Learn how signature replay, relayer spoofing, and validator compromise threaten cross-chain bridges and how to identify secure blockchain bridges.