KelpDAO Security Incident Review: How Arbitrum Froze 30,766 Stolen ETH

Markets
更新済み: 2026-04-21 12:25

On April 18, 2026, KelpDAO suffered the largest DeFi security breach of the year. The attacker exploited its LayerZero-powered cross-chain bridge to steal approximately 116,500 rsETH, valued at around $292 million. Unlike traditional smart contract vulnerabilities, this incident was a systemic security event amplified by the failure of the cross-chain trust model and the composability of DeFi protocols.

The core technical flaw lay in the configuration of LayerZero’s cross-chain verification architecture. KelpDAO’s rsETH bridge used the LayerZero OFT (Omnichain Fungible Token) solution, which relies on a DVN (Decentralized Verification Network) for security. However, KelpDAO operated with a 1-of-1 validator node setup, meaning a single validator’s signature was sufficient to confirm cross-chain messages. The attacker forged a cross-chain message, triggering the automatic release of roughly $292 million in assets. The execution was highly efficient: from the initial function call to the complete transfer of funds, the entire process took just 46 minutes.

After the theft, the attacker deposited the stolen rsETH as collateral into Aave V3 and other lending protocols, borrowing a large amount of ETH and creating about $196 million in bad debt on Aave’s books. Aave’s total value locked (TVL) plummeted from about $26.4 billion to $18.6 billion, and the AAVE token dropped around 20% in a single day. The attacker then moved approximately 30,766 ETH to an address on the Arbitrum One chain, a move that directly triggered intervention by the security council.

What Was the Security Council’s Basis for Action?

The Arbitrum Security Council is a 12-member body elected by the Arbitrum DAO. Members rotate through regular elections, serving 12-month terms with staggered six-person cohorts. The council’s core function is to act swiftly in emergencies, using a 9-of-12 multisig wallet to protect the security and integrity of the Arbitrum ecosystem.

In this incident, the council’s intervention was predicated on confirmation of the attacker’s identity, with assistance from law enforcement. Arbitrum’s official announcement stated that the council acted "based on information about the attacker’s identity provided by law enforcement." From a governance perspective, this action aligns with the definition of a "catastrophic emergency" in Arbitrum’s progressive decentralization documentation, providing the council with legal grounds for intervention.

It’s important to note that the council’s powers are not unlimited. According to the Arbitrum DAO charter, the council can bypass standard governance processes only in emergencies, requiring at least 9 of 12 members to agree. In this case, nine members voted to freeze the funds, meeting the minimum multisig threshold. Council member Griff Green stated on X that the decision was "not made lightly, but after countless hours of technical, practical, ethical, and political debate."

How Was the On-Chain Freeze Technically Implemented?

Dragonfly Managing Partner Haseeb Qureshi provided a detailed explanation of the technical mechanism. The freeze transaction used the ArbitrumUnsignedTxType (EIP-2718 type 0x65/101), a system-level transaction that cannot be generated by ordinary externally owned accounts (EOAs) via private key signatures. Only the security council, using ArbOS injection, can execute such transactions.

This means the operation fundamentally differs from standard blockchain transactions. Regular transactions are authorized by user private keys, while the legitimacy of this system-level transaction derives from the chain’s consensus rules, not any individual user’s signature. The council, through 9-of-12 multisig approval, triggered ArbOS’s core state modification capabilities, directly altering the account balance of a specific address—transferring 30,766 ETH from the attacker’s address to an intermediate freeze wallet. The chain’s execution logic enforced this transfer.

Notably, this action was not a traditional "chain rollback." No confirmed blocks were reversed, and no transaction history was rewritten. All on-chain records during the attack remain intact, preserving the blockchain’s immutability. From a state machine perspective, this was a "state-level" asset recovery: the attacker’s private key can still sign transactions, but the core assets at that address have been forcibly moved to a governance-controlled wallet by the chain’s rules. This technical approach enables targeted intervention while maintaining the integrity of the blockchain ledger.

The freeze operation was highly precise. Arbitrum emphasized that the transfer "did not affect any other on-chain state or Arbitrum users," nor did it disrupt any Arbitrum applications. As of 11:26 PM ET on April 20, the funds had been successfully moved to the intermediate freeze wallet, and the attacker’s original address no longer had access to these assets. Any further movement of the funds can only occur through coordinated action by the Arbitrum governance body.

How Does Governance Intervention Balance with Decentralization Principles?

While the freeze effectively intercepted a portion of the stolen funds, it also sparked significant debate about the boundaries of decentralized network governance. A Layer-2 security council, with law enforcement support, intervened to freeze assets at a specific on-chain address—setting an important precedent in DeFi history.

The central controversy: Are blockchain immutability and censorship resistance absolute principles, or can they be compromised under specific circumstances? Supporters argue that, when user assets face massive losses, emergency governance intervention is a necessary tool for ecosystem security. As an elected community body, the security council’s actions represent collective will in extreme scenarios. Critics counter that any on-chain asset freeze undermines blockchain’s foundational philosophy. On X, multiple users criticized Arbitrum’s move, questioning how decentralized the network remains if the council can freeze funds by decree.

From a systems design perspective, the Arbitrum Security Council’s authority is clearly defined. According to Arbitrum’s progressive decentralization documentation, the council can only exercise such powers in "catastrophic emergencies" and must meet the 9-of-12 multisig threshold. Council members are DAO-elected and can be removed by DAO vote or internal recall, providing a system of checks and balances. However, this incident also exposed an unresolved issue: in the absence of on-chain automated triggers, the standard for defining a "catastrophic emergency" remains subjective, making the scope of council authority a potential governance risk.

What Systemic Risks Did Cross-Chain Infrastructure Reveal?

The KelpDAO security incident fundamentally highlights the structural fragility of cross-chain infrastructure. In recent years, cross-chain bridge hacks have accounted for over $2.8 billion in stolen funds—nearly half of all DeFi losses. This event reinforces that trend: the core vulnerability was not a flaw in smart contract code, but a single point of failure in the cross-chain verification trust model.

LayerZero’s investigation noted that KelpDAO’s 1-of-1 DVN validator setup violated industry best practices. LayerZero had repeatedly recommended a multi-validator configuration for redundancy, but these suggestions were not implemented. This setup meant compromising a single validator was enough to release all bridge assets. Ripple CTO David Schwartz summarized the issue on X: "The attack was far more complex than expected, exploiting KelpDAO’s configuration oversight and targeting LayerZero’s infrastructure."

The trust model of cross-chain infrastructure is, at its core, a "compromise" of blockchain’s decentralization assumptions. In a multi-chain ecosystem, asset transfers between chains require an intermediary to validate and relay messages. Whether this intermediary uses multisig, DVN, or another mechanism, it’s difficult to eliminate reliance on a specific group of validators. The KelpDAO incident shows that when this reliance narrows to a single point, the entire bridge becomes a critical vulnerability.

How Will the Industry Reshape Security and Governance Frameworks?

This incident offers several important lessons for the DeFi industry.

On the cross-chain security front, single-validator configurations should be deemed unacceptable. LayerZero has taken affected nodes offline and restored DVN operations, but a broader question remains: how many protocols are still running with similar single-point setups? The industry needs stricter cross-chain security audit standards and configuration guidelines to eliminate single-point trust risks at the systemic level.

On the governance side, the balance between security council emergency powers and community-driven governance needs further refinement. Currently, the council’s scope of action in "catastrophic emergencies" is still based on subjective judgment, lacking clear on-chain triggers and post-event review mechanisms. A possible evolution is a multi-tiered emergency response framework, matching authorization levels to incident severity and introducing independent review committees to assess the legitimacy of emergency actions after the fact.

Regarding loss allocation, the KelpDAO incident involved total losses of about $292 million, with the Arbitrum Security Council successfully freezing roughly $71 million—about a quarter of the total. The handling of the remaining losses—including Aave’s $196 million in bad debt, inter-protocol loss-sharing mechanisms, and potential insurance payouts—is still under negotiation. This case may prompt DeFi protocols to incorporate emergency response and loss-sharing mechanisms into their design from the outset, rather than seeking ad hoc solutions after incidents occur.

Conclusion

From the cross-chain bridge exploit to the security council’s freeze of 30,766 ETH, the KelpDAO incident provides a comprehensive look at DeFi’s emergency response mechanisms in the face of large-scale attacks. The central dilemma—flaws in cross-chain trust models versus the limits of decentralized governance intervention—will guide future industry reforms and security upgrades. The successful freeze of 30,766 ETH marks a milestone in asset recovery, but it raises more questions than it answers: Who defines a "catastrophic emergency"? How can emergency intervention standards be enforced on-chain? How can cross-chain trust assumptions be optimized for both security and decentralization? The answers to these questions will shape the evolution of the DeFi ecosystem for years to come.

Frequently Asked Questions (FAQ)

How did the Arbitrum Security Council precisely freeze funds without affecting other users?

The council used a system-level technical approach targeting a specific address. By executing an ArbitrumUnsignedTxType transaction via ArbOS injection, they directly transferred 30,766 ETH from the attacker’s address to an intermediate freeze wallet. This operation did not alter any historical blocks or affect the balances or contract operations of other users. Its precision lies in modifying only the targeted address’s state.

What will happen to the frozen 30,766 ETH?

Currently, these funds are held in a relay wallet controlled solely by the Arbitrum governance body. Any subsequent transfers will require approval through Arbitrum’s governance process and coordination with relevant parties. The specific plan for returning the funds has not been announced and will likely depend on the progress of law enforcement investigations and legal proceedings.

How did the freeze impact the overall handling of the KelpDAO security incident?

The action successfully recovered about $71 million of stolen funds—nearly a quarter of the total losses—effectively limiting the attacker’s control over these assets. However, the full resolution of the KelpDAO incident—including the handling of Aave’s roughly $196 million in bad debt, the allocation of responsibility between KelpDAO and LayerZero, and cross-protocol compensation arrangements—is still ongoing.

The content herein does not constitute any offer, solicitation, or recommendation. You should always seek independent professional advice before making any investment decisions. Please note that Gate may restrict or prohibit the use of all or a portion of the Services from Restricted Locations. For more information, please read the User Agreement
コンテンツに「いいね」する