Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
DeFi News

Kelp DAO’s Vulnerability Was Flagged 15 Months Ago — DeFi Failed to Act

In January 2025, a post on Aave's governance forum flagged Kelp's 1/1 DVN configuration as a single point of failure that could let one forged signature drain the bridge. The second verifier was never added.

Written By:
Gopal Solanky

Last updated: 2 hours ago
Published 2 hours ago
Share
Last updated: 2 hours ago
Published 2 hours ago
Kelp DAO’s Vulnerability Was Flagged 15 Months Ago — DeFi Failed to Act
Show AI Summary
An attacker exploited Kelp DAO’s bridge on April 18, stealing $292 million just 15 months after a public warning about the vulnerability.
A development team had flagged the vulnerability in January 2025, warning that a single compromised validator signature could trigger the bridge to release funds.
The exploit led to a chain of bad debt, triggering over $10 billion in withdrawals from Aave and a $14 billion decline in total DeFi value locked in the following sequence of events.

The largest DeFi exploit of 2026 did not require a zero-day vulnerability, a novel attack vector, or a flaw in smart contract logic. It required one forged cross-chain message—verified by a single validator—to drain $292 million from a bridge that a developer had publicly flagged as dangerously configured fifteen months earlier.

On April 18, an attacker exploited Kelp DAO‘s LayerZero-powered rsETH bridge, stealing 116,500 rsETH. The stolen tokens were immediately deposited into Aave as collateral and used to borrow over $190 million in real WETH. 

This led to a chain of bad debt that has since triggered over $10 billion in withdrawals from Aave, emergency freezes across multiple lending protocols, and a $14 billion decline in total DeFi value locked.

The critical context that both LayerZero and Kelp DAO have so far sidestepped in their public statements is that this exact attack surface was flagged—publicly, on the record, in the right forum—over a year before the exploit occurred.

In January 2025, a development team posted on the Aave governance forum warning that Kelp’s 1/1 DVN (Decentralized Verifier Network) configuration created a single point of failure. The post explicitly stated that a single compromised validator signature could trigger the bridge to release funds, and warned that multiple DVN verifications were necessary to prevent such a forgery. 

Source: Aave Governance

That fifteen-month gap—between a specific, public, technically accurate warning and the exact exploit that warning described—is the detail that makes this incident different from a routine bridge hack. 

This was not a case of unknown unknowns. It was a known vulnerability, documented in a governance forum used by Aave’s risk assessors, that was left unaddressed while Kelp expanded rsETH across more than 20 blockchains. 

How the Attack Worked

According to LayerZero’s incident statement, the attackers gained access to the list of RPC (Remote Procedure Call) nodes used by LayerZero Labs’ DVN. They then compromised two of those nodes—which were independent nodes running on separate clusters—and swapped out the software running on them with malicious binaries designed to feed the DVN forged transaction data.

Critically, the malicious nodes were engineered to lie selectively. They reported fabricated data only to the DVN, while continuing to tell the truth to every other system querying those same nodes—including LayerZero’s own monitoring infrastructure. This made the attack invisible to internal observability. 

Source: Kelp Dao Attack | Source: The CryptoTimes

Even that was not enough. LayerZero’s DVN uses both internal and external RPCs for redundancy. To complete the attack, the hackers launched DDoS attacks against the uncompromised external RPCs, forcing the DVN to fail over to the poisoned nodes. 

Once a failover occurred, the DVN confirmed a transaction that never took place—and the bridge released 116,500 rsETH.

Under a multi-DVN configuration (such as 2/2 or 2/3), this attack would have failed. A second independent verifier would have caught the discrepancy and rejected the forged message. But Kelp’s bridge was configured with a 1/1 setup—one verifier, no backup, no second check. 

Kelp’s emergency pauser multisig froze contracts 46 minutes after the drain. Two follow-up attempts, each carrying another 40,000 rsETH (~$100 million), both reverted because of the pause. Without it, total losses could have approached $490 million.

The Blame Game

In its post-mortem, LayerZero stated that “KelpDAO chose to utilize a 1/1 DVN configuration” despite “best practices around DVN diversification” being “previously communicated.” The company framed the incident as an application-layer failure, not a protocol-level one, and confirmed zero contagion to other LayerZero applications.

Kelp DAO, however, has pushed back, with a memo from team sharing that the 1/1 DVN setup is the configuration documented in LayerZero’s own V2 OApp Quickstart guide and shipped as the default for new OFT deployments. 

The memo adds that, through a direct communications channel open since July 2024, LayerZero produced no specific recommendation for Kelp to change the rsETH DVN configuration. The compromised DVN, Kelp argues, was LayerZero’s own infrastructure—not a third-party verifier chosen by Kelp.

Recent reports revealed that approximately 40% of all LayerZero applications currently run 1/1 configurations. A Dune analysis of roughly 2,665 active LayerZero OApp contracts found 47% using 1/1 setups.

LayerZero has since announced it will stop signing messages for any application using a 1/1 DVN configuration, forcing a broad migration to multi-DVN architectures.

The Structural Problem

The January 2025 Aave governance warning was not a lone voice. The vulnerability it described—that a 1/1 DVN creates a single point of failure in which one forged signature can drain an entire bridge—is not a novel insight. It is a known design trade-off in LayerZero’s modular architecture. LayerZero’s own CryptoEconomic DVN Framework, launched with Eigen Labs in October 2024, was built specifically to address it.

But the incentive structure pulled in the opposite direction. Under pressure to expand market share, liquid restaking protocols like Kelp opted for OFT-style rapid multi-chain deployment—which is fast, cheap, and using LayerZero’s defaults—rather than the slower, more expensive path of configuring multi-DVN redundancy or deploying native minting on each chain. 

This led to what has been the trend since the past few days. 

The Kelp exploit is not an isolated application failure. It is a structural warning about default security standards across omnichain infrastructure. 

If nearly half of all LayerZero applications use the same minimal configuration that was just exploited for $292 million, the market is going to start distinguishing much more aggressively between protocols that are merely “cross-chain” and those that are meaningfully hardened. 

Also read: A $292 Million Wake-Up Call: Inside KelpDAO Hack That Exposed DeFi’s Fragility

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Gopal Solanky - Crypto Research Analyst at The Crypto Times
By Gopal Solanky Sr. Crypto Journalist
Follow:
Gopal Solanky is a Research Analyst and Reporter with over 5 years of experience in DeFi, blockchain, crypto, IT, and financial markets. With a Bachelor's in Computer Applications, he brings a strong technical foundation to his analysis and reporting. Gopal focuses on breaking down complex topics for both seasoned investors and curious readers. His work has been referenced by publications like Business Insider and Vulture.com, highlighting his contributions to industry stories around topics like Huwak Tuah Memecoin and the FTX collapse.

Join Our Newsletter

Subscribe to get latest crypto news!

    ​

    Built with Kit

    Latest News

    Ledger CTO: Arbitrum Freeze Exposes L2 Control After KelpDAO Hack
    Ledger CTO: Arbitrum Freeze Exposes L2 Control After KelpDAO Hack
    FOF Coin on Solana Jumps 20% Despite Anonymous Team and No Utility
    Federal Oil Fund (FOF) Coin on Solana Jumps 20% Despite Anonymous Team and No Utility
    A $292 Million Wake-Up Call: Inside KelpDAO Hack That Exposed DeFi’s Fragility
    A $292 Million Wake-Up Call: Inside KelpDAO Hack That Exposed DeFi’s Fragility
    Scammers Demand Bitcoin and USDT for Strait of Hormuz 'Clearance'
    Scammers Demand Bitcoin and USDT for Strait of Hormuz ‘Clearance’
    Why India's Crypto Market is Getting Older, Slower, & Smarter CoinSwitch Report
    Why India’s Crypto Market is Getting Older, Slower, & Smarter: CoinSwitch Report

    Find Us on Socials

    Ad image

    You may also like

    Arbitrum Freezes KelpDAO Hacker’s $71M But Sparks Debate on Centralization

    Arbitrum Freezes KelpDAO Hacker’s $71M But Sparks Debate on Centralization 

    $21 Million on Lido EarnETH At Risk in Kelp DAO Exploit

    $21 Million on Lido EarnETH At Risk in KelpDAO Exploit

    AAVE Drops 20% to $89 as Kelp DAO Exploit Triggers Bank Run

    AAVE Drops 20% to $89 as KelpDAO Exploit Triggers Bank Run

    eth.limo DNS Breach Post-Mortem Exposes Social Engineering Attack Risk

    eth.limo DNS Breach Post-Mortem Exposes Social Engineering Attack Risk

    The Crypto Times Logo PNG

    Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

    Stay Updated

    All News
    Exclusive
    Opinions
    Learn
    Podcasts

    Company

    About Us
    Our Authors
    Editorial Policy
    AI Policy
    Advertorial Policy

    Get In Touch

    Contact Us
    Career

    Find Us on Socials

    X-twitter Linkedin Telegram Youtube Instagram

    © 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

    DMCA.com Protection Status
    • Terms and Conditions
    • Disclaimer
    • Privacy Policy
    • Cookie policy
    Do Not Sell or Share My Personal Information