Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
.@solana DeFi just got stress tested in the worst way, and now everyone’s looking at STRIDE + SIRN like it’s the fix.
I don’t think it’s that simple.
@DriftProtocol hack wasn’t a smart contract failure. It was 6 months of social engineering. 2 legit signers took 12 minutes to pull $285M out, and the rest was history.
Before the hack, Solana already had monitoring tools everywhere (Hypernative, Range, Riverguard, audits on audits), but none of them fired because everything was technically valid.
Now after the hack, @SolanaFndn drops STRIDE + SIRN. Let’s actually break down what this is and what it isn’t.
STRIDE = Solana Trust, Resilience and Infrastructure for DeFi Enterprises. Led by Asymmetric Research (the firm behind $5B in prevented losses and $300M+ recovered). Three tiers:
– anyone gets evaluated
– $10M+ gets 24/7 monitoring
– $100M+ gets full formal verification
8 pillars covering everything from contracts → governance → infra → opsec → monitoring, all foundation funded.
SIRN = the incident response side. 5 founding firms (Asymmetric, OtterSec, Neodyme, Squads, ZeroShadow) designed to respond in minutes, not hours.
But in reality, STRIDE would not have stopped the Drift hack. SIRN would not have stopped the Drift hack.
STRIDE’s governance pillar would’ve flagged Drift’s zero-timelock 2-of-5 multisig as a critical vulnerability.
The attack didn’t exploit a code vulnerability. It exploited humans. No 24/7 on-chain monitoring flags pre-signed valid transactions sitting dormant. The transactions looked indistinguishable from legitimate admin actions until the funds moved.
SIRN’s value would’ve been in response speed. If SIRN had compressed that to minutes via pre-established relationships, maybe $70M of that is recoverable, but not $285M either.
The real attack surface is durable nonce txs.
Solana needs to rethink whether pre-authorized dormant transactions should be monitorable at the network level or require additional safeguards at the protocol level.
Post-hack, $SOL DeFi TVL dropped ~15% to $5.3B. Drift itself is cut in half to ~$240M. I think there are some cases for Solana liquidity over the next 3–6 months:
1/ If STRIDE takes longer than expected to publish first evaluations, institutional capital stays cautious. No more major exploits but lingering sentiment overhang → TVL stabilizes at $5–5.5B.
2/ STRIDE publishes credible Q2 evaluations, SIRN demonstrates real incident response, some form of white knight for Drift, and $SOL reclaims $100+ → TVL grows to $7–8B.
3/ Another major human-vector or AI-amplified exploit before STRIDE builds any track record. Institutional rotation to other chains → nightmare scenario for TVL.
Right now the attack surface is expanding faster than the defense.
– AI agents already executing exploits
– durable nonces breaking time assumptions
– state actors running multi-month ops
STRIDE and SIRN are real upgrades, probably the most serious security push any chain has done.
But the problem #Solana is really stuck in is trust.
STRIDE fixes the code problem really well. The trust problem is harder.