Attackers compromised two of LayerZero’s own servers that check whether cross-chain transactions are legitimate, then flooded the backup servers with junk traffic to force LayerZero’s verifier onto the compromised ones.

All of that infrastructure was built and run by LayerZero, not Kelp, the sourceclaimed.

The source contested LayerZero’s framing of the “1/1 configuration” as a fringe choice made against guidance. LayerZero’s post-mortem said KelpDAO chose a 1-of-1 DVN setup despite expressing recommendations to configure multi-DVN redundancy.

A “1/1 configuration” means only a single validator must sign off on a cross-chain message for the bridge to act on it, leaving the system with no second check to catch a compromised or forged instruction. A multi-validator configuration (such as 2/3, 3/5, etc.) ensures there is no single point of failure that can approve a forged message on its own.

They added that, through a direct communications channel with LayerZero, which has been open since July 2024, they produced no specific recommendation for Kelp to change the rsETH DVN configuration.

LayerZero’s own quickstart guide and default GitHub configuration point to a 1/1 DVN setup, the source told CoinDesk, adding 40% of protocols on LayerZero are currently using the same configuration.

The configuration Kelp ran also appears in LayerZero’s own V2 OApp Quickstart, where the sample layerzero.config.ts wires every pathway with one required DVN and no optional DVNs. That’s the same 1/1 structure.

Kelp’s core restaking contracts were not touched, and the exploit was isolated to the bridge layer, they added. Its emergency pause, 46 minutes after the drain, blocked two follow-up attempts that would have released an additional ~$200 million in rsETH.

CoinDesk reached out to LayerZero for comment on the story and didn’t hear back by the time of publication.

‘Deflecting responsibility’

Security researchers are also not buying LayerZero’s isolated framing, which pinned the blame on Kelp.

Kelp is a liquid restaking protocol. Its core competency is staking infrastructure, EigenLayer integration, and liquid staking token management. When integrating with LayerZero, Kelp relied on LayerZero’s documentation, their defaults, and their team’s guidance to make configuration decisions, the source claimed.

Yearn Finance core team developer Artem K, who is popularly known as @banteg on X, posted a technical review of LayerZero’s public deployment code and said that the reference setup ships with single-source verification defaults across every major chain, including Ethereum, BSC, Polygon, Arbitrum and Optimism.

That deployment also leaves a public endpoint exposed that leaks the list of configured servers to anyone who queries it.

Banteg flagged in his analysis that he can’t prove which configuration Kelp used, but noted that LayerZero usually asks new operators to use its default setup, which its post-mortem criticized.

Chainlink community manager Zach Rynes put it bluntly on X, alleging that LayerZero was “deflecting responsibility” for its own compromised infrastructure and accused the company of throwing Kelp under the bus for trusting a setup LayerZero itself supported.

As such, LayerZero has said it will no longer sign messages for any application running a single-verifier setup, forcing a protocol-wide migration.

Read more: ‘DeFi is dead’: crypto community scrambles after this year’s biggest hack exposes contagion risk

More For You

North Korea flag

LayerZero said the attackers compromised two RPC nodes the company’s verifier relied on and DDoS’d the rest, with the attack working only because Kelp had ignored multi-verifier recommendations.

What to know:

  • LayerZero blamed the $290 million Kelp DAO exploit on Kelp’s decision to use a single-verifier configuration, despite prior warnings to adopt a multi-verifier setup.
  • Attackers, whom LayerZero preliminarily linked to North Korea’s Lazarus Group, compromised two RPC nodes and used a DDoS attack to force failover, tricking LayerZero’s verifier into…

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Stories