Key Takeaways:
Blockchain analytics firm Chainalysis highlighted a $292M decentralized finance ( DeFi) exploit on April 20, exposing critical weaknesses in cross-chain bridge design. The incident involving KelpDAO’s rsETH infrastructure demonstrated how manipulated inputs can bypass validation systems. The case signals growing concerns around trust assumptions embedded within multichain protocols.
Chainalysis stated on social media platform X:
“The ~$292M KelpDAO / rsETH bridge exploit highlights a critical blind spot in DeFi security.”
The firm explained the breach originated from a flawed trust layer rather than defective smart contracts. Attackers targeted LayerZero infrastructure supporting KelpDAO, exploiting a 1-of-1 validator quorum. That configuration relied on limited remote procedure call endpoints, creating a single point of failure. Once compromised, that pathway enabled unauthorized approvals without broader consensus. The analytics provider described how the system accepted manipulated conditions as valid, allowing the exploit to proceed undetected by standard safeguards.
The attacker infiltrated the validator’s data inputs by compromising RPC endpoints. False information caused the system to register a fabricated burn event on the source chain.
“Based on this false state, the bridge approved the message and released 116,500 rsETH on Ethereum to the attacker. In reality, no corresponding burn ever occurred. Standard security missed this entirely because the transactions executed exactly as designed at the code level,” Chainalysis explained. This sequence broke a core bridge invariant requiring parity between burned assets and issued tokens. Despite correct code execution, the reliance on external data integrity enabled the exploit to succeed.
Chainalysis concluded with a broader warning, stating:
“ This attack proves that detecting malicious code isn’t enough; protocols must detect when a system enters an impossible state.”
The firm pointed to the need for continuous monitoring systems capable of validating cross-chain consistency in real time. Tools such as invariant tracking frameworks can identify discrepancies between locked assets and released funds. These mechanisms may allow protocols to halt operations before losses escalate, reinforcing the importance of verifying system-wide state rather than relying solely on code audits.
Polymarket's latest funding talks could push its valuation to $15 billion. Prediction markets platform…
Over the weekend in China, a humanoid robot shattered world half-marathon record—the human record—by seven…
The XRP price prediction picture improved this week as CoinGecko showed XRP trading at $1.43…
Google announced Monday that it’s making its Gemini in Chrome feature available in seven new…
Anthropic is deepening its relationship with Amazon through a deal that commits the AI startup…
VP.NET makes VPN privacy verifiable, not just policy-based, with secure enclave tech for up to…