Kelp DAO claims LayerZero’s 'default' settings are what actually caused the massive $290 million disaster
The liquid restaking protocol said the compromised verifier was LayerZero's own infrastructure, and the setup it was faulted for running was LayerZero's onboarding default.
By Francisco Rodrigues, Shaurya Malwa|Edited by Aoyon AshrafUpdated Apr 20, 2026, 2:49 p.m. Published Apr 20, 2026, 2:41 p.m. Make preferred on
What to know:
- Kelp DAO is disputing LayerZero's account of a $290 million rsETH bridge exploit, claiming that the compromised single-verifier setup relied on LayerZero’s own infrastructure and defaults rather than an outlier configuration it chose against advice.
- Some security researchers say LayerZero’s public documentation and deployment code promote single-source verification across major chains, undercutting the firm’s claim that Kelp ignored guidance to adopt multi-verifier redundancy.
- Kelp claims the attack was limited to the LayerZero-powered bridge and not its core restaking contracts, while LayerZero has responded by vowing to stop signing messages for any application using a single-verifier setup, forcing a broad migration.
The popular Spiderman meme showing three identical superheroes pointing fingers at each other is having its crypto moment today.
Kelp DAO is set to push back on LayerZero's post-mortem of Sunday’s $290 million exploit, which essentially blames Kelp, a L2 source familiar with the matter told CoinDesk. Kelp plans to dispute the cross-chain messaging firm's claim that it ignored repeated warnings to move away from a single-verifier setup. CoinDesk has reviewed and verified the memo Kelp plans to publish.
Kelp is a liquid restaking protocol that takes user-deposited ether, routes it through a yield-generating system called EigenLayer, and issues a receipt token, rsETH, in exchange.
LayerZero is the cross-chain messaging infrastructure that moves rsETH between blockchains, using entities called DVNs (decentralized verifier networks) to verify whether a cross-chain transfer is valid.
On Saturday, attackers drained 116,500 rsETH, worth about $290 million, from Kelp's LayerZero-powered bridge by poisoning the servers that LayerZero's verifier relied on to check transactions.
Kelp, the source said, is planning on saying the DVN that was compromised via what it calls a "sophisticated state-sponsored attack” was LayerZero's own infrastructure, not a third-party verifier.
Attackers compromised two of LayerZero's own servers that check whether cross-chain transactions are legitimate, then flooded the backup servers with junk traffic to force LayerZero's verifier onto the compromised ones.
All of that infrastructure was built and run by LayerZero, not Kelp, the source claimed.
The source contested LayerZero's framing of the "1/1 configuration" as a fringe choice made against guidance. LayerZero's post-mortem said KelpDAO chose a 1-of-1 DVN setup despite expressing recommendations to configure multi-DVN redundancy.
A "1/1 configuration" means only a single validator must sign off on a cross-chain message for the bridge to act on it, leaving the system with no second check to catch a compromised or forged instruction. A multi-validator configuration (such as 2/3, 3/5, etc.) ensures there is no single point of failure that can approve a forged message on its own.
They added that, through a direct communications channel with LayerZero, which has been open since July 2024, they produced no specific recommendation for Kelp to change the rsETH DVN configuration.
LayerZero's own quickstart guide and default GitHub configuration point to a 1/1 DVN setup, the source told CoinDesk, adding 40% of protocols on LayerZero are currently using the same configuration.
The configuration Kelp ran also appears in LayerZero's own V2 OApp Quickstart, where the sample layerzero.config.ts wires every pathway with one required DVN and no optional DVNs. That’s the same 1/1 structure.
Kelp's core restaking contracts were not touched, and the exploit was isolated to the bridge layer, they added. Its emergency pause, 46 minutes after the drain, blocked two follow-up attempts that would have released an additional ~$200 million in rsETH.
CoinDesk reached out to LayerZero for comment on the story and didn't hear back by the time of publication.
'Deflecting responsibility'
Security researchers are also not buying LayerZero's isolated framing, which pinned the blame on Kelp.
Kelp is a liquid restaking protocol. Its core competency is staking infrastructure, EigenLayer integration, and liquid staking token management. When integrating with LayerZero, Kelp relied on LayerZero's documentation, their defaults, and their team's guidance to make configuration decisions, the source claimed.
Yearn Finance core team developer Artem K, who is popularly known as @banteg on X, posted a technical review of LayerZero's public deployment code and said that the reference setup ships with single-source verification defaults across every major chain, including Ethereum, BSC, Polygon, Arbitrum and Optimism.
That deployment also leaves a public endpoint exposed that leaks the list of configured servers to anyone who queries it.
Banteg flagged in his analysis that he can't prove which configuration Kelp used, but noted that LayerZero usually asks new operators to use its default setup, which its post-mortem criticized.
Chainlink community manager Zach Rynes put it bluntly on X, alleging that LayerZero was "deflecting responsibility" for its own compromised infrastructure and accused the company of throwing Kelp under the bus for trusting a setup LayerZero itself supported.
As such, LayerZero has said it will no longer sign messages for any application running a single-verifier setup, forcing a protocol-wide migration.
Read more: 'DeFi is dead': crypto community scrambles after this year's biggest hack exposes contagion risk
ExclusiveHackMore For You
LayerZero blames Kelp's setup for $290 million exploit, attributes it to North Korea's Lazarus
By Shaurya Malwa9 hours ago
LayerZero said the attackers compromised two RPC nodes the company's verifier relied on and DDoS'd the rest, with the attack working only because Kelp had ignored multi-verifier recommendations.
What to know:
- LayerZero blamed the $290 million Kelp DAO exploit on Kelp's decision to use a single-verifier configuration, despite prior warnings to adopt a multi-verifier setup.
- Attackers, whom LayerZero preliminarily linked to North Korea's Lazarus Group, compromised two RPC nodes and used a DDoS attack to force failover, tricking LayerZero's verifier into...

Global stablecoin rulemaking slows, prompting BIS to urge cooperation to avoid fragmentation risks
30 minutes ago
Tether backs UAE tokenization firm KAIO in $8M funding round to bring Emirati funds onchain
42 minutes ago
Coinbase, Bybit said to be working together on tokenization, custody and distribution of U.S. stocks
1 hour ago
CoinDesk 20 performance update: AAVE price plummets 22.9% over weekend
1 hour ago
Bitmine buys 101,627 ether worth over $230 million, its largest weekly haul of 2026
2 hours ago
Strategy buys 34,164 bitcoin for $2.54 billion, third-largest purchase on record
2 hours agoTop Stories
Here's how bitcoin's $7.9 billion April options expiry impact prices
5 hours ago
LayerZero blames Kelp's setup for $290 million exploit, attributes it to North Korea's Lazarus
9 hours ago
'DeFi is dead': crypto community scrambles after this year's biggest hack exposes contagion risk
21 hours ago
A $300 million borrowing spike on Aave signals liquidity crunch after KelpDAO exploit
5 hours ago
Previewing Consensus' Policy Summit: State of Crypto
20 hours ago