Useful UX layer for cross-chain but historical exploits + shared-approval architecture + downstream bridge inheritance make this a riskier sit-on-approvals proposition than it appears.
Risk Breakdown
Top Risks
Two separate exploits (March 2022 $600K, July 2024 $11.6M) — both involving arbitrary-call bugs in swap facets with user-approved tokens. Pattern of issues in the facet/Diamond architecture
Aggregator model means LI.FI inherits every underlying bridge's security (including LayerZero, Stargate, Across, Hop, etc.) — KelpDAO's LayerZero exploit in April 2026 is directly inherited through any LayerZero-routed path
Large infinite-approval surface: any user who ever used LI.FI has (likely) granted the LI.FI Diamond contract unlimited token approvals, making every future contract facet a potential drain vector
Frequently Asked Questions
Is LI.FI safe to use?
What are the main risks of using LI.FI?
What is LI.FI's risk score breakdown?
How does LI.FI compare to other Bridge protocols?
Has LI.FI ever been hacked or exploited?
Get risk alerts before it's too late
Weekly grade changes, downgrade alerts, and new protocol risk findings. Free.