Bridge exploits are a perennial problem, and almost all of them share a single failure mode: the destination chain trusting one attestor โ a federation, a multisig, an oracle pair, or a DVN โ to vouch for events on the source chain.
Stronger designs exist. ๐