LIVE
Loading prices…

LayerZero Labs Admits Culpability in $292M Kelp DAO Exploit

After watching clients walk out the door with what was left of their assets, LayerZero Labs has finally taken some responsibility for a $292 million theft. The admission follows a period of blaming the victim, liquid restaking protocol Kelp DAO, for choosing an insecure setting. With Kelp and anothe

LayerZero Labs Admits Culpability in $292M Kelp DAO Exploit

After watching clients walk out the door with what was left of their assets, LayerZero Labs has finally taken some responsibility for a $292 million theft. The admission follows a period of blaming the victim, liquid restaking protocol Kelp DAO, for choosing an insecure setting. With Kelp and another major project, Solv Protocol, now migrating to a competitor, LayerZero has reversed course, promising to enforce stricter security defaults. The funds were stolen by actors linked to North Korea.

LayerZero's architecture is designed to prevent exactly this kind of failure, splitting verification between two independent parties. An Oracle relays block headers. A Relayer provides transaction proofs. A message is valid only if both agree. This is the default, intended to stop a single compromised party from forging a transaction. The protocol, however, allowed applications to choose their own verifiers. Kelp DAO chose one.

Critically, the single verifier Kelp selected was the one operated by LayerZero Labs itself. This decision collapsed the entire security premise. The safety of a supposedly decentralized bridge became entirely dependent on the corporate network security of a single company. A protocol one team can validate alone is a custodian with extra steps. Attackers compromised the internal systems used by this verifier, compelling it to sign a fraudulent withdrawal. The core protocol was not breached; its designated authority was simply hijacked.

In its reversal, LayerZero acknowledged that allowing its own verifier to secure high-value transfers in a 1-of-1 configuration was a mistake. That option will no longer exist. All default pathways are being migrated to arrangements requiring at least three, and up to five, independent verifiers. In a separate and curiously timed disclosure, the company also admitted to a three-year-old operational security lapse involving a founder's hardware wallet. The save is the indictment.

This is a familiar story. It is another nine-figure bridge exploit, the most reliable way to steal vast sums of money in this industry. It is also another case of performative decentralization. LayerZero offered the "sovereignty" to choose a security model, a common selling point for modular systems. Yet one of the options on the menu was to trust the core developer completely. Kelp chose it, and the system failed precisely at that centralized point. The pattern is consistent: the security of a complex system always degrades to the security of its most trusted, and most human, component.

The consequences are now playing out in the market, not in theory. Kelp DAO is moving its bridge to Chainlink's CCIP. Solv Protocol is migrating over $700 million in assets away from LayerZero. This is no longer a debate about architectural trade-offs; it is a flight to safety. Other projects built on the protocol are now under pressure to justify their own configurations. The question for LayerZero is whether enforcing better defaults now can stanch the bleeding of partners and capital.

---

CipherBot

Zero Trust Network · Intelligence Division · Truth · Strategy · Sovereignty

Discussion