Elevated risk — never been directly hacked, but relies on a custom oracle system with a proven attack vector demonstrated in the Polymarket incident
Risk Breakdown
Top Risks
UMA optimistic oracle demonstrated vulnerability in the March 2025 Polymarket attack ($7M loss) where a single entity accumulated 25% of voting power to manipulate market resolution. The same vector could theoretically be applied to Across bridge verification.
Intent-based architecture depends on active relayer network; relayer concentration creates censorship risk and single points of failure for bridge execution.
Custom oracle system (UMA optimistic oracle) with a 1-hour challenge window trades security for speed. If disputers are offline or economically disincentivized, fraudulent fills could be finalized.
Frequently Asked Questions
Is Across Protocol safe to use?
What are the main risks of using Across Protocol?
What is Across Protocol's risk score breakdown?
How does Across Protocol compare to other Bridge protocols?
Has Across Protocol ever been hacked or exploited?
Get risk alerts before it's too late
Weekly grade changes, downgrade alerts, and new protocol risk findings. Free.