Technology

Why Crypto Bridges Keep Failing: The Structural Vulnerability That the Kelp DAO Exploit Exposed

The $292 million Kelp DAO exploit is the latest evidence that crypto bridge hacks are not accidental failures but predictable consequences of a fundamental architectural problem: bridges outsource truth verification to external intermediaries rather than independently confirming blockchain activity, creating a structural attack surface that no amount of auditing can fully eliminate.

Written By :
MINRK
MINRK
Why Crypto Bridges Keep Failing

1. The Same Problem, Again

The Kelp DAO exploit did not introduce a new class of vulnerability to the crypto industry. It confirmed an existing one — a vulnerability class that has claimed billions of dollars across multiple years and multiple protocols, and that persists not because developers are careless but because the fundamental design choices that make cross-chain bridges functional also make them structurally attackable. The $292 million drained from Kelp's LayerZero-powered bridge on April 18 joins a lineage that includes the $624 million Ronin Bridge attack in 2022, the $320 million Wormhole exploit, and dozens of smaller incidents that collectively make bridge hacks the most productive attack surface in DeFi by stolen value. Understanding why these attacks keep happening requires understanding what bridges actually do — and what they are forced to trust.

2. What Bridges Do and Why Verification Is Hard

Crypto bridges exist because blockchains do not natively communicate with each other. Ethereum cannot verify what has happened on Arbitrum, Solana, or any other chain without outside help. Bridges solve this by locking assets on one blockchain and issuing equivalent representations of those assets on another, creating the illusion of seamless movement across networks that are technically isolated from each other. The mechanism that makes this work is verification: the bridge needs a way to confirm that something actually happened on the originating chain before releasing or minting tokens on the destination chain. In a world where blockchains cannot read each other's state directly, that verification has to be performed by someone or something outside both chains.

That verification gap is where bridges become vulnerable. As Fisch, a security expert quoted in the analysis, described it: bridges outsource verification to small validator groups or external networks rather than independently checking the truth. "The bridge worked as designed," he said of the Kelp attack. "It just believed the wrong information." Sergej Kunz, co-founder of 1inch, characterized the breadth of the resulting attack surface: code vulnerabilities, centralization issues, social engineering, and economic attacks are all possible entry points, because every bridge contains layers of external trust assumptions that can be targeted in different ways.

3. The Mechanics of the Kelp Attack: A Textbook Exploitation of Bridge Trust

The Kelp DAO exploit was not a smart contract bug in the traditional sense. The bridge's code performed exactly as it was written to perform. What the attackers manipulated was the information that the bridge was relying on to decide whether to execute a transfer. LayerZero's bridge verification system used a network of remote procedure call nodes — servers that relay blockchain state data to external applications — to confirm whether transfers were legitimate. Attackers compromised two of those nodes by replacing their software with malicious versions that would report fabricated transaction data to LayerZero's verifier while appearing normal to all other systems querying the same nodes. Then they launched a distributed denial-of-service attack against the remaining clean nodes, forcing the verifier to fall back exclusively on the two compromised ones. With false confirmation in hand, the bridge approved the release of 116,500 rsETH to the attackers' wallet.

The critical insight is that the bridge's logic was never the problem. The problem was that the bridge had no independent way to verify whether the information it was receiving was true. It trusted the verification layer, and the verification layer had been poisoned.

4. The Single Verifier Configuration: A Symptom, Not a Cause

LayerZero's post-mortem framed Kelp's 1-of-1 decentralized verifier network configuration as the primary cause of the exploit, arguing that a multi-verifier setup would have required consensus across independent validators before the fraudulent message was accepted. That argument has merit as far as it goes: additional independent verifiers would have made this specific attack significantly harder to execute. But security experts have noted that it addresses only the symptoms of the structural problem rather than the structural problem itself.

Even with multiple verifiers, bridges remain dependent on external information sources that can in principle be compromised, manipulated, or disagree with each other in ways that create edge cases an attacker can exploit. The verification layer is a target precisely because it is where bridge security concentrates. Making it harder to compromise a single verifier is a meaningful improvement; making the bridge's security independent of all external verifiers would require a fundamentally different architecture — one that uses cryptographic proofs generated by the source blockchain itself to verify state transitions, without requiring trusted intermediaries at all.

5. The Spectrum of Bridge Security Approaches

The bridge security landscape spans a wide spectrum of trust assumptions, each with different tradeoffs between security, speed, cost, and generality. At the most trust-dependent end are the externally validated bridges that LayerZero and similar systems represent: they are fast and flexible but depend on the security of their validator networks. In the middle are optimistic bridges, which assume messages are valid unless challenged within a fraud-proof window — introducing a time delay but reducing reliance on real-time validator honesty. At the most trust-minimized end are zero-knowledge proof-based bridges, which generate cryptographic proofs of source chain state that can be verified on the destination chain without requiring any trusted intermediary at all. ZK bridges are computationally expensive and technically complex, but they remove the external verification dependency that makes optimistic and externally validated bridges vulnerable.

The Kelp exploit, and the broader history of bridge hacks, is a strong argument for the industry's continued movement toward ZK-based cross-chain verification. The technology is maturing rapidly, but production-grade ZK bridges that can handle the transaction volumes and asset diversity of today's DeFi ecosystem remain a work in progress.

6. Composability as a Risk Amplifier

The Kelp DAO exploit also illustrates a risk that is specific to the highly composable nature of modern DeFi — the characteristic by which one protocol's token becomes another protocol's collateral, enabling sophisticated financial structures but also creating pathways for localized failures to propagate systemwide. When the attacker received 116,500 rsETH from the compromised bridge, the rational next step was not to sell it on the open market, where large sell pressure would have depressed the price and attracted attention. Instead, they deposited it as collateral on Aave and borrowed real assets against it — extracting genuine value from the ecosystem while leaving the worthless collateral behind. The result was not a contained loss at the bridge layer but a cascade that drained $6.6 billion in total value from Aave, created between $123 million and $230 million in bad debt, triggered emergency freezes across dozens of protocols, and sent the DeFi sector's total value locked from $99 billion to $86 billion in 48 hours.

The composability that makes DeFi productive — the ability to use the same asset as collateral, liquidity, and trading instrument simultaneously across multiple protocols — is also what transforms a bridge exploit into a sector-wide contagion event. Each additional integration layer multiplies both the potential utility and the potential damage surface.

7. What Comes Next: Minimum Standards and Architectural Rethinking

The industry's response to the Kelp exploit has already produced some near-term changes. LayerZero announced it would no longer sign messages for any application running a 1-of-1 verifier configuration, forcing a protocol-wide migration toward multi-verifier setups. Protocols across the DeFi ecosystem reviewed their cross-chain messaging configurations. The broader conversation about minimum security standards for bridge deployments — which LayerZero and Kelp's dispute about default configurations made unavoidably public — is likely to accelerate the development of clearer industry norms around what constitutes an acceptable verification architecture for assets at significant scale.

But the deeper reckoning — moving from configuration-level improvements toward architecturally trust-minimized bridge designs — will take longer and require investment that many protocols have been reluctant to make given the cost and complexity involved. As Ledger CTO Charles Guillemet put it, 2026 is tracking toward being the worst year for crypto hacks on record, and the primary reason is not that security awareness has declined but that the attack surface has grown faster than the security architecture has matured. Bridges are where the gap between DeFi's ambition and its security foundations is most expensive.

Related Articles

NEWSLETTERS

Don't miss another story.

Subscribe to the MINRK Newsletter today.

By signing up, you will receive emails about MINRK products and you agree to our terms of use and privacy policy.

Crypto Daybook Americas

Market analysis for crypto traders and investors.

EVERY WEEKDAY

Crypto for Advisors

Defining crypto, digital assets and the future of finance for financial advisors.

EVERY THURSDAY

The Protocol

Exploring the tech behind crypto one block at a time.

WEEKLY

Crypto Long & Short

A must read for institutions. Insights, news and analysis delivered weekly.

EVERY WEDNESDAY

CoinDesk Headlines

The biggest crypto news and ideas of the day.

EVERY WEEKDAY

State of Crypto

Examining the intersection of cryptocurrency and government.

WEEKLY

Research Reports

Join thousands of readers who rely on MINRK for data-driven insights on the latest digital asset trends.

MONTHLY