Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Chainalysis Flags Critical Blind Spot in DeFi Security as $292M Exploit Bypasses Burn Verification

CN
bitcoin.com
Follow
4 hours ago
AI summarizes in 5 seconds.
  • Chainalysis flags a KelpDAO exploit exposing a critical failure in cross-chain trust assumptions.
  • Analysis showed Layerzero design flaws can let a single validator bypass DeFi safeguards.
  • Protocols face escalating risks as Chainalysis signals hidden failures may evade detection.

Blockchain analytics firm Chainalysis highlighted a $292M decentralized finance ( DeFi) exploit on April 20, exposing critical weaknesses in cross-chain bridge design. The incident involving KelpDAO’s rsETH infrastructure demonstrated how manipulated inputs can bypass validation systems. The case signals growing concerns around trust assumptions embedded within multichain protocols.

Chainalysis stated on social media platform X:

“The ~$292M KelpDAO / rsETH bridge exploit highlights a critical blind spot in DeFi security.”

The firm explained the breach originated from a flawed trust layer rather than defective smart contracts. Attackers targeted LayerZero infrastructure supporting KelpDAO, exploiting a 1-of-1 validator quorum. That configuration relied on limited remote procedure call endpoints, creating a single point of failure. Once compromised, that pathway enabled unauthorized approvals without broader consensus. The analytics provider described how the system accepted manipulated conditions as valid, allowing the exploit to proceed undetected by standard safeguards.

The attacker infiltrated the validator’s data inputs by compromising RPC endpoints. False information caused the system to register a fabricated burn event on the source chain.

“Based on this false state, the bridge approved the message and released 116,500 rsETH on Ethereum to the attacker. In reality, no corresponding burn ever occurred. Standard security missed this entirely because the transactions executed exactly as designed at the code level,” Chainalysis explained. This sequence broke a core bridge invariant requiring parity between burned assets and issued tokens. Despite correct code execution, the reliance on external data integrity enabled the exploit to succeed.

Chainalysis concluded with a broader warning, stating:

“ This attack proves that detecting malicious code isn’t enough; protocols must detect when a system enters an impossible state.”

The firm pointed to the need for continuous monitoring systems capable of validating cross-chain consistency in real time. Tools such as invariant tracking frameworks can identify discrepancies between locked assets and released funds. These mechanisms may allow protocols to halt operations before losses escalate, reinforcing the importance of verifying system-wide state rather than relying solely on code audits.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by bitcoin.com

4 minutes ago
TRON Powers $2T in USDT Transfers in Q1; CoinDesk and Messari Research Highlight AI, Institutional Growth
1 hour ago
Historic First Year: SEC Under Atkins Resets Crypto Policy With Focus on Clarity and Growth
1 hour ago
US Lawmakers Urged to Advance CLARITY Act as Digital Chamber Pushes Senate Markup
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarbitcoin.com
4 minutes ago
TRON Powers $2T in USDT Transfers in Q1; CoinDesk and Messari Research Highlight AI, Institutional Growth
avatar
avatarbitcoin.com
1 hour ago
Historic First Year: SEC Under Atkins Resets Crypto Policy With Focus on Clarity and Growth
avatar
avatarbitcoin.com
1 hour ago
US Lawmakers Urged to Advance CLARITY Act as Digital Chamber Pushes Senate Markup
avatar
avatarbitcoin.com
2 hours ago
Incident Report: Llamarisk, Aave Service Providers Detail Kelp rsETH Hack Across Ethereum and Arbitrum Markets
avatar
avatarbitcoin.com
3 hours ago
Ripple’s Schwartz Flags DeFi Bridge Trade-Offs After KelpDAO Incident
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink