“The default was do nothing,” Goldfeder said to CoinDesk, describing the early stages of the Security Council’s deliberations. “Then this idea actually emerged [from a security council member]… a way to do it in a very surgical way… without affecting any other user, not affecting the network performance and not having any downtime.”

The result was what Arbitrum has described as a “freeze.” But technically, the move required something more active: The use of privileged powers to transfer funds out of the attacker-controlled address and into a wallet with no owner, effectively rendering them immobile.

That distinction is at the heart of the decentralization debate. In its purest form, decentralization implies that no individual or group can unilaterally interfere with transactions once they are executed, often summed up by the phrase “code is law.” Critics worry that if a small group can step in to stop a hacker, the same mechanism could, in theory, be used in other situations as well, whether under regulatory pressure or political influence.

In simpler terms, the concern is less about this specific case and more about precedent: If intervention is possible, where is the line drawn, and who decides?

That capability, now demonstrated in practice, raises broader questions about the boundaries of decentralization on Layer 2 blockchains, and the tradeoff between security and neutrality.

While the Security Council is elected by token holders, it is still a relatively small group capable of acting quickly and, in this case, decisively.

Patrick McCorry, the head of research at the Arbitrum Foundation and who coordinates with the Security Council, emphasized that this structure is by design.

The Security Council is “a very transparent part of the system,” according to McCorry; “You can see exactly what powers they have.” In addition, he said, “they’re elected by token holders… not hand-picked by us [Arbitrum Foundation + Offchain Labs].”

Currently, the Security Council is selected through recurring on-chain elections, with token holders voting every six months to appoint its 12 members

From that perspective, Arbitrum’s model reflects a different interpretation of decentralization, one where authority is delegated by the community, rather than eliminated entirely.

Some critics have argued that a decision of this magnitude should have gone through token-holder governance. But Goldfeder pushed back on that idea, arguing that speed and discretion were essential.

“The DAO cannot be consulted, because the second the DAO is consulted, that essentially means North Korea is consulted,” he said, referring to ongoing investigative efforts suggesting the attacker’s ties.

“If you say, ‘hey guys, should we move these funds?’ then you might as well do nothing,” he said.

In that framing, the choice was not between decentralized and centralized decision-making, but between acting quickly or allowing the funds to disappear. Indeed, the attackers began moving and laundering the remaining stolen funds within hours of the Security Council’s intervention.

Supporters of the move say that reality highlights a different tradeoff, one between ideals and practical risk management. Without some form of emergency intervention, stolen funds in crypto are typically unrecoverable, and large exploits can cascade through the ecosystem.

From this perspective, the Security Council functions less as a centralized authority and more as a last-resort safeguard, designed to step in only under extreme conditions.

“We’re no more or less decentralized today than we were yesterday,” Goldfeder said.

Read more: Arbitrum freezes $71 million in ether tied to Kelp DAO exploit

More For You

Fingers rest on a computer keyboard. (Shutterstock)

A $20 billion hit from the KelpDAO exploit highlights systemic risks, while flat ETH-denominated growth and a shift to stablecoins point to ongoing fragility in DeFi.

What to know:

  • JPMorgan said hacks and stagnant capital levels in decentralized finance continue to weigh on DeFi’s institutional appeal, highlighted by a $20 billion hit from the KelpDAO exploit.
  • Bridge and infrastructure exploits remain the main risk, with losses tracking 2025 levels and undermining trust.
  • Investors are rotating into stablecoins like USDT…

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Stories