No connection

Search Results

Crypto Score 78 Bearish

Kelp DAO Challenges LayerZero Over $290 Million Bridge Exploit Defaults

Apr 20, 2026 14:41 UTC
ETH, rsETH
Short term

Kelp DAO is disputing LayerZero's post-mortem of a massive theft, alleging that the infrastructure provider's own default settings created the security loophole. The conflict highlights potential systemic risks for numerous protocols relying on the same cross-chain messaging framework.

  • Loss of $290 million in rsETH due to bridge exploit
  • Dispute over whether 1/1 DVN configuration was a user error or a provider default
  • Allegations of state-sponsored attack on LayerZero infrastructure
  • Potential systemic risk for 40% of LayerZero-integrated protocols
  • Emergency pause prevented further loss of $200 million

Kelp DAO is pushing back against claims made by cross-chain messaging provider LayerZero following a $290 million exploit that drained 116,500 rsETH from its bridge. While LayerZero's initial post-mortem blamed Kelp for utilizing a '1/1 configuration'—a setup where a single validator can approve transactions—Kelp asserts that this configuration is the default provided in LayerZero's own documentation and GitHub guides. The exploit occurred when attackers compromised two of LayerZero's servers and flooded backup systems with junk traffic, forcing the verifier onto the compromised nodes. Kelp claims the breach was the result of a sophisticated state-sponsored attack targeting LayerZero's internal infrastructure rather than a third-party verifier, contradicting LayerZero's framing of the event. Technical analysis from industry developers suggests the vulnerability may be widespread. Reports indicate that LayerZero's reference setup ships with single-source verification defaults across major chains, including Ethereum, Polygon, and Arbitrum. This has raised alarms across the DeFi sector, as an estimated 40% of protocols integrated with LayerZero may be using the same vulnerable configuration. Despite the initial loss, Kelp's emergency pause, triggered 46 minutes after the drain began, successfully blocked subsequent attempts to steal an additional $200 million in rsETH. The protocol noted that its core restaking contracts remained untouched, with the damage isolated to the bridge layer.

Sign up free to read the full analysis

Create a free account to unlock full AI-curated market articles, personalized alerts, and more.

Share this article

Stay Ahead of the Markets

Join thousands of traders using AI-powered market intelligence. Get personalized insights, real-time alerts, and advanced analysis tools.

Home
Terminal
AI
Markets
Profile