Clearing & Settlement

Cross-Chain Bridge Settlement

Settlement via cross-chain bridges — compliance gap at bridge layer, oracle security at finality.

Vendors

Chainlink CCIP · LayerZero · Wormhole

Compliance Center

Compliance gap at bridge layer (Authorization) + oracle security (Facilitation)

PT6 — Cross-chain bridge settlement · Rails: post-trade · Protocols: Chainlink CCIP, LayerZero, Wormhole · Origin: United States — Federal
CTR (USD 10,000+)TRAVEL-RULE (USD 3,000+)ENHANCED-DUE-DILIGENCE (USD 50,000+)
PT6 — CROSS-CHAIN BRIDGE SETTLEMENTYOU ARE HERE● Settlement Inst…POLICY≡ Bridge Selectio…CODE⬣ Oracle Attestat…CODE≡ Destination Cha…CODE● Settlement Conf…POLICYIntentIdentityDiscoveryNegotiationTransportAuthorizationFacilitationFinalitySTEP 1STEP 2STEP 3STEP 4STEP 5ETHEREUMBASEVisual system: StablecoinAtlas.com · Steps mapped to 8 STP Stages
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKETHEREUM
L5 APPLICATIONWallet UX, consent, policy engineBank customer channel / issuer app

Step 1 · Settlement Instruction (Post-Trade Handoff)Policy-EnforcedBlockchain-Native

A post-trade settlement instruction that requires value to move between two different blockchains — the problem that shouldn't exist but does.

**Cross-rail reference: Stages 1-4 fired on the originating rail (Securities, Wholesale, or Retail).** A settlement requires value (stablecoins, security tokens, or both) to move from one chain to another. No native mechanism exists for cross-chain settlement — a bridge must be used. L5 lit only.

⚠ ENHANCED-DUE-DILIGENCE triggered at USD 50,000 — 31 CFR § 1010.312 — Enhanced Due Diligence (United States — Federal)
Counterparty
Originating rail settlement engine
Latency
Instant
Finality
N/A — bridge selection begins
Vendors
EOA / ERC-4337 · MetaMask / Fireblocks
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKLOCKETHEREUM
L3 EXECUTIONSmart contracts, swap / bridge logicClearing & matching engine
L2 CONSENSUSValidator ordering, block productionRTGS settlement engine
L1 NETWORKP2P, finality, data availabilityMessaging rail (SWIFT / Fedwire)
◆ Enforcement Line — code-enforced below, policy-enforced above

Step 2 · Bridge Selection & LockCode-EnforcedBlockchain-Native

Selecting a correspondent bank for a cross-border wire — but bridges have no banking license, no capital requirements, and (usually) no regulatory oversight.

Value is locked in the bridge's smart contract on the source chain. The bridge (Chainlink CCIP, LayerZero, or Wormhole) holds the locked value in escrow while the cross-chain message propagates. L1+L2+L3 lit — the lock executes below the enforcement line. **Honesty marker:** bridge smart contracts are the highest-value targets in DeFi. $2.8B+ lost to bridge exploits since 2021 (Ronin $625M, Wormhole $320M, Nomad $190M). D10 (operational resilience) is the critical domain — and it's the weakest.

Counterparty
Bridge smart contract (source chain)
Latency
~12s · Ethereum block
Finality
Locked · awaiting cross-chain attestation
Vendors
Circle CCTP v2 · Ethereum P2P + EIP-4844 · Ethereum PoS Validators · Uniswap v4 · Chainalysis OFAC Oracle
—— Chain Boundary · Ethereum → Base · Bridge attestation (CCIP/LayerZero/Wormhole) ——
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKBASE
L3 EXECUTIONSmart contracts, swap / bridge logicClearing & matching engine
◆ Enforcement Line — code-enforced below, policy-enforced above

Step 3 · Oracle Attestation & Compliance GapCode-EnforcedBlockchain-Native

A correspondent bank confirming receipt of a wire — except the 'correspondent' is an oracle network, not a regulated institution.

The bridge's oracle network attests to the lock event on the source chain. For CCIP: Chainlink's DON (Decentralized Oracle Network) with multiple independent attestors. For LayerZero: configurable oracle + relayer. For Wormhole: 19-of-19 guardian set. **Honesty marker:** this is the compliance gap. No bridge oracle is a regulated entity. No AML screening happens at the bridge layer (unless the token itself has a blocklist). No Travel Rule data crosses with the value. The oracle is the trust assumption — and oracle manipulation is the attack vector.

⚠ TRAVEL-RULE triggered at USD 3,000 — 31 CFR § 1010.410(f) — Funds Transfer Recordkeeping (United States — Federal)
Counterparty
Bridge oracle network (unregulated)
Latency
Variable · CCIP ~15min / LayerZero ~3min / Wormhole ~15min
Finality
Pre-condition — oracle must attest before release
Vendors
Chainalysis OFAC Oracle · Uniswap v4
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKRELEASEBASE
L3 EXECUTIONSmart contracts, swap / bridge logicClearing & matching engine
L2 CONSENSUSValidator ordering, block productionRTGS settlement engine
L1 NETWORKP2P, finality, data availabilityMessaging rail (SWIFT / Fedwire)
◆ Enforcement Line — code-enforced below, policy-enforced above

Step 4 · Destination Chain ReleaseCode-EnforcedBlockchain-Native

The correspondent bank releasing funds to the beneficiary — except if the oracle was compromised, the 'funds' are counterfeit.

Value is released (minted or unlocked) on the destination chain based on the oracle attestation. L1+L2+L3 lit. For native bridges (CCTP): Circle mints fresh USDC — no wrapped tokens, minimal bridge risk. For non-native bridges: wrapped tokens are minted, backed by the locked value on the source chain. **Honesty marker:** wrapped tokens introduce counterparty risk — the wrapped USDC is only as good as the bridge's smart contract security. D7 (Travel Rule) is listed because it should apply — but no mechanism transmits originator/beneficiary data across bridges.

⚠ CTR triggered at USD 10,000 — 31 CFR § 1010.311 — Currency Transaction Report (United States — Federal)
Counterparty
Bridge smart contract (destination chain)
Latency
~2s · Base block
Finality
Released on destination chain
Vendors
ERC-4337 Smart Account · Ethereum (via OP Stack) · Coinbase Sequencer · Uniswap v4 · Chainalysis OFAC Oracle
L5 APPLICATIONL4 ACCOUNTL3 EXECUTIONL2 CONSENSUSL1 NETWORKBASE
L5 APPLICATIONWallet UX, consent, policy engineBank customer channel / issuer app

Step 5 · Settlement Confirmation & Risk AssessmentPolicy-EnforcedBlockchain-Native

Confirming a cross-border settlement completed — but adding a risk note that the bridge is an unregulated intermediary.

Cross-chain settlement is confirmed. Both chains show the completed transfer. L5 Application lit only. **Honesty marker:** the settlement is 'final' on both chains, but the bridge layer introduced risks that don't exist in same-chain settlement: oracle manipulation, smart contract exploits, wrapped token depegs, and the complete absence of regulatory oversight at the bridge layer. The post-trade compliance framework has a hole shaped like a bridge. Future regulatory frameworks (MiCA's bridge provisions, potential GENIUS Act treatment) may address this — but as of now, bridges are the wild west of settlement infrastructure.

Active Compliance Checkpoints
C11 SAR/CTR filing via BSA E-Filing — 31 CFR § 1010.320 (United States — Federal) · GENIUS §9
Counterparty
Settlement participants (both chains)
Latency
Instant on destination release
Finality
Final on both chains · bridge risk unmitigated
Vendors
ERC-4337 Smart Account · Coinbase Smart Wallet · Coinbase Paymaster

Resolved 5 steps across 2 chain(s). 3 threshold(s) triggered. Frameworks: Bank Secrecy Act, GENIUS Act, OFAC Sanctions Program, FATF Recommendation 16 (Travel Rule), Common Reporting Standard / FATCA.