An Open-Source AI Tool That No One Saw Predicted Kelp DAO's $292 Million Vulnerability 12 Days Ago

marsbitPublicado a 2026-04-20Actualizado a 2026-04-20

Resumen

An open-source AI security tool flagged critical risks in Kelp DAO’s cross-chain architecture 12 days before a $292 million exploit on April 18, 2026—the largest DeFi incident of the year. The vulnerability was not in the smart contracts but in the configuration of LayerZero’s cross-chain bridge: a 1-of-1 Decentralized Verifier Network (DVN) setup allowed an attacker to forge cross-chain messages with a single compromised node. The tool, which performs AI-assisted architectural risk assessments using public data, identified several unremediated risks, including opaque DVN configuration, single-point-of-failure across 16 chains, unverified cross-chain governance controls, and similarities to historical bridge attacks like Ronin and Harmony. It also noted the absence of an insurance pool, which amplified losses as Aave and other protocols absorbed nearly $300M in bad debt. The attack unfolded over 46 minutes: the attacker minted 116,500 rsETH on Ethereum via a fraudulent message, used it as collateral to borrow WETH on lending platforms, and laundered funds through Tornado Cash. While an emergency pause prevented two subsequent attacks worth ~$200M, the damage was severe. The tool’s report, committed to GitHub on April 6, scored Kelp DAO a medium-risk 72/100—later acknowledged as too lenient. It failed to query on-chain DVN configurations or initiate private disclosure, highlighting gaps in current DeFi security approaches that focus on code audits but miss config-level and ...

Author: Zengineer

Compiled by: Deep Tide TechFlow

Deep Tide Introduction: On April 18, Kelp DAO was hacked for $292 million, making it the largest DeFi incident so far in 2026. The vulnerability wasn't in the contract code, but in the LayerZero cross-chain bridge's 1-of-1 verifier node configuration—a single point of failure that allowed the forging of cross-chain messages. The author, using their own open-source AI auditing tool to scan Kelp 12 days prior, had already flagged this risk. This article reviews the entire attack process and honestly reflects on three things the tool got wrong at the time.

What is Kelp DAO

Kelp DAO is a liquidity restaking protocol built on top of EigenLayer. The mechanism is as follows: users deposit ETH or liquid staking tokens (stETH, ETHx) into Kelp contracts, which then delegate the assets to EigenLayer operator nodes for restaking—simultaneously providing security to multiple AVSs (Actively Validated Services). In return, users receive rsETH as a certificate. Unlike direct restaking on EigenLayer (where assets are locked), rsETH is liquid—it can be traded, used as collateral in lending protocols like Aave, and bridged across chains.

To achieve this cross-chain liquidity, Kelp deployed rsETH on over 16 chains using LayerZero's OFT (Omnichain Fungible Token) standard. When you bridge rsETH from Ethereum to an L2, LayerZero's DVN (Decentralized Verifier Network) verifies whether the cross-chain message is legitimate. This bridge architecture is the core of the subsequent story.

Kelp was initiated by Amitej Gajjala and Dheeraj Borra (previously co-founder of Stader Labs), launched in December 2023, with a peak TVL of $2.09 billion. Governance uses a 6/8 multi-signature wallet plus a 10-day timelock for contract upgrades. The governance token KERNEL governs the Kelp, Kernel, and Gain product lines.

The Hack

On April 18, 2026, an attacker drained 116,500 rsETH, worth approximately $292 million, from Kelp DAO's cross-chain bridge—the largest DeFi attack of 2026 so far. The root cause was not a smart contract vulnerability, but a configuration issue: a 1-of-1 DVN setup (meaning only 1 verifier node, validated by 1 signature) allowed the attacker to forge cross-chain messages by compromising a single node.

12 days prior, on April 6, my open-source security auditing tool had flagged this attack surface.

Let me be clear first: this hack resulted in real people losing real money. Aave WETH depositors who never touched rsETH had their funds frozen; LPs across multiple protocols are facing bad debt they never signed up for. This article analyzes what happened and what our tool caught—but the actual cost to people is more important than any scorecard.

The full report is hosted on GitHub, with a commit timestamp anyone can verify. Below is what we caught, what we missed, and what this means for DeFi security tools.

46 Minutes That Shook DeFi

At 17:35 UTC on April 18, the attacker compromised the isolated DVN verifier node and had it "approve" a forged cross-chain message. LayerZero's Endpoint, seeing the DVN's approval, passed the message via lzReceive to Kelp's OFT contract—which complied, minting 116,500 rsETH on the Ethereum mainnet. The message claimed equivalent assets were locked as collateral on another chain. Those assets never existed.

What followed was a standard DeFi money laundering process:

  1. Deposit the stolen rsETH as collateral into Aave V3, Compound V3, Euler
  2. Borrow approximately $236 million in WETH using this unbacked collateral
  3. Consolidate around 74,000 ETH and cash out via Tornado Cash

46 minutes later, at 18:21, Kelp's emergency pause multi-signature froze the contracts. The attacker then attempted two follow-up attacks (40,000 rsETH each, ~$100 million) which were reverted—this pause blocked an additional $200 million.

But the fallout was still severe. Aave V3 absorbed approximately $177 million in bad debt. The AAVE token plummeted 10.27%. ETH fell 3%. WETH utilization on Aave instantly maxed out to 100% as depositors rushed to withdraw. rsETH on over 20 L2s became assets of questionable value overnight.

What the April 6th Report Caught

In early April, shortly after the April 1st Drift Protocol hack of $285 million, I wrote an open-source Claude Code skill called crypto-project-security-skill—an AI-assisted architectural risk assessment framework that uses public data (DeFiLlama, GoPlus, Safe API, on-chain verification) to evaluate DeFi protocols. It's not a code scanner or a formal verification tool. The Drift incident made me realize: what causes the biggest losses isn't in the smart contract code—it's in governance vulnerabilities, configuration oversights, architectural blind spots, places code scanners never see. So I built a tool specifically to assess these layers: governance structure, oracle dependencies, economic mechanisms, cross-chain architecture, comparing each protocol against attack patterns from historical hacks (Drift, Euler, Ronin, Harmony, Mango).

On April 6, I ran a full audit on Kelp DAO. The complete report is publicly available on GitHub with an immutable commit timestamp.

The report gave Kelp a composite triage score of 72/100 (Medium Risk). In hindsight, this score was too lenient—those unanswered cross-chain information gaps should have pulled it lower. But even with a medium risk rating, the report pointed to the attack surface that was later exploited.

The screenshot below is the original text from the "Information Gaps" section of the report—the question about Kelp's DVN configuration that became the root cause of the $292 million theft:

Caption: The "Information Gaps" section from the April 6th report directly named DVN configuration opacity.

Let's go through what the report flagged versus what actually happened.

Finding 1:DVN Configuration Opacity(Warning Sign)

Report原文: "LayerZero DVN configuration (verifier sets per chain, threshold requirements) not publicly disclosed"

What Actually Happened: Kelp was running a 1-of-1 DVN configuration. One node. One single point. The attacker compromised this one node and forged cross-chain messages. If the configuration had been 2-of-3 (the industry minimum recommendation), the attacker would have needed to compromise multiple independent verifiers simultaneously.

Let's be clear: this is Kelp's issue, not LayerZero's. LayerZero is infrastructure—it provides the DVN framework, and each protocol chooses its own configuration: how many verifiers (1-of-1, 2-of-3, 3-of-5...), whose nodes to use, thresholds per chain. Kelp chose 1-of-1 when deploying the OFT bridge. LayerZero fully supports 2-of-3 or higher—Kelp simply didn't enable it.

An analogy: AWS provides MFA (Multi-Factor Authentication). If your account gets hacked because you never turned on MFA, that's your problem, not AWS's. LayerZero made the security mechanisms available; Kelp didn't use them.

Our report couldn't determine the specific DVN threshold at the time (because Kelp never disclosed it), but we explicitly listed this opacity as an unresolved information gap and risk item. The unwillingness to disclose itself is a red flag.

Finding 2:Single Point of Failure Across 16 Chains(Direct Hit)

Report原文: "Single point of failure in LayerZero DVN could simultaneously affect rsETH on all 16 supported chains"

What Actually Happened: The forged message hit the Ethereum mainnet directly, and the shockwave spread to all chains where rsETH was deployed. LayerZero preemptively paused all OFT bridges outgoing from Ethereum. Holders of rsETH on over 20 L2s were left with tokens of questionable backing overnight.

This is the systemic risk of multi-chain deployment: rsETH was circulating on Arbitrum, Optimism, Base, Scroll, and other L2s simultaneously, but the value of all these tokens derived from assets on the Ethereum mainnet. Once the mainnet bridge was compromised, rsETH on every L2 simultaneously lost its backing—holders could neither redeem nor verify if their tokens were still valuable. Lido's earnETH (which holds rsETH exposure), Ethena's LayerZero bridge—all were forced to pause. The blast radius extended far beyond Kelp itself.

Finding 3:Unaudited Cross-Chain Governance Control(Related Issue)

Report原文: "Governance control over LayerZero OFT configuration across chains is unverified—specifically: whether these controls reside with the same 6/8 multi-sig and 10-day timelock, or are managed by independent admin keys"

What Actually Happened: The DVN configuration was clearly not under the strict governance of the core protocol. If bridge configuration changes were also governed by the 6/8 multi-sig + 10-day timelock, a 1-of-1 DVN setup would require consent from 6 out of 8 signers—a configuration unlikely to have gone unnoticed.

This exposes a common governance blind spot: many protocols impose strict multi-sigs and timelocks on core contract upgrades, but operational changes—bridge configurations, oracle parameters, whitelist management—are often modifiable by a single admin key. Kelp's core protocol governance was industry-leading (6/8 multi-sig + 10-day timelock), but these protections did not extend to its largest attack surface: the cross-chain bridge.

Finding 4:Matched Ronin/Harmony Attack Pattern(Direct Hit)

Report原文: "The most relevant historical precedents involve bridge security. Kelp's LayerZero deployment across 16 chains introduces operational complexity similar to Ronin's multi-chain architecture"

What Actually Happened: The attack path almost perfectly replicated the Ronin playbook—compromise bridge validators, forge messages, drain assets. Our tool's attack pattern matching module, which compares protocol architecture against historical attack categories, correctly identified this as the highest-risk attack vector.

Historical context: In 2022, the Ronin bridge lost $625 million due to 5 out of 9 validators being compromised; that same year, Harmony's Horizon bridge lost $100 million due to 2 out of 5 validators being compromised. Kelp's situation was more extreme—only 1 validator, lowering the attack barrier to an absolute minimum. The tool flagged this risk because it automatically compares protocol architecture against these historical attack patterns, not just the code.

Finding 5:No Insurance Fund(Amplified Losses)

Report原文: "The protocol currently lacks a dedicated insurance pool or socialized loss mechanism to absorb slashing events"

What Actually Happened: With no insurance reserve, the entire $292 million loss was absorbed by downstream protocols. Aave's safety module covered less than 30% of its $177 million bad debt. LPs who had nothing to do with Kelp's bridge configuration decision bore the brunt of the impact.

The attacker deposited the stolen rsETH as collateral into Aave V3, Compound V3, Euler, and borrowed real WETH. Once rsETH was confirmed to be unbacked, these positions became "unliquidatable" bad debt—the collateral was worthless, but the borrowed WETH was gone. WETH utilization on Aave instantly maxed out, preventing ordinary users from withdrawing. If you were a WETH depositor on Aave, even if you never touched rsETH, your funds were affected. Kelp's insurance partnership with Nexus Mutual only covered specific vault products, not the core rsETH protocol exposure.

This is a failure of responsibility on both sides. Kelp's side: A protocol managing $1.3 billion TVL had zero insurance pool, zero loss absorption mechanism. When the bridge was compromised, there was no buffer to absorb the damage. Aave's side: It accepted rsETH as collateral but did not sufficiently assess its cross-chain bridge configuration risk. Aave's risk parameters (LTV, liquidation threshold) were designed for normal price volatility, not the tail risk of "bridge configuration compromise rendering collateral worthless overnight." The safety module couldn't even cover 30% of the bad debt. Essentially, this was a risk pricing failure: Aave treated rsETH as a normally fluctuating asset, but it actually carried the tail risk of bridge failure. The failures compounded—Kelp had no insurance to prevent bad collateral from entering the system, and Aave didn't do sufficiently granular risk modeling to limit exposure in such a scenario.

Where We Were Wrong

Three things could have been done better:

Underrated the risk. We rated the cross-chain bridge risk as "Medium." The report had 5 unresolved information gaps, 3 of which were related to LayerZero bridge configuration, plus a match to historical attack patterns like Ronin/Harmony—this should have been "High" or "Critical." Opacity itself should have been a stronger signal.

We failed to penetrate the configuration layer. The report repeatedly asked Kelp to disclose the DVN threshold, but we couldn't verify it independently. This is the same structural blind spot pointed out in post-mortem analyses: existing auditing tools focus on code logic and miss configuration-layer risks. We flagged the problem but couldn't answer it.

We didn't check on-chain. The DVN configuration could actually be read directly on-chain via LayerZero's EndpointV2 contract. We could have queried the ULN302 registry to independently verify Kelp's DVN threshold, instead of labeling it "not publicly disclosed." If we had checked, we would have directly seen the 1-of-1 configuration, no Kelp disclosure needed. This is the most specific area for tool improvement: add on-chain DVN configuration verification to the cross-chain assessment step.

Findings weren't specific or actionable enough. Saying "DVN configuration not disclosed" is an observation about missing documentation—not a prediction of an attack. These risks (oracle centralization, bridge dependency, lack of insurance) are also普遍 (widespread) across most cross-chain DeFi protocols. The tool flagged Kelp's opacity, but it has also flagged similar patterns on dozens of protocols that weren't attacked. Without published false positive rates, claiming "we predicted it" is an overstatement. A more honest assessment is: we asked some correct questions that no one else was asking, and one of them happened to hit the critical load-bearing point.

On "Responsible Disclosure"

A fair question: If we flagged these risks on April 6, why didn't we notify Kelp before the attack on April 18?

We didn't notify. The reason: The report identified opacity—"DVN configuration not disclosed"—not a specific, exploitable vulnerability. We didn't know the configuration was 1-of-1, only that it wasn't public. There was nothing concrete enough to disclose. "Your bridge configuration lacks documentation" is a governance observation, not a report suitable for a bug bounty program.

In hindsight, we could have directly contacted the Kelp team and asked about their DVN threshold. That conversation might have exposed the 1-of-1 configuration and prompted a fix. We didn't do that. It's a lesson: even if a finding seems too vague for formal disclosure, sending a private message to ask is still worthwhile.

What This Means for DeFi Security

The Kelp hack—like the Drift hack 17 days prior—was not a smart contract vulnerability. Automated code scanners like Slither, Mythril, or even GoPlus couldn't catch it. The vulnerability hid in deployment configurations, governance gaps, and architectural decisions, residing above the code layer.

This is also the core proposition of the crypto-project-security-skill:

Protocol security is more than just code security. A protocol can have perfect Solidity, five audits from top firms, a $250k bug bounty—and still lose $292 million due to a verifier configuration issue.

The tool is open-source on GitHub—anyone can review the methodology, run it themselves, or improve it.

Timeline

12 days. The signal was there. The question is: How does the ecosystem build tools that can see these signals before the next bridge falls?

What You Can Do

If you have assets in DeFi protocols with cross-chain bridges:

  1. Run an audit yourself. The tool is open-source. Don't trust us—verify yourself.
  2. Check bridge verifier configuration. If a protocol is unwilling to disclose its DVN threshold, treat it as a red flag. Our report did exactly that, and it was right.
  3. Don't assume code audits cover everything. Kelp had 5+ code audits from renowned firms and platforms (Code4rena, SigmaPrime, MixBytes). Traditional code audits are not designed to catch configuration-layer risks like DVN threshold settings—that's a different type of analysis, not a failure of the audit firms.
  4. Evaluate insurance coverage. If a protocol has no insurance pool, and you are an LP on a lending platform that accepts its token as collateral, you are implicitly underwriting its risk. Aave's WETH depositors learned this the hard way.

The Bigger Picture: AI Agent as a Security Layer

This article is about one tool and one hack. But the underlying proposition is larger: AI Agents can become an independent security layer for DeFi investors.

The traditional security model in crypto is this: Protocols hire audit firms, audit firms look at code, audit firms issue reports. This model has blind spots—the Kelp incident illustrates this perfectly. It focuses on code correctness but misses configuration, governance, and architectural risks.

Claude Code and skill tools like this offer another path: Anyone can use public data to run an AI-assisted risk assessment on any protocol in minutes. You don't need to spend $200k on an audit firm. You don't need to read Solidity. You let the agent compare the protocol's architecture against known attack patterns, and it surfaces the questions you should ask before depositing funds.

This won't replace professional audits—but it lowers the barrier to first-layer due diligence to a level accessible to everyone. An LP considering allocating funds to a new restaking protocol can now run `audit defi ` and get a structured risk assessment covering governance, oracles, bridges, and economic mechanisms. This is a real shift in how retail and mid-tier investors can protect themselves.

That Kelp report wasn't perfect. It rated bridge risk as Medium, should have been Critical. It didn't penetrate the configuration layer. But it asked the right questions—and if the Kelp team or any LP had taken those questions seriously at the time, the $292 million loss could have been avoided.

Preguntas relacionadas

QWhat was the root cause of the $292 million Kelp DAO exploit?

AThe root cause was a configuration issue in LayerZero's cross-chain bridge, specifically a 1-of-1 DVN (Decentralized Verifier Network) setup. This meant only a single compromised node was needed to forge cross-chain messages and mint fraudulent rsETH tokens.

QHow did the author's open-source AI tool identify the risk 12 days before the attack?

AThe tool flagged the risk by identifying an 'information gap' - Kelp DAO had not publicly disclosed its DVN configuration (verifier set and threshold requirements). It also matched Kelp's multi-chain architecture to historical bridge attack patterns like Ronin and Harmony.

QWhat were the three main things the author's tool failed to do correctly in its assessment?

A1. Underrated the risk (rated bridge risk as 'medium' instead of 'high' or 'critical'). 2. Failed to penetrate the configuration layer to verify the actual DVN setup. 3. Did not check on-chain data (ULN302 registry) which could have revealed the 1-of-1 configuration.

QWhy did the exploit have such a widespread impact beyond Kelp DAO itself?

AThe exploit impacted over 20 L2 chains where rsETH was deployed. Since all rsETH tokens derived their value from assets on Ethereum mainnet, the bridge compromise caused all rsETH across all chains to become unbacked simultaneously, freezing liquidity and creating uncertainty.

QWhat broader point does the article make about DeFi security and AI tools?

AThe article argues that DeFi security extends beyond smart contract code audits to include configuration, governance, and architectural risks. AI-powered tools can serve as an independent security layer for investors by analyzing these often-overlooked risks using public data and historical attack pattern matching.

Lecturas Relacionadas

You Bet on the News, the Pros Read the Rules: The True Cognitive Gap in Losing Money on Polymarket

The article explains that the key to profiting on Polymarket, a prediction market platform, lies not just predicting real-world events correctly, but in meticulously understanding the specific rules that govern how each market will be resolved. It illustrates this with examples, such as a market on Venezuela's 2026 leader, where the official rules defining "officially holds" the office overruled the intuitive answer of who was in practical control. Other examples include debates over the definition of a "token" or what constitutes an "agreement." The core argument is that a "reality vs. rules" gap creates pricing discrepancies that savvy traders ("车头" or "whales") exploit. The platform has a formal dispute resolution process managed by UMA token holders to settle ambiguous outcomes. This process involves proposal submission, a challenge window, a discussion period, and a final vote. However, the article highlights a critical flaw in this system compared to a traditional court: the lack of separation between the arbiters (UMA voters) and the interested parties (traders with financial stakes in the outcome). This conflict of interest undermines the discussion phase, leads to herd mentality, and results in opaque final decisions without explanatory rulings. Consequently, the system lacks a body of precedent, making it difficult for users to learn from past disputes. The ultimate takeaway is that success on Polymarket requires a lawyer-like scrutiny of the rules to identify and capitalize on the cognitive gap between how events appear and how they are contractually defined for settlement.

marsbitHace 1 hora(s)

You Bet on the News, the Pros Read the Rules: The True Cognitive Gap in Losing Money on Polymarket

marsbitHace 1 hora(s)

Trading

Spot
Futuros

Artículos destacados

Cómo comprar DAO

¡Bienvenido a HTX.com! Hemos hecho que comprar DAO Maker (DAO) sea simple y conveniente. Sigue nuestra guía paso a paso para iniciar tu viaje de criptos.Paso 1: crea tu cuenta HTXUtiliza tu correo electrónico o número de teléfono para registrarte y obtener una cuenta gratuita en HTX. Experimenta un proceso de registro sin complicaciones y desbloquea todas las funciones.Obtener mi cuentaPaso 2: ve a Comprar cripto y elige tu método de pagoTarjeta de crédito/débito: usa tu Visa o Mastercard para comprar DAO Maker (DAO) al instante.Saldo: utiliza fondos del saldo de tu cuenta HTX para tradear sin problemas.Terceros: hemos agregado métodos de pago populares como Google Pay y Apple Pay para mejorar la comodidad.P2P: tradear directamente con otros usuarios en HTX.Over-the-Counter (OTC): ofrecemos servicios personalizados y tipos de cambio competitivos para los traders.Paso 3: guarda tu DAO Maker (DAO)Después de comprar tu DAO Maker (DAO), guárdalo en tu cuenta HTX. Alternativamente, puedes enviarlo a otro lugar mediante transferencia blockchain o utilizarlo para tradear otras criptomonedas.Paso 4: tradear DAO Maker (DAO)Tradear fácilmente con DAO Maker (DAO) en HTX's mercado spot. Simplemente accede a tu cuenta, selecciona tu par de trading, ejecuta tus trades y monitorea en tiempo real. Ofrecemos una experiencia fácil de usar tanto para principiantes como para traders experimentados.

122 Vistas totalesPublicado en 2024.12.11Actualizado en 2025.03.21

Cómo comprar DAO

Discusiones

Bienvenido a la comunidad de HTX. Aquí puedes mantenerte informado sobre los últimos desarrollos de la plataforma y acceder a análisis profesionales del mercado. A continuación se presentan las opiniones de los usuarios sobre el precio de DAO (DAO).

活动图片