Convenient UX, but as a frontend to LI.FI plus 23 bridges it's a thin wrapper over a thick pile of risks that just got validated by the KelpDAO exploit.
Risk Breakdown
Top Risks
Jumper is the consumer front-end for LI.FI — it inherits every LI.FI vulnerability (two historical exploits, Diamond-facet shared-approval architecture, upstream bridge risks)
Consumer-facing product means less-sophisticated users grant infinite approvals without understanding the implications, widening the victim surface for any future exploit
~$20B cumulative bridge volume means a large historical user footprint with active approvals — any LI.FI facet exploit cascades directly into Jumper users
Frequently Asked Questions
Is Jumper Exchange safe to use?
What are the main risks of using Jumper Exchange?
What is Jumper Exchange's risk score breakdown?
How does Jumper Exchange compare to other Bridge protocols?
Has Jumper Exchange ever been hacked or exploited?
Get risk alerts before it's too late
Weekly grade changes, downgrade alerts, and new protocol risk findings. Free.