Kelp Blames LayerZero for $292M Hack, Eyes Chainlink

Kelp Blames LayerZero for $292M Hack, Eyes Chainlink 2 KelpDAO is implementing a significant protocol shift, announcing its intention to relaunch its cross-chain system on Chainlink’s Cross-Chain Interoperability Protocol (CCIP). This decision follows a substantial $292 million exploit, which KelpDAO attributes to vulnerabilities within LayerZero’s infrastructure. The protocol is actively redesigning its cross-chain architecture to enhance security and resilience, aiming to restore user confidence after the incident.

Key Takeaways

  • KelpDAO has announced plans to migrate its cross-chain system to Chainlink CCIP following a $292 million exploit.
  • KelpDAO alleges that LayerZero’s infrastructure was compromised, leading to the exploit.
  • LayerZero disputes this, stating the exploit was isolated to Kelp’s specific application and its use of a single-verifier configuration.
  • The protocol is redesigning its system to utilize multiple independent validators for increased security.
  • A legal battle over $71 million in frozen funds linked to the exploit is currently underway in a U.S. court.

KelpDAO has publicly stated that independent security analyses, including those from SEAL 911 and Chainalysis, corroborate its assertion that LayerZero’s infrastructure was the origin of the attack. The April incident saw the draining of approximately 116,500 rsETH, an Ethereum staking token, from a cross-chain bridge utilized by Kelp. This exploit has been associated with the North Korean Lazarus Group. Further emphasizing its position, KelpDAO claims that LayerZero personnel had approved the specific configuration implicated in the exploit without raising security concerns. This configuration, identified as a “1-of-1 verifier,” relied on a single entity for validating cross-chain transactions. KelpDAO argues that the attackers compromised the verifier network’s RPC nodes, enabling the system to accept fraudulent transactions based on manipulated data. The subsequent policy change by LayerZero, discontinuing support for 1-1 DVN configurations after the exploit, is cited by KelpDAO as evidence that this setup was indeed widely adopted and flawed. LayerZero, in its own statement, has contested this narrative. The company maintains that the exploit was confined to Kelp’s rsETH application and resulted from its deviation from LayerZero’s recommended multi-verifier model in favor of a single-verifier approach. KelpDAO, however, refutes this, asserting that their configuration was not unique and was in line with LayerZero’s public documentation and default settings, citing data that indicates widespread use of similar configurations across the ecosystem. The migration to Chainlink CCIP signifies a commitment to a more robust security model. Chainlink’s protocol mandates transaction validation by multiple independent entities, a stark contrast to the single-verifier system that was compromised. Johann Eid, Chief Business Officer at Chainlink, expressed support for KelpDAO’s migration, underscoring the necessity of secure infrastructure for the expansion of Decentralized Finance (DeFi). Beyond the technical dispute and protocol upgrades, the exploit has led to significant legal repercussions. Approximately $71 million in cryptocurrency assets connected to the incident have been frozen on the Arbitrum network, initiating a legal conflict in a New York federal court. This ongoing legal proceeding could establish important precedents for asset recovery and dispute resolution within the DeFi space.

Long-Term Technological Impact: Reinforcing Interoperability Standards

The fallout from the KelpDAO exploit and the subsequent blame game between KelpDAO and LayerZero highlights critical challenges in cross-chain communication and the maturity of interoperability solutions. The industry’s reliance on cross-chain bridges makes them prime targets for sophisticated attacks. KelpDAO’s move to Chainlink CCIP, which emphasizes a multi-validator approach, signals a broader trend towards more decentralized and inherently secure methods for inter-blockchain communication. This incident underscores the need for standardized, rigorously audited security protocols across all Layer 2 solutions and Web3 platforms. As AI continues to be integrated into blockchain security, we can anticipate more advanced threat detection and prevention mechanisms. However, the fundamental architecture of how different blockchains interact remains a key area for innovation. The legal and technical disputes arising from this exploit could drive a stronger consensus on best practices for verifier configurations and smart contract security audits, ultimately leading to a more resilient and trustworthy decentralized web. The emphasis on verifiable computation and zero-knowledge proofs may also see accelerated adoption as a means to enhance the security and privacy of cross-chain transactions, further building trust in Web3’s foundational technologies.

Original article : decrypt.co

No votes yet.
Please wait...

Leave a Reply

Your email address will not be published. Required fields are marked *