcoin and multiple EVM chains (Ethereum, Arbitrum, Base, Sui, etc.) create a large attack surface. Each chain integration introduces additional messaging layer risk, though tBTC has operated since 2020 with no loss-of-funds incidents.
- tBTC redemption involves coordinating between the Ethereum contracts and Bitcoin network, with potential delays during high congestion. Institutional upgrades have improved minting to single-transaction flow, but redemption still depends on operator coordination.
Cross-Chain Supply Invariant Violation via Bridge Adapter Exploit
TailTrigger: A vulnerability in one of tBTC's 8+ chain-specific bridge adapters allows minting of unbacked tBTC on a secondary chain
- 1.Attacker exploits a vulnerability in the Sui or Starknet bridge adapter to mint tBTC without corresponding BTC lock on Bitcoin — Unbacked tBTC enters circulation on the exploited chain
- 2.Attacker bridges unbacked tBTC back to Ethereum and redeems for actual locked BTC — BTC reserves on the Bitcoin network are drained, creating a deficit
- 3.tBTC supply exceeds locked BTC, breaking the 1:1 backing guarantee — tBTC depegs across all chains as market prices in the deficit
- 4.DeFi protocols using tBTC as collateral face liquidation cascades — Over 25,000 tBTC holders across 8+ chains face losses; DeFi protocols using tBTC collateral experience bad debt
Risk Profile at a Glance
Overall: B- (30/100)
Lower score = safer