Tiger Research Reports
Project
Hyperlane: The Permissionless Cross-Chain Protocol Connecting 150+ Blockchains
0:00
-7:56

Hyperlane: The Permissionless Cross-Chain Protocol Connecting 150+ Blockchains

How Permissionless Interoperability Protocol Eliminates Integration Barriers

This report was written by Tiger Research, analyzing Hyperlane's permissionless cross-chain protocol that connects 150+ blockchains, its modular security framework, and the transformative potential for eliminating integration barriers in Web3 interoperability.


TL;DR

  • True permissionless deployment: Unlike competitors that require approval processes or whitelisting, Hyperlane allows any developer to deploy and connect to different chains instantly without gatekeeping, creating a fundamentally different onboarding model than other interoperability protocols

  • Flexible modular security: While other bridges use fixed security models, Hyperlane's Interchain Security Module (ISM) lets applications configure their own security requirements (from basic validator signatures to multi-layered verification), enabling both fast microtransactions and high-security asset transfers on the same infrastructure.

  • Developer-first architecture: Hyperlane's TypeScript SDK, CLI tools, and comprehensive documentation lower the technical barrier for cross-chain integration, making interchain messaging accessible through simple APIs rather than requiring complex custom implementations.


🇰🇷 한국어로 읽기 →

1. A Turning Point for Blockchain Connectivity

The blockchain ecosystem is shifting from isolated development toward genuine interconnectivity. Instead of building siloed environments, projects are increasingly seeking ways to integrate within a broader network.

However, most integrations today remain manual and fragmented. New projects must negotiate directly with each bridge or interoperability provider—often incurring high costs, delays, and administrative overhead. This imposes structural barriers to participation, even for technically advanced teams, and ultimately hinders ecosystem-wide scalability.

This challenge is not new. In the early 1990s, enterprises operated isolated intranets with separate rules and access permissions. Cross-network communication was possible but required time-consuming technical coordination and mutual authorization.

The turning point came with the introduction of standard protocols like HTTP and TCP/IP, which enabled open, permissionless access to a unified Internet. These standards unlocked exponential growth and global participation by replacing complexity with simplicity, laying the foundation for the digital revolution.

The blockchain industry now faces a similar inflection point. To unlock its next phase of innovation, it must move beyond fragmented, permission-based integrations toward standardized, permissionless connectivity. Lowering entry barriers is essential for widespread participation and ecosystem-wide innovation.

2. Hyperlane’s Answer: Connecting Without Permission

2.1. Permissionless and Open-Source

As previously explained, new projects historically faced significant hurdles when joining existing blockchain ecosystems. Integrating with bridges or interoperability protocols often required a complex approval process—including manual reviews, technical integration assessments, and security audits. Even after passing these checks, projects were frequently burdened with high integration costs, making connectivity prohibitively expensive.

Hyperlane addresses these structural limitations through a permissionless architecture—a fundamentally different model that allows any project to connect freely. Under this approach, there is only one requirement: compatibility with a supported virtual machine (VM) environment—such as Ethereum/EVM, Solana/SVM, or Cosmos/CosmWasm. Once that condition is met, integration can proceed without a complex approval process.

As a result, the barriers to entry for blockchain projects have been significantly lowered. What once took months to complete can now be accomplished immediately—so long as technical compatibility is met. Still, the question remains: how does permissionless integration actually work?

To answer this, let’s look at a practical example involving Ryan, a Web3 developer. Ryan is building a new project called Tiger, which operates its own mainnet. Currently, users on the Tiger chain are limited to the Tiger ecosystem and cannot interact with other blockchains. However, users want to bring assets from Ethereum into Tiger, and from Tiger to other chains to unlock more liquidity. To enable this, Ryan must connect Tiger to multiple blockchain networks.

Step 1: Install the Hyperlane CLI

In the first step, Ryan installed the Hyperlane CLI tool to set up the chain integration environment. The process is simple—he only needed to run “npm install @hyperlane-xyz/cli” in the terminal. Since the tool is open-source, no prior approval or registration is required. This ease of access highlights the core value of Hyperlane’s permissionless architecture.

Step 2: Deploy Mailbox and ISM

Next, Ryan deployed two core components directly to the Tiger chain: the Mailbox, a contract that enables message transmission between blockchains, and the Interchain Security Module (ISM), which verifies the authenticity of each message. Both components are open-source and publicly available, allowing developers to integrate them on their own terms. Once these elements are in place, the system is ready for testing.

Step 3: Test Message Delivery to Verify Connection

In the third step, Ryan sent a test message from Tiger Chain to Ethereum to verify successful delivery. Here, the “message” is not a simple text string—it is a specific execution command: “Transfer 100 TIGER tokens to Ethereum address 0x123…” The transmission process is as follows:

  1. Tiger Chain initiates the message to transfer 100 $TIGER tokens to Ethereum

  2. Hyperlane validators verify the message and sign it

  3. A relayer delivers the signed message to Ethereum

  4. ISM on Ethereum verifies the message and releases 100 $TIGER tokens to the recipient

As long as both the source and destination chains have a Mailbox installed, no additional configuration is required. The message is transmitted, verified, and executed. A successful test confirms that the two chains are properly connected.

Step 4: Register with the Public Registry

In the final step, Ryan registers Tiger Chain’s connection details in the Hyperlane registry. This registry serves as a public, GitHub-based directory that aggregates information about all connected chains, including identifiers such as domain IDs and Mailbox addresses. The purpose of this public listing is to ensure that other developers can easily locate the information needed to connect with Tiger Chain. It functions much like a phone directory—once registered, anyone can look up Tiger and initiate communication. Through this single registration, Tiger Chain gains access to the full network effects of the Hyperlane ecosystem.

At the core of this architecture is a simple but powerful principle: anyone can connect without approval, and any chain can be used as a destination without permission.

This model is best understood through a familiar analogy—email. Just as anyone can send a message to any email address in the world without prior coordination, Hyperlane enables any blockchain to communicate with any other, as long as a Mailbox is installed. It creates an environment where permissionless connectivity becomes the default, something that traditional approval-based systems could not achieve.

2.2. Multi-VM Compatibility

From the outset, Hyperlane was designed with a modular architecture to support multiple virtual machine (VM) environments. It currently enables interoperability across Ethereum’s EVM, CosmWasm for Cosmos SDK-based chains, and Solana’s SVM, with additional support for Move-based chains underway.

Connecting different VM environments is inherently complex. Each blockchain operates with its own execution model, data structure, consensus mechanism, and asset standard. Achieving interoperability across these systems requires a highly specialized framework that can translate fundamentally different architectures.

For example, Ethereum’s EVM supports 18 decimal places, while Solana’s SVM uses 9 decimal places. Overcoming even small differences while maintaining security and reliability is one of Hyperlane’s key technical achievements.

Hyperlane introduced ‘Hyperlane Warp Route’ to address challenges of connecting different chains. Hyperlane Warp Routes are modular cross-chain asset bridges that enable permissionless token transfers between chains and support the movement of various assets across distinct environments.

Put simply, Hyperlane Warp Route operates based on the nature of the asset and the use case. Sometimes they function like a vault, sometimes like a currency exchange, and at other times like a direct wire transfer—each route type provides the appropriate method for each scenario. All of these processes operate across different virtual machine environments using Hyperlane's interchain messaging.

  • Native Token Warp Routes: Enables direct transfers of native gas tokens (e.g., ETH) across chains without wrapping.

  • Collateral-Backed ERC20: Locks ERC20 tokens as collateral on the source chain for cross-chain transfers.

  • Synthetic ERC20: Mints new ERC20 tokens on the destination chain to represent the original tokens.

  • Multi-Collateral Warp Routes: Allows liquidity to be sourced from multiple collateral tokens.

  • Specialized Warp Routes: Adds advanced features or integrates with specific use cases (e.g., vaults, fiat-backed tokens)

Let’s examine a practical example using the lock-and-mint model. A developer named Ryan wants to transfer a Tiger Token ($TIGER), issued on Ethereum, to the Base network.

Ryan starts by deploying a Hyperlane Warp Route contract on Ethereum and depositing the $TIGER token into the contract (EvmHypCollateral). The Ethereum Mailbox then generates and sends a message instructing the Base network to mint a wrapped version of the Tiger Token.

Upon receiving the message, the Base network verifies its authenticity using the Interchain Security Module (ISM). If verification succeeds, the Base network mints wrapped Tiger Tokens ($wTIGER) directly to the user’s wallet.

Hyperlane Warp Routes play a key role in extending Hyperlane’s vision of modular, permissionless interoperability across different chains. Developers only need to configure the contracts based on the characteristics of each chain. The remaining processes—messaging, verification, and delivery—are handled by Hyperlane’s infrastructure, allowing developers to implement cross-environment connections without having to deal with complex translation mechanisms.

2.3. Modular Security: Interchain Security Module

While Hyperlane enables the seamless movement of messages and assets across different chains—a key strength in scalability—it also raises a critical challenge: How can a receiving chain be sure that a message actually originated from its claimed source? Delivering a message is one thing—verifying its authenticity is another.

To address this issue, Hyperlane introduces the Interchain Security Module (ISM)—a modular security system that validates the authenticity of a message before the destination chain accepts it. ISM is an on-chain smart contract that verifies whether the message was indeed generated on the source chain, providing tamper resistance and provenance guarantees.

Simply put, when the destination chain’s Mailbox receives a message, it first asks: “Did this message actually come from the origin chain?” Only after successful verification is the message passed to the intended destination. If the verification fails or seems suspicious, the message is rejected.

This process is similar to how border control works when you travel internationally. Before you enter a country, immigration officers verify your passport's authenticity—"Was this passport really issued by your home country?" The passport contains anti-counterfeiting features and cryptographic elements that prove its legitimacy. While anyone could create a fake document, only passports that can cryptographically prove their origin through proper verification are accepted for entry.

What's important is that ISM is flexible in configuring its security model to the service’s needs. In practice, security requirements vary significantly depending on the context. For instance, a small-value token transfer may only require a basic validator signature for faster execution. In contrast, a multi-million dollar asset transfer might demand a layered security approach—including Hyperlane validators, external bridges like Wormhole, and additional multisig verification.

In this way, the ISM framework reflects a critical design decision: Hyperlane prioritizes both connectivity and security through modular verification. Applications can customize their security models while maintaining the permissionless nature of the protocol.

3. Developer Tools and Accessibility: The Easiest Way to Connect

Hyperlane prioritizes developer experience by offering a high level of accessibility and ease of use. Its command-line interface (CLI) and TypeScript-based software development kit (SDK) serve as essential tools for integrating new chains into the Hyperlane ecosystem, sending interchain messages, and configuring Hyperlane Warp Routes.

Both the CLI and SDK are fully open-source and available for anyone to use. Developers can install the code from GitHub and begin integration without licensing agreements or approval processes. Official documentation includes step-by-step tutorials that make it accessible even for developers with limited blockchain experience.

3.1. Hyperlane CLI: A Tool for Direct Integration

The Hyperlane CLI is the official command-line tool designed to allow developers to deploy and interact with Hyperlane contracts through simple command operations. It enables a wide range of actions—including deploying Hyperlane to new blockchains, creating Hyperlane Warp Routes, and testing cross-chain message transmission—often with just a single command.

  • Registering chain information: Define the chain name, address, and domain ID

  • Deploying core components: Automatically install the Mailbox and ISM

  • Testing message delivery: Send trial messages between connected chains

3.2. Hyperlane SDK: A Toolkit for Integration and Automation

The Hyperlane SDK is a TypeScript-based development toolkit that simplifies the implementation of interchain messaging. It enables developers to send messages, verify message status, and interact across chains using only a few lines of code.

Rather than writing custom logic for message routing or security verification, developers can leverage pre-built functions included in the SDK—such as “transferRemote()” for token transfers and “dispatch()” for message sending. It serves as a ready-made toolbox that accelerates integration and minimizes complexity.

By enabling any application to incorporate interchain messaging swiftly, the SDK plays a crucial role in bringing Hyperlane's permissionless design to life. Just as payment APIs like Stripe allow developers to add payment processing to their applications without having to build banking infrastructure, Hyperlane's SDK makes blockchain-to-blockchain messaging accessible.

3.3. Hyperlane NEXUS: The Easiest Cross-Chain Bridge

Source: Tiger Research

Non-developers can also experience Hyperlane's utility through Hyperlane Nexus, a cross-chain bridge built on Hyperlane's infrastructure. Hyperlane Nexus connects various blockchains (Ethereum, Solana, Eclipse, etc.) through a single interface, providing users with an accessible way to move assets across different chains using Hyperlane's technology.

4. The Road Ahead for Hyperlane

Hyperlane has demonstrated rapid growth since launching its testnet in the second half of 2022. Initially known as Abacus, the project rebranded to Hyperlane in the fall of 2022 and began executing a dedicated ecosystem expansion strategy.

The year 2023 marked a foundational phase for Hyperlane’s technical development. The team introduced a modular security stack that allowed tailored security configurations based on the specific needs of each chain. In parallel, it implemented a permissionless deployment system, enabling any developer to connect new chains without needing approval.

Significant efforts were also made to enhance the developer experience. Hyperlane simplified the traditionally complex process of cross-chain communication, making it easier to build intuitive multi-chain applications. Through integrations with key projects such as Circle, the protocol also achieved meaningful ecosystem expansion.

4.1. Positioned for Accelerated Growth

Source: Dune

Hyperlane currently supports over 150 blockchain networks, including Ethereum, Solana, and Avalanche. With billions of dollars in bridged assets, the protocol has clearly moved beyond the experimental stage and into commercial-scale deployment.

One of the most notable trends is the emergence of network effects. As more chains connect to Hyperlane, the incentive for others to join grows. Newcomers can instantly access the liquidity, user base, and interoperability of connected networks. Developers favor infrastructure that supports broad chain compatibility, while users seek greater utility and flexibility across assets.

Two core competitive advantages are driving Hyperlane’s growth:

  1. Unmatched connectivity across 150+ chains—far exceeding that of competitors.

  2. A permissionless architecture that dramatically lowers onboarding friction and accelerates ecosystem expansion.

Together, these advantages provide Hyperlane with a structurally superior growth trajectory compared to legacy interoperability solutions.

4.2. Making $HYPER Useful

Following the launch of the $HYPER token in April 2025, Hyperlane’s primary challenge lies in securing long-term utility for the token. The critical question is whether $HYPER can evolve from a speculative asset into a functional, integral part of protocol operations.

Hyperlane first introduced the Expansion Rewards program to ensure that users receive greater rewards as they engage more with the ecosystem. The program allocates 25.5% of the total token supply and distributes $HYPER tokens every three months, based on each user’s protocol usage. Users accumulate points through activity, which are then converted into token rewards proportionally. The model functions much like a credit card rewards system—the more you use it, the more you earn in return.

Two bonus mechanisms further reinforce this structure:

  • Chain Bonus: An additional 25% reward for transactions conducted on chains that use Hyperlane as the primary bridge.

  • Long-Term Holding Bonus: Up to 60% additional rewards for users who continuously hold stHYPER, the staked version of $HYPER.

The system is designed to reward both high usage and long-term participation, effectively encouraging loyal users to become economic stakeholders in the protocol’s growth.

The goal of this incentive model is clear: the more users engage with the protocol and the longer they remain active, the greater the rewards they receive. If the four-year program works as intended, it is expected to generate strong network effects throughout the Hyperlane ecosystem. These dynamics follow a reinforcing cycle:

  1. Increased usage leads to more chains seeking integration

  2. Network expansion creates a broader range of cross-chain options for users

  3. Greater optionality accelerates new user acquisition

For a network like Hyperlane, which is undergoing rapid chain expansion, this reward structure can significantly increase user satisfaction and act as a catalyst for further growth.

However, a concentrated utility model also introduces risk. Since $HYPER’s primary use case is tied to Hyperlane’s interoperability protocol, any decline in overall bridge demand or cross-chain activity could have a direct impact on token demand. Continued monitoring of market conditions and usage trends will be essential.

Source: Symbiotic

Another core function of $HYPER is network security. Users can stake $HYPER to receive stHYPER, a liquid staking token that underpins the economic security of Hyperlane’s default ISM. Validators—who verify the validity of cross-chain messages—earn staking rewards for correct verification. Conversely, if they sign invalid messages or engage in malicious behavior, their staked tokens are subject to slashing. This penalty is distributed across all stakers and used to compensate affected users.

Ultimately, the $HYPER token is designed to be more than just a transactional asset. By aligning usage incentives, staking-based security, and long-term participation, it functions as a foundational component of the Hyperlane network. This architecture creates a self-reinforcing cycle:

  • Greater protocol usage leads to more $HYPER distributed

  • More staking enhances network security

  • Improved reliability attracts more users and chains

If this mechanism operates as intended, $HYPER will play a central role in both operating and securing the network—underpinning the sustainability and growth of the entire Hyperlane ecosystem.

4.3. Strengthening Security

Perhaps most impressively, Hyperlane has maintained stable operations with no major security incidents throughout its growth. This track record is supported by the stable management of its multisig validator group and a conservative approach to default configurations.

Security reinforcement remains an ongoing priority. Through its bug bounty program, Hyperlane offers rewards of up to $2.5 million for identifying critical smart contract vulnerabilities. This has proven to be an effective mechanism for incentivizing active participation from security researchers.

That said, risks remain—particularly given the open-source and permissionless nature of the protocol. Continuous monitoring is necessary, especially in cases where users customize modules independently, which may introduce unforeseen vulnerabilities.

4.4. Becoming Core Infrastructure for the Interoperable Web3 Era

As interoperability becomes a fundamental requirement of Web3, Hyperlane’s progress and potential take on even greater significance. If its vision is realized, users will be able to engage with blockchain-based services without even needing to consider which chain they are interacting with.

This represents a blueprint for a truly unified blockchain ecosystem. At this critical juncture, Hyperlane’s next moves will be key in determining how fully that vision can be brought to life.


Dive deep into Asia's Web3 market with Tiger Research. Be among the 10,000+ pioneers who receive exclusive market insights.


🐯 More from Tiger Research

Read more reports related to this research.

Disclaimer

This report was partially funded by Hyperlane. It was independently produced by our researchers using credible sources. The findings, recommendations, and opinions are based on information available at publication time and may change without notice. We disclaim liability for any losses from using this report or its contents and do not warrant its accuracy or completeness. The information may differ from others' views. This report is for informational purposes only and is not legal, business, investment, or tax advice. References to securities or digital assets are for illustration only, not investment advice or offers. This material is not intended for investors.

Terms of Usage

Tiger Research allows the fair use of its reports. ‘Fair use’ is a principle that broadly permits the use of specific content for public interest purposes, as long as it doesn't harm the commercial value of the material. If the use aligns with the purpose of fair use, the reports can be utilized without prior permission. However, when citing Tiger Research's reports, it is mandatory to 1) clearly state 'Tiger Research' as the source, 2) include the Tiger Research logo following brand guideline. If the material is to be restructured and published, separate negotiations are required. Unauthorized use of the reports may result in legal action.