أيقونة_تثبيت_ios_web أيقونة_تثبيت_ios_web أيقونة_تثبيت_أندرويد_ويب

$293 Million Evaporated, Zero Code Vulnerabilities: The 2026 Largest Hack Case Reveals DVN Configuration Security Blind Spots

تحليلمنذ ساعة واحدة发布 وايت
366 0

This was the largest DeFi attack of 2026 to date.

However, one aspect distinguishes this attack from most hacks. There was no vulnerability in Kelp DAO’s smart contract code. Security researcher @0xQuit, who participated in the investigation, wrote on X, “From what I can tell so far, this is a combination of two issues: a 1-of-1 DVN configuration, and the DVN node itself being compromised.” LayerZero’s official statement also did not mention contract code, framing the issue as an “rsETH vulnerability” rather than a “LayerZero vulnerability.”

3 Million Evaporated, Zero Code Vulnerabilities: The 2026 Largest Hack Case Reveals DVN Configuration Security Blind Spots

The $293 million vulnerability wasn’t in any line of code. It was hidden in a configuration parameter that was incorrectly set during deployment.

The general logic of DeFi security audits is: find the contract, read the code, find the vulnerability. This logic works quite smoothly for code logic vulnerabilities. أداةs like Slither and Mythril are relatively mature at detecting known patterns like reentrancy attacks and integer overflows. LLM-assisted code auditing, heavily promoted in recent years, also has some capability for business logic vulnerabilities (such as flash loan arbitrage paths).

3 Million Evaporated, Zero Code Vulnerabilities: The 2026 Largest Hack Case Reveals DVN Configuration Security Blind Spots

But two rows in this matrix are red.

Configuration-layer vulnerabilities represent a structural blind spot in tool-based audits. The problem with Kelp DAO wasn’t in a .sol file, but in a parameter written during protocol deployment—the DVN threshold. This parameter determines how many validator nodes must confirm a cross-chain message for it to be considered legitimate. It doesn’t enter the code, doesn’t enter Slither’s scanning scope, and doesn’t enter Mythril’s symbolic execution path. According to comparative research by Dreamlab Technologies, Slither and Mythril detected 5/10 and 6/10 vulnerabilities respectively in the tested contracts, but this performance is based on the premise that “the vulnerability is in the code.” According to IEEE research, even at the code level, existing tools can only detect 8%-20% of exploitable vulnerabilities.

From the perspective of existing audit paradigms, there is no tool that can “detect whether the DVN threshold is reasonable.” To detect such configuration risks, what’s needed is not a code analyzer, but a specialized configuration checklist: “Number of DVNs for the cross-chain protocol used ≥ N?”; “Is there a minimum threshold requirement?” Such questions currently have no standardized tool coverage, nor even widely accepted industry norms.

Also in the red zone are key and node security. @0xQuit’s description mentioned the DVN node being “compromised,” which falls under operational security (OpSec), beyond the detection boundaries of any static analysis tool. Whether it’s a top-tier audit firm or an AI scanning tool, none have the ability to predict whether a node operator’s private key will be leaked.

This attack simultaneously triggered both red zones in the matrix.

3 Million Evaporated, Zero Code Vulnerabilities: The 2026 Largest Hack Case Reveals DVN Configuration Security Blind Spots

DVN is LayerZero V2’s cross-chain message verification mechanism, short for Decentralized Verifier Network. Its design philosophy is to delegate security decision-making to the application layer: each protocol integrated with LayerZero can choose how many DVN nodes must simultaneously confirm a cross-chain message before it is allowed through.

This “freedom” creates a spectrum.

Kelp DAO chose the far left end of the spectrum: 1-of-1, requiring confirmation from only one DVN node. This means zero fault tolerance; an attacker only needs to compromise that one node to forge any cross-chain message. In contrast, Apechain, also integrated with LayerZero, configured more than two required DVNs and was not affected in this incident. The subtext of LayerZero’s official statement, “all other applications remain secure,” is: security depends on which configuration you chose.

The normal industry recommendation is at least 2-of-3, requiring an attacker to simultaneously compromise two independent DVN nodes to forge a message, raising fault tolerance to 33%. High-security configurations like 5-of-9 can achieve 55% fault tolerance.

The problem is, external observers and users cannot see this configuration. Both are called “powered by LayerZero,” but one could have 0% fault tolerance and the other 55%. Both are called DVN in the documentation.

Seasoned تشفير investor Dovey Wan, who experienced the Anyswap incident, wrote directly on X: “LayerZero’s DVN is actually 1/1 validator… All cross-chain bridges should immediately conduct a comprehensive security review.”

3 Million Evaporated, Zero Code Vulnerabilities: The 2026 Largest Hack Case Reveals DVN Configuration Security Blind Spots

In August 2022, a vulnerability was discovered in the Nomad cross-chain bridge. Someone copied the first attack transaction, made slight modifications, found it also worked—so hundreds of addresses successively began copying, draining $190 million within hours.

Nomad’s post-mortem analysis stated the vulnerability originated from “initializing the trusted root to 0x00 during a routine upgrade.” This was a configuration error that occurred during the deployment phase. The Merkle proof verification logic was fine, the code itself was fine; the problem was an incorrect initial value.

Combined with Nomad, configuration/initialization class vulnerabilities have now caused approximately $482 million in losses. In the entire history of cross-chain bridge thefts, this category’s scale is now comparable to key leak incidents (Ronin $624 million, Harmony $100 million, Multichain $126 million, totaling approximately $850 million).

But the product design of the code audit industry has never targeted this category.

The industry still discusses code logic vulnerabilities the most. Wormhole’s $326 million hack due to signature verification bypass, Qubit Finance’s $80 million theft due to fake deposit events. These cases have complete vulnerability analysis reports, CVE number analogies, and reproducible PoCs, suitable for training and optimizing audit tools. Configuration-layer problems aren’t written in code, making it difficult to enter this production cycle.

A noteworthy detail is that the triggering methods of the two configuration-class events were completely different. Nomad accidentally entered a wrong initial value during a routine upgrade, a mistake. Kelp DAO’s 1-of-1 was an active configuration choice—the LayerZero protocol did not prohibit this option, and Kelp DAO did not violate any protocol rules. A “compliant” configuration choice and a “mistaken” initial value ultimately led to the same consequence.

3 Million Evaporated, Zero Code Vulnerabilities: The 2026 Largest Hack Case Reveals DVN Configuration Security Blind Spots

The execution logic of this attack was simple: a forged cross-chain message told the Ethereum mainnet, “equivalent assets have been locked on another chain,” triggering the mainnet to mint rsETH. The minted rsETH itself had no actual backing, but its on-chain record was “legitimate” and could be accepted as collateral by lending protocols.

The attacker then dispersed the 116,500 rsETH into Aave V3 (Ethereum and Arbitrum), Compound V3, and Euler, borrowing a total of over $236 million in real assets. According to multiple reports, Aave V3 alone faces an estimated bad debt of approximately $177 million. Aave’s security module Umbrella has a WETH reserve of about $50 million to absorb bad debt, covering less than 30%, with the remaining portion to be borne by aWETH stakers.

This bill ultimately fell on those who just wanted to earn a bit of WETH interest.

As of publication, LayerZero officials are still jointly investigating with the security emergency response organization SEAL Org, stating they will release a post-mortem analysis report with Kelp DAO after obtaining all information. Kelp DAO stated it is conducting “active remediation.”

The $293 million vulnerability wasn’t in the code. The phrase “audit passed” did not cover the location of that parameter.

هذا المقال مصدره من الانترنت: $293 Million Evaporated, Zero Code Vulnerabilities: The 2026 Largest Hack Case Reveals DVN Configuration Security Blind Spots

Related: 24-Hour Hot Cryptocurrencies and Key News|UK Plans to Suspend Crypto Political Donations; US Vice President Vance May Meet with Iran This Weekend (March 26)

1. Top Tokens on CEXs Top 10 CEX Tokens by Trading Volume and 24h Price Change: BNB: +3.01% BTC: +2.90% ETH: +2.56% SOL: +3.43% NIGHT: -5.83% TAO: +16.37% DOGE: +3.69% XRP: +1.76% TRX: +0.94% PEPE: +4.12% Top 24h Gainers (Data Source: OKX): PROVE: +29.34% MON: +12.53% ATH: +11.53% RSR: +11.48% CETUS: +10.50% ENA: +8.92% FOGO: +7.13% SPACE: +6.89% OL: +6.44% FET: +5.96% Top 24h Gainers for Crypto Stocks (Data Source: msx.com): BLNK.M: +28.13% LWLG.M: +26.39% DXYZ.M: +23.91% SIDU.M: +20.5% FLY.M: +16.81% ARM.M: +16.72% LUNR.M: +14.17% VVPR.M: +11.23% PL.M: +10.96% ICG.M: +10.09% 2. Top 5 On-Chain Meme Coins (Data Source: GMGN): SSTR Bully NOELIA G0DM0D3 WW3 Headlines UK Plans to Suspend Crypto Political Donations, PM Cites Illicit Fund Risks UK Prime Minister Keir Starmer stated that the government plans to suspend…

© 版权声明

相关文章