An Open-Source AI Tool That No One Saw Predicted Kelp DAO's $292 Million Vulnerability 12 Days Ago

marsbitPublished on 2026-04-20Last updated on 2026-04-20

Abstract

An open-source AI security tool flagged critical risks in Kelp DAO’s cross-chain architecture 12 days before a $292 million exploit on April 18, 2026—the largest DeFi incident of the year. The vulnerability was not in the smart contracts but in the configuration of LayerZero’s cross-chain bridge: a 1-of-1 Decentralized Verifier Network (DVN) setup allowed an attacker to forge cross-chain messages with a single compromised node. The tool, which performs AI-assisted architectural risk assessments using public data, identified several unremediated risks, including opaque DVN configuration, single-point-of-failure across 16 chains, unverified cross-chain governance controls, and similarities to historical bridge attacks like Ronin and Harmony. It also noted the absence of an insurance pool, which amplified losses as Aave and other protocols absorbed nearly $300M in bad debt. The attack unfolded over 46 minutes: the attacker minted 116,500 rsETH on Ethereum via a fraudulent message, used it as collateral to borrow WETH on lending platforms, and laundered funds through Tornado Cash. While an emergency pause prevented two subsequent attacks worth ~$200M, the damage was severe. The tool’s report, committed to GitHub on April 6, scored Kelp DAO a medium-risk 72/100—later acknowledged as too lenient. It failed to query on-chain DVN configurations or initiate private disclosure, highlighting gaps in current DeFi security approaches that focus on code audits but miss config-level and ...

Author: Zengineer

Compiled by: Deep Tide TechFlow

Deep Tide Introduction: On April 18, Kelp DAO was hacked for $292 million, making it the largest DeFi incident so far in 2026. The vulnerability wasn't in the contract code, but in the LayerZero cross-chain bridge's 1-of-1 verifier node configuration—a single point of failure that allowed the forging of cross-chain messages. The author, using their own open-source AI auditing tool to scan Kelp 12 days prior, had already flagged this risk. This article reviews the entire attack process and honestly reflects on three things the tool got wrong at the time.

What is Kelp DAO

Kelp DAO is a liquidity restaking protocol built on top of EigenLayer. The mechanism is as follows: users deposit ETH or liquid staking tokens (stETH, ETHx) into Kelp contracts, which then delegate the assets to EigenLayer operator nodes for restaking—simultaneously providing security to multiple AVSs (Actively Validated Services). In return, users receive rsETH as a certificate. Unlike direct restaking on EigenLayer (where assets are locked), rsETH is liquid—it can be traded, used as collateral in lending protocols like Aave, and bridged across chains.

To achieve this cross-chain liquidity, Kelp deployed rsETH on over 16 chains using LayerZero's OFT (Omnichain Fungible Token) standard. When you bridge rsETH from Ethereum to an L2, LayerZero's DVN (Decentralized Verifier Network) verifies whether the cross-chain message is legitimate. This bridge architecture is the core of the subsequent story.

Kelp was initiated by Amitej Gajjala and Dheeraj Borra (previously co-founder of Stader Labs), launched in December 2023, with a peak TVL of $2.09 billion. Governance uses a 6/8 multi-signature wallet plus a 10-day timelock for contract upgrades. The governance token KERNEL governs the Kelp, Kernel, and Gain product lines.

The Hack

On April 18, 2026, an attacker drained 116,500 rsETH, worth approximately $292 million, from Kelp DAO's cross-chain bridge—the largest DeFi attack of 2026 so far. The root cause was not a smart contract vulnerability, but a configuration issue: a 1-of-1 DVN setup (meaning only 1 verifier node, validated by 1 signature) allowed the attacker to forge cross-chain messages by compromising a single node.

12 days prior, on April 6, my open-source security auditing tool had flagged this attack surface.

Let me be clear first: this hack resulted in real people losing real money. Aave WETH depositors who never touched rsETH had their funds frozen; LPs across multiple protocols are facing bad debt they never signed up for. This article analyzes what happened and what our tool caught—but the actual cost to people is more important than any scorecard.

The full report is hosted on GitHub, with a commit timestamp anyone can verify. Below is what we caught, what we missed, and what this means for DeFi security tools.

46 Minutes That Shook DeFi

At 17:35 UTC on April 18, the attacker compromised the isolated DVN verifier node and had it "approve" a forged cross-chain message. LayerZero's Endpoint, seeing the DVN's approval, passed the message via lzReceive to Kelp's OFT contract—which complied, minting 116,500 rsETH on the Ethereum mainnet. The message claimed equivalent assets were locked as collateral on another chain. Those assets never existed.

What followed was a standard DeFi money laundering process:

  1. Deposit the stolen rsETH as collateral into Aave V3, Compound V3, Euler
  2. Borrow approximately $236 million in WETH using this unbacked collateral
  3. Consolidate around 74,000 ETH and cash out via Tornado Cash

46 minutes later, at 18:21, Kelp's emergency pause multi-signature froze the contracts. The attacker then attempted two follow-up attacks (40,000 rsETH each, ~$100 million) which were reverted—this pause blocked an additional $200 million.

But the fallout was still severe. Aave V3 absorbed approximately $177 million in bad debt. The AAVE token plummeted 10.27%. ETH fell 3%. WETH utilization on Aave instantly maxed out to 100% as depositors rushed to withdraw. rsETH on over 20 L2s became assets of questionable value overnight.

What the April 6th Report Caught

In early April, shortly after the April 1st Drift Protocol hack of $285 million, I wrote an open-source Claude Code skill called crypto-project-security-skill—an AI-assisted architectural risk assessment framework that uses public data (DeFiLlama, GoPlus, Safe API, on-chain verification) to evaluate DeFi protocols. It's not a code scanner or a formal verification tool. The Drift incident made me realize: what causes the biggest losses isn't in the smart contract code—it's in governance vulnerabilities, configuration oversights, architectural blind spots, places code scanners never see. So I built a tool specifically to assess these layers: governance structure, oracle dependencies, economic mechanisms, cross-chain architecture, comparing each protocol against attack patterns from historical hacks (Drift, Euler, Ronin, Harmony, Mango).

On April 6, I ran a full audit on Kelp DAO. The complete report is publicly available on GitHub with an immutable commit timestamp.

The report gave Kelp a composite triage score of 72/100 (Medium Risk). In hindsight, this score was too lenient—those unanswered cross-chain information gaps should have pulled it lower. But even with a medium risk rating, the report pointed to the attack surface that was later exploited.

The screenshot below is the original text from the "Information Gaps" section of the report—the question about Kelp's DVN configuration that became the root cause of the $292 million theft:

Caption: The "Information Gaps" section from the April 6th report directly named DVN configuration opacity.

Let's go through what the report flagged versus what actually happened.

Finding 1:DVN Configuration Opacity(Warning Sign)

Report原文: "LayerZero DVN configuration (verifier sets per chain, threshold requirements) not publicly disclosed"

What Actually Happened: Kelp was running a 1-of-1 DVN configuration. One node. One single point. The attacker compromised this one node and forged cross-chain messages. If the configuration had been 2-of-3 (the industry minimum recommendation), the attacker would have needed to compromise multiple independent verifiers simultaneously.

Let's be clear: this is Kelp's issue, not LayerZero's. LayerZero is infrastructure—it provides the DVN framework, and each protocol chooses its own configuration: how many verifiers (1-of-1, 2-of-3, 3-of-5...), whose nodes to use, thresholds per chain. Kelp chose 1-of-1 when deploying the OFT bridge. LayerZero fully supports 2-of-3 or higher—Kelp simply didn't enable it.

An analogy: AWS provides MFA (Multi-Factor Authentication). If your account gets hacked because you never turned on MFA, that's your problem, not AWS's. LayerZero made the security mechanisms available; Kelp didn't use them.

Our report couldn't determine the specific DVN threshold at the time (because Kelp never disclosed it), but we explicitly listed this opacity as an unresolved information gap and risk item. The unwillingness to disclose itself is a red flag.

Finding 2:Single Point of Failure Across 16 Chains(Direct Hit)

Report原文: "Single point of failure in LayerZero DVN could simultaneously affect rsETH on all 16 supported chains"

What Actually Happened: The forged message hit the Ethereum mainnet directly, and the shockwave spread to all chains where rsETH was deployed. LayerZero preemptively paused all OFT bridges outgoing from Ethereum. Holders of rsETH on over 20 L2s were left with tokens of questionable backing overnight.

This is the systemic risk of multi-chain deployment: rsETH was circulating on Arbitrum, Optimism, Base, Scroll, and other L2s simultaneously, but the value of all these tokens derived from assets on the Ethereum mainnet. Once the mainnet bridge was compromised, rsETH on every L2 simultaneously lost its backing—holders could neither redeem nor verify if their tokens were still valuable. Lido's earnETH (which holds rsETH exposure), Ethena's LayerZero bridge—all were forced to pause. The blast radius extended far beyond Kelp itself.

Finding 3:Unaudited Cross-Chain Governance Control(Related Issue)

Report原文: "Governance control over LayerZero OFT configuration across chains is unverified—specifically: whether these controls reside with the same 6/8 multi-sig and 10-day timelock, or are managed by independent admin keys"

What Actually Happened: The DVN configuration was clearly not under the strict governance of the core protocol. If bridge configuration changes were also governed by the 6/8 multi-sig + 10-day timelock, a 1-of-1 DVN setup would require consent from 6 out of 8 signers—a configuration unlikely to have gone unnoticed.

This exposes a common governance blind spot: many protocols impose strict multi-sigs and timelocks on core contract upgrades, but operational changes—bridge configurations, oracle parameters, whitelist management—are often modifiable by a single admin key. Kelp's core protocol governance was industry-leading (6/8 multi-sig + 10-day timelock), but these protections did not extend to its largest attack surface: the cross-chain bridge.

Finding 4:Matched Ronin/Harmony Attack Pattern(Direct Hit)

Report原文: "The most relevant historical precedents involve bridge security. Kelp's LayerZero deployment across 16 chains introduces operational complexity similar to Ronin's multi-chain architecture"

What Actually Happened: The attack path almost perfectly replicated the Ronin playbook—compromise bridge validators, forge messages, drain assets. Our tool's attack pattern matching module, which compares protocol architecture against historical attack categories, correctly identified this as the highest-risk attack vector.

Historical context: In 2022, the Ronin bridge lost $625 million due to 5 out of 9 validators being compromised; that same year, Harmony's Horizon bridge lost $100 million due to 2 out of 5 validators being compromised. Kelp's situation was more extreme—only 1 validator, lowering the attack barrier to an absolute minimum. The tool flagged this risk because it automatically compares protocol architecture against these historical attack patterns, not just the code.

Finding 5:No Insurance Fund(Amplified Losses)

Report原文: "The protocol currently lacks a dedicated insurance pool or socialized loss mechanism to absorb slashing events"

What Actually Happened: With no insurance reserve, the entire $292 million loss was absorbed by downstream protocols. Aave's safety module covered less than 30% of its $177 million bad debt. LPs who had nothing to do with Kelp's bridge configuration decision bore the brunt of the impact.

The attacker deposited the stolen rsETH as collateral into Aave V3, Compound V3, Euler, and borrowed real WETH. Once rsETH was confirmed to be unbacked, these positions became "unliquidatable" bad debt—the collateral was worthless, but the borrowed WETH was gone. WETH utilization on Aave instantly maxed out, preventing ordinary users from withdrawing. If you were a WETH depositor on Aave, even if you never touched rsETH, your funds were affected. Kelp's insurance partnership with Nexus Mutual only covered specific vault products, not the core rsETH protocol exposure.

This is a failure of responsibility on both sides. Kelp's side: A protocol managing $1.3 billion TVL had zero insurance pool, zero loss absorption mechanism. When the bridge was compromised, there was no buffer to absorb the damage. Aave's side: It accepted rsETH as collateral but did not sufficiently assess its cross-chain bridge configuration risk. Aave's risk parameters (LTV, liquidation threshold) were designed for normal price volatility, not the tail risk of "bridge configuration compromise rendering collateral worthless overnight." The safety module couldn't even cover 30% of the bad debt. Essentially, this was a risk pricing failure: Aave treated rsETH as a normally fluctuating asset, but it actually carried the tail risk of bridge failure. The failures compounded—Kelp had no insurance to prevent bad collateral from entering the system, and Aave didn't do sufficiently granular risk modeling to limit exposure in such a scenario.

Where We Were Wrong

Three things could have been done better:

Underrated the risk. We rated the cross-chain bridge risk as "Medium." The report had 5 unresolved information gaps, 3 of which were related to LayerZero bridge configuration, plus a match to historical attack patterns like Ronin/Harmony—this should have been "High" or "Critical." Opacity itself should have been a stronger signal.

We failed to penetrate the configuration layer. The report repeatedly asked Kelp to disclose the DVN threshold, but we couldn't verify it independently. This is the same structural blind spot pointed out in post-mortem analyses: existing auditing tools focus on code logic and miss configuration-layer risks. We flagged the problem but couldn't answer it.

We didn't check on-chain. The DVN configuration could actually be read directly on-chain via LayerZero's EndpointV2 contract. We could have queried the ULN302 registry to independently verify Kelp's DVN threshold, instead of labeling it "not publicly disclosed." If we had checked, we would have directly seen the 1-of-1 configuration, no Kelp disclosure needed. This is the most specific area for tool improvement: add on-chain DVN configuration verification to the cross-chain assessment step.

Findings weren't specific or actionable enough. Saying "DVN configuration not disclosed" is an observation about missing documentation—not a prediction of an attack. These risks (oracle centralization, bridge dependency, lack of insurance) are also普遍 (widespread) across most cross-chain DeFi protocols. The tool flagged Kelp's opacity, but it has also flagged similar patterns on dozens of protocols that weren't attacked. Without published false positive rates, claiming "we predicted it" is an overstatement. A more honest assessment is: we asked some correct questions that no one else was asking, and one of them happened to hit the critical load-bearing point.

On "Responsible Disclosure"

A fair question: If we flagged these risks on April 6, why didn't we notify Kelp before the attack on April 18?

We didn't notify. The reason: The report identified opacity—"DVN configuration not disclosed"—not a specific, exploitable vulnerability. We didn't know the configuration was 1-of-1, only that it wasn't public. There was nothing concrete enough to disclose. "Your bridge configuration lacks documentation" is a governance observation, not a report suitable for a bug bounty program.

In hindsight, we could have directly contacted the Kelp team and asked about their DVN threshold. That conversation might have exposed the 1-of-1 configuration and prompted a fix. We didn't do that. It's a lesson: even if a finding seems too vague for formal disclosure, sending a private message to ask is still worthwhile.

What This Means for DeFi Security

The Kelp hack—like the Drift hack 17 days prior—was not a smart contract vulnerability. Automated code scanners like Slither, Mythril, or even GoPlus couldn't catch it. The vulnerability hid in deployment configurations, governance gaps, and architectural decisions, residing above the code layer.

This is also the core proposition of the crypto-project-security-skill:

Protocol security is more than just code security. A protocol can have perfect Solidity, five audits from top firms, a $250k bug bounty—and still lose $292 million due to a verifier configuration issue.

The tool is open-source on GitHub—anyone can review the methodology, run it themselves, or improve it.

Timeline

12 days. The signal was there. The question is: How does the ecosystem build tools that can see these signals before the next bridge falls?

What You Can Do

If you have assets in DeFi protocols with cross-chain bridges:

  1. Run an audit yourself. The tool is open-source. Don't trust us—verify yourself.
  2. Check bridge verifier configuration. If a protocol is unwilling to disclose its DVN threshold, treat it as a red flag. Our report did exactly that, and it was right.
  3. Don't assume code audits cover everything. Kelp had 5+ code audits from renowned firms and platforms (Code4rena, SigmaPrime, MixBytes). Traditional code audits are not designed to catch configuration-layer risks like DVN threshold settings—that's a different type of analysis, not a failure of the audit firms.
  4. Evaluate insurance coverage. If a protocol has no insurance pool, and you are an LP on a lending platform that accepts its token as collateral, you are implicitly underwriting its risk. Aave's WETH depositors learned this the hard way.

The Bigger Picture: AI Agent as a Security Layer

This article is about one tool and one hack. But the underlying proposition is larger: AI Agents can become an independent security layer for DeFi investors.

The traditional security model in crypto is this: Protocols hire audit firms, audit firms look at code, audit firms issue reports. This model has blind spots—the Kelp incident illustrates this perfectly. It focuses on code correctness but misses configuration, governance, and architectural risks.

Claude Code and skill tools like this offer another path: Anyone can use public data to run an AI-assisted risk assessment on any protocol in minutes. You don't need to spend $200k on an audit firm. You don't need to read Solidity. You let the agent compare the protocol's architecture against known attack patterns, and it surfaces the questions you should ask before depositing funds.

This won't replace professional audits—but it lowers the barrier to first-layer due diligence to a level accessible to everyone. An LP considering allocating funds to a new restaking protocol can now run `audit defi ` and get a structured risk assessment covering governance, oracles, bridges, and economic mechanisms. This is a real shift in how retail and mid-tier investors can protect themselves.

That Kelp report wasn't perfect. It rated bridge risk as Medium, should have been Critical. It didn't penetrate the configuration layer. But it asked the right questions—and if the Kelp team or any LP had taken those questions seriously at the time, the $292 million loss could have been avoided.

Related Questions

QWhat was the root cause of the $292 million Kelp DAO exploit?

AThe root cause was a configuration issue in LayerZero's cross-chain bridge, specifically a 1-of-1 DVN (Decentralized Verifier Network) setup. This meant only a single compromised node was needed to forge cross-chain messages and mint fraudulent rsETH tokens.

QHow did the author's open-source AI tool identify the risk 12 days before the attack?

AThe tool flagged the risk by identifying an 'information gap' - Kelp DAO had not publicly disclosed its DVN configuration (verifier set and threshold requirements). It also matched Kelp's multi-chain architecture to historical bridge attack patterns like Ronin and Harmony.

QWhat were the three main things the author's tool failed to do correctly in its assessment?

A1. Underrated the risk (rated bridge risk as 'medium' instead of 'high' or 'critical'). 2. Failed to penetrate the configuration layer to verify the actual DVN setup. 3. Did not check on-chain data (ULN302 registry) which could have revealed the 1-of-1 configuration.

QWhy did the exploit have such a widespread impact beyond Kelp DAO itself?

AThe exploit impacted over 20 L2 chains where rsETH was deployed. Since all rsETH tokens derived their value from assets on Ethereum mainnet, the bridge compromise caused all rsETH across all chains to become unbacked simultaneously, freezing liquidity and creating uncertainty.

QWhat broader point does the article make about DeFi security and AI tools?

AThe article argues that DeFi security extends beyond smart contract code audits to include configuration, governance, and architectural risks. AI-powered tools can serve as an independent security layer for investors by analyzing these often-overlooked risks using public data and historical attack pattern matching.

Related Reads

Why Do You Always Lose Money on Polymarket? Because You're Betting on News, While the Pros Read the Rules

Why do you always lose money on Polymarket? Because you bet on news, while the pros study the rules. This article explains how top traders ("che tou") profit by meticulously analyzing market rules, not just predicting events. Polymarket, a prediction market platform, often sees disputes over event outcomes due to ambiguous rule wording. For instance, a market asking "Who will be the leader of Venezuela by the end of 2026?" was misinterpreted by many who bet on Delcy Rodríguez, assuming she held power. However, the rules specified "officially holds" as the formally appointed, sworn-in individual. Since Nicolás Maduro was still recognized as president officially, he won the market—even being in prison. To resolve such disputes, Polymarket uses a decentralized arbitration system via UMA protocol. The process involves: 1. Proposal: Anyone can propose a market outcome by staking 750 USDC, earning 5 USDC if unchallenged. 2. Dispute: A 2-hour window allows challenges with a 750 USDC stake; successful challengers earn 250 USDC. 3. Discussion: A 48-hour period on UMA Discord for evidence and debate. 4. Voting: UMA token holders vote in two 24-hour phases (blind then public). Outcomes require >65% consensus and 5M tokens voted; otherwise, four re-votes occur before Polymarket intervention. 5. Settlement: Results are final and automatic. Unlike traditional courts, Polymarket’s system lacks separation between arbitrators and stakeholders—voters often hold market positions, creating conflicts of interest. This leads to herd mentality in discussions and non-transparent outcomes without explanatory rulings, preventing precedent formation. Thus, success on Polymarket hinges on deep rule interpretation, not just event prediction, exploiting gaps between reality and contractual wording.

marsbit18m ago

Why Do You Always Lose Money on Polymarket? Because You're Betting on News, While the Pros Read the Rules

marsbit18m ago

DeepSeek Funding: Liang Wenfeng's 'Realist' Pivot

DeepSeek, a leading Chinese AI company, has initiated its first external funding round, aiming to raise at least $300 million at a valuation of no less than $10 billion. This move marks a significant shift from its founder Liang Wenfeng’s previous idealistic stance of rejecting external capital to maintain independence. Despite strong financial backing from its parent company, quantitative trading firm幻方量化 (Huanfang Quant), which provided an estimated $700 million in revenue in 2025 alone, DeepSeek faces mounting challenges. Key issues include a 15-month gap in major model updates, delays in its flagship V4 release, and the loss of several core researchers to competitors offering significantly higher compensation. The company is also undergoing a strategic pivot by migrating its infrastructure from NVIDIA’s CUDA to Huawei’s Ascend platform, a move aligned with China’s push for technological self-reliance amid U.S. export controls. However, DeepSeek lags behind rivals like智谱AI and MiniMax—both now publicly listed—in areas such as product ecosystem, multimodal capabilities, and commercialization. The funding round, though relatively small in scale, is seen as a way to establish a market-validated valuation anchor, making employee stock options more competitive and facilitating talent retention. It also signals DeepSeek’s transition from a pure research-oriented organization to a commercially-driven player in the global AI ecosystem.

marsbit56m ago

DeepSeek Funding: Liang Wenfeng's 'Realist' Pivot

marsbit56m ago

Trading

Spot
Futures

Hot Articles

How to Buy DAO

Welcome to HTX.com! We've made purchasing DAO Maker (DAO) simple and convenient. Follow our step-by-step guide to embark on your crypto journey.Step 1: Create Your HTX AccountUse your email or phone number to sign up for a free account on HTX. Experience a hassle-free registration journey and unlock all features.Get My AccountStep 2: Go to Buy Crypto and Choose Your Payment MethodCredit/Debit Card: Use your Visa or Mastercard to buy DAO Maker (DAO) instantly.Balance: Use funds from your HTX account balance to trade seamlessly.Third Parties: We've added popular payment methods such as Google Pay and Apple Pay to enhance convenience.P2P: Trade directly with other users on HTX.Over-the-Counter (OTC): We offer tailor-made services and competitive exchange rates for traders.Step 3: Store Your DAO Maker (DAO)After purchasing your DAO Maker (DAO), store it in your HTX account. Alternatively, you can send it elsewhere via blockchain transfer or use it to trade other cryptocurrencies.Step 4: Trade DAO Maker (DAO)Easily trade DAO Maker (DAO) on HTX's spot market. Simply access your account, select your trading pair, execute your trades, and monitor in real-time. We offer a user-friendly experience for both beginners and seasoned traders.

2.0k Total ViewsPublished 2024.03.29Updated 2025.03.21

How to Buy DAO

Discussions

Welcome to the HTX Community. Here, you can stay informed about the latest platform developments and gain access to professional market insights. Users' opinions on the price of DAO (DAO) are presented below.

活动图片