0x_oasis

10 posts

0x_oasis banner
0x_oasis

0x_oasis

@0xoasis

chain dev

Katılım Ekim 2025
31 Takip Edilen2 Takipçiler
0x_oasis retweetledi
Arbitrum
Arbitrum@arbitrum·
The Arbitrum Security Council has taken emergency action to freeze the 30,766 ETH being held in the address on Arbitrum One that is connected to the KelpDAO exploit. The Security Council acted with input from law enforcement as to the exploiter’s identity, and, at all times, weighed its commitment to the security and integrity of the Arbitrum community without impacting any Arbitrum users or applications. After significant technical diligence and deliberation, the Security Council identified and executed a technical approach to move funds to safety without affecting any other chain state or Arbitrum users. As of April 20 11:26pm ET the funds have been successfully transferred to an intermediary frozen wallet. They are no longer accessible to the address that originally held the funds, and can only be moved by further action by Arbitrum governance, which will be coordinated with relevant parties.
English
1.8K
1.1K
7.2K
5.3M
0x_oasis retweetledi
Dune | We Are Hiring!
Following the KelpDAO hack, we built an open analysis of DVN security configurations across every active OApp on LayerZero over the last 90 days. Of ~2,665 unique OApp contracts: 47% run a 1-of-1 DVN security floor, 45% run 2-of-2, and ~5% run 3-of-3 or higher. As we know, KelpDAO's rsETH sat in the first bucket. Open query, public methodology, feedback welcome: dune.com/dune/layerzero…
English
76
207
980
377.6K
0x_oasis retweetledi
Nick Almond
Nick Almond@DrNickA·
So.. LayerZero blames the project in totality for using a quorum of 1 on their DVN. Their defaults in their code are for a quorum of 1. Loads of projects use a quorum of 1 in prod and not only do they know about it, they run it for them. And.. it’s them that got hacked.
banteg@banteg

went through layerzero gasolina aws deployment repo + extracted app source. tl;dr concerning the reference deployment is public by design. and the sample providers.json ships with rpc quorum: 1 on every mainnet chain. 1. the recommended cdk stack puts a public api gateway in front of a private alb in front of fargate in private subnets. publicLoadBalancer: false, taskSubnets: PRIVATE_WITH_NAT, and an HttpApi with HttpAlbIntegration. the readme literally tells operators to send the resulting ApiGatewayUrl to layerzero labs. 2. no authorizer, no iam auth mode, no ip allowlist, no waf, no route-level policy anywhere in the repo. the app itself (bootstrap.ts) registers /provider-health, which leaks configured rpcs. server.listen(port) without host arg binds to public ip. 3. cdk/gasolina/config/providers/mainnet/providers.json sets quorum: 1 for ethereum, bsc, polygon, arbitrum, optimism, fantom, and the rest. multiple rpc urls are configured as failover, not consensus. the multiprovider code only enforces quorum when quorum > 1 and explicitly bypasses the wrapper when it's 1. rpcs are mostly public endpoints (llamarpc, publicnode, ankr). 4. provider config lives in an s3 bucket that the cdk stack creates, uploads to, and passes via env vars (PROVIDER_CONFIG_TYPE, CONFIG_BUCKET_NAME). so the trust boundary is the app + the mutable config plane + the upstream rpc tier + whatever's in front of api gateway. 5. operators are told to validate by curling the public url for /available-chains, /signer-info?chainName=ethereum, /provider-health (again, leaks rpc). external reachability is an encouraged documented requirement. caveats: this is the public repo and extracted non-public source. it doesn't prove the config they had for kelp bridge. but the public info and the defaults the operators are pointed at look concerning. read more here: gist.github.com/banteg/2fde29d…

English
9
15
218
17.5K
0x_oasis retweetledi
Aave
Aave@aave·
The rsETH markets on Aave V3 and Aave V4 have been frozen. Aave's contracts have not been exploited and this is an exploit related to rsETH. The freeze follows an exploit of the Kelp DAO rsETH bridge. Freezing the rsETH markets prevents new deposits and borrowing against rsETH collateral while the situation is assessed. We are reviewing information about rsETH borrows on Aave that occurred after the exploit and will share more details as soon as possible. If the protocol accumulates bad debt from this incident, we'll explore paths to offset the deficit.
English
278
482
2.3K
889.3K
0x_oasis
0x_oasis@0xoasis·
⚠️ Warning to every OApp If LayerZero's official DVN is your ONLY required DVN — add an independent DVN NOW: etherscan.io/address/0x589d… • setConfig to add DVN(s) • Audit inboundNonce for jumps • skip()/nilify() pending nonces Single DVN = single point of failure. #LayerZero #DVN
English
0
0
0
46
0x_oasis
0x_oasis@0xoasis·
🚨 @KelpDAO rsETH drained ~$293.72M via single-DVN forgery (2026-04-18) Ethereum accepted a message never sent from Unichain: • Unichain outboundNonce = 307 • Ethereum inboundNonce = 309 Nonce 308 → 116,500 rsETH drained. Nonce 309 committed, pending. ⚠️
English
5
0
0
55
0x_oasis
0x_oasis@0xoasis·
⚠️ Pending nonce 309 — second payload still in queue inboundPayloadHash: 0xbf86af6f10782715c263b7c76c86e7a965b29f2a0119806ea4eb108d197e0c7e @KelpDAO must immediately endpoint.skip() or nilify() to clear it before the attacker calls lzReceive again.
English
0
0
0
37
0x_oasis
0x_oasis@0xoasis·
🔑 Root cause: single DVN, zero redundancy @KelpDAO rsETH receiver on Ethereum: 0x85d456b2dff1fd8245387c0bfb64dfb700e98ef3 etherscan.io/address/0x85d4… ULN config (srcEid = Unichain): requiredDVNCount = 1 optionalDVNCount = 0 confirmations = 42 (latency, not security)
English
0
0
0
33