DeFi Security Incidents 2026: Cross-Protocol Risks Triggered by Kelp DAO Vulnerability and Aave Credit Exposure Analysis

On April 18, 2026, at 17:35 UTC, a seemingly ordinary cross-chain transaction triggered the most consequential security incident in DeFi history. Kelp DAO’s rsETH cross-chain bridge was attacked due to a configuration vulnerability, allowing the attacker to mint 116.5k rsETH out of thin air, worth approximately $293 million, accounting for about 18% of the token’s total circulating supply. This event not only set a new record for single-incident losses in DeFi in 2026 but also sparked a systemic crisis through the composability between DeFi protocols: Aave’s TVL evaporated by $8.45 billion in two days, and the total DeFi TVL across all chains shrank by $13.21 billion.

However, the Kelp DAO incident was not an isolated case. In the first four months of 2026, multiple security incidents occurred in the DeFi space, with total losses reaching hundreds of millions of dollars. From governance hijacking to bridge exploits, from oracle manipulation to smart contract reentrancy, attack vectors are becoming increasingly complex, and the deep coupling between protocols amplifies the destructive power of single points of failure.

The Kelp DAO Bridge Vulnerability Incident: Timeline

On April 18, 2026, at 17:35 UTC, the attacker exploited a configuration flaw in Kelp DAO’s LayerZero cross-chain bridge, forging a cross-chain message that resulted in the minting of 116.5k rsETH without real ETH backing on the Ethereum mainnet. About 46 minutes after the attack, Kelp DAO used an emergency multisig to pause rsETH contract functions on the mainnet and multiple Layer 2 chains. During this period, the attacker attempted two follow-up minting attempts of 40k rsETH each, both reverted due to contract freezes.

After the attack succeeded, the attacker did not choose to sell the minted rsETH on secondary markets. Instead, most of it was deposited into Aave V3 and V4 as collateral, borrowing real WETH and ETH. On-chain data shows the attacker collateralized and sold approximately 106.5k ETH, worth about $250 million.

This operation exposed Aave to a bad debt risk estimated between $177 million and $236 million. Aave promptly froze the rsETH markets on Ethereum mainnet and Layer 2s like Arbitrum, Optimism, and Base, and set the Loan-to-Value ratio of rsETH to zero. Protocols like Compound and Euler also followed suit, suspending or restricting related assets.

From Vulnerability to Chain Reaction

Time (UTC) Event Nature
April 18, 17:35 Attacker calls LayerZero EndpointV2’s lzReceive function with forged cross-chain data, minting 116.5k rsETH Attack execution
April 18, 17:35-18:21 Attacker deposits rsETH into Aave V3/V4 as collateral, borrowing large amounts of WETH Fund transformation
April 18, 18:21 Kelp DAO’s emergency multisig detects suspicious activity, pauses rsETH contracts on mainnet and multiple chains Emergency response
April 18, 18:26, 18:28 Attacker attempts to re-mint 40k rsETH twice, both reverted Attack blocked
April 18, 20:10 Kelp DAO posts first public statement on X, confirming suspicious cross-chain activity Official announcement
Late April 18 to 19 Aave freezes rsETH collateral market; Compound, Euler follow Industry joint defense
April 19-20 Aave’s TVL drops from $116.5k to $116.5k, evaporating $8.45 billion in two days; total chain DeFi TVL shrinks from $40k to $106.5k Capital flight

Community responses to Kelp DAO’s reaction speed vary. Some members consider the 46-minute response time relatively fast for cross-chain bridge incidents; others point out that from 17:35 to 20:10, nearly three hours passed, creating a vacuum of information that fueled market panic. Additionally, Kelp DAO’s 1/1 DVN configuration decision sparked discussions within the community about the sufficiency of security audits.

Data and Structural Analysis: Quantifying the Chain Reaction

2026 DeFi Security Overview

Attack Frequency and Losses

In the first 18 days of April 2026, crypto protocols suffered over $606 million in total losses from hacking, making it the most damaging month since February 2025. Notably, Drift Protocol lost about $285 million on April 1 due to governance hijacking, and Kelp DAO’s loss was approximately $293 million—these two account for the majority of the month’s total losses. The consecutive high-value attacks reflect a new phase of security testing for DeFi.

Evolution of Attack Patterns

Security researchers observe two main new features in 2026 attack methods: first, an increased proportion of exploits targeting cross-chain bridge and derivative asset configuration vulnerabilities, with attackers penetrating protocol configuration and governance layers beyond just smart contract code; second, attackers are becoming more adept at leveraging DeFi’s composability to amplify attack effects, turning single-point vulnerabilities into systemic shocks. In the Kelp DAO case, instead of selling minted assets directly, the attacker used them as collateral to extract real assets, exemplifying this trend.

Quantitative Impact on Aave

TVL and Token Price Changes

Based on Gate data and on-chain monitoring, as of April 20, 2026, Aave’s impact is as follows:

  • TVL Decline: From about $116.5k before the attack on April 18 to $40k, a total reduction of $8.45 billion over two days.
  • Net Outflow: Approximately $6.2 billion outflow, about 23% decrease.
  • Bad Debt: Estimated between $177 million and $236 million, mainly from rsETH/WETH borrowing on Ethereum mainnet.
  • Utilization Rates: WETH lending market utilization hit 100%; USDT and USDC pools also fully utilized, with over $5.1 billion in stablecoins locked in new liquidity or borrower repayments.
  • Whale Withdrawals: Abraxas Capital withdrew about $392 million; MEXC withdrew about $431 million; a large whale linked to Nonco withdrew approximately $405.7 million.

Industry Assessment of Aave’s Contract Security

It is noteworthy that the core Aave smart contracts were not compromised. The attacker exploited the bridge vulnerability in Kelp DAO to mint “air collateral,” borrowing real assets within Aave through protocol composability. Aave founder Stani clarified in an AMA that this was an “upstream pollution” event, not a protocol bug. This view is widely accepted among industry security researchers.

Possible Paths to Cover Bad Debt

Two main hypotheses exist on how Aave might cover the bad debt: first, gradually offsetting it through protocol reserves and approximately $12 million monthly income; second, if the gap exceeds reserves, using staked AAVE tokens in the security module, effectively passing the cost of the Kelp DAO vulnerability to the most loyal stakers. As of April 20, Aave has not announced a final plan.

rsETH Price and De-pegging Analysis

Changes in rsETH Circulation

The attack minted 116.5k rsETH (about 18% of circulating supply) out of thin air, with no real ETH backing. rsETH across more than 20 chains faces uncertainty regarding backing, pending reconciliation of reserves and circulating supply by Kelp DAO.

Questions on rsETH Pricing Mechanism

Industry analysts note that rsETH, as a Liquid Restaking Token (LRT), derives its value heavily from the integrity of the underlying ETH reserves. If the reserve and circulating supply diverge, the asset’s peg could be fundamentally destabilized. Kelp DAO’s 1/1 DVN configuration effectively concentrates cross-chain verification security responsibility on a single node, sacrificing redundancy for efficiency, exposing systemic vulnerabilities of LRT assets in cross-chain scenarios.

SparkLend’s Cautious Strategy Validation

Spark Protocol’s Proactive Risk Management

Monetsupply.eth, head of Spark Protocol’s strategy, disclosed that as early as January 2026, Spark proactively delisted low-usage assets including rsETH, tightening collateral scope and functionality. This cautious risk control was initially met with community dissatisfaction but proved prudent during the Kelp DAO incident.

Liquidity Comparison

Despite ETH liquidity tightening due to rsETH risk exposure on Aave, SparkLend maintained sufficient ETH withdrawal liquidity. It also adopted a higher upper limit on ETH borrowing rates, sacrificing some market share to Aave but building a healthier balance sheet during the crisis.

Significance of Asset Screening

Spark’s early delisting of rsETH highlights an important principle: in DeFi lending, collateral quality screening is more critical than expanding collateral types to chase TVL. During extreme events, broad collateral acceptance can become a vulnerability entry point, while prudent asset selection is the first line of defense for protocol security.

Potential Reconfiguration of Lending Protocol Competition

Post-incident, the competitive logic among DeFi lending protocols may shift. Previously growth-oriented strategies focused on maximizing TVL will be re-evaluated by communities and investors, with asset quality and risk isolation becoming core metrics for security assessment. Spark’s strategy, gaining market recognition after the crisis, may prompt other protocols to recalibrate collateral policies.

Dialogue Among Community, Developers, and Security Researchers

Community Sentiment: From Panic to Reflection

Panic Withdrawals and Data Discussions

Within hours of the incident, discussions on platforms like X (Twitter) in both Chinese and English exceeded hundreds of millions of views. Initial community reactions centered on panic withdrawals and asset safety concerns. 0xngmi, founder of DeFiLlama, pointed out that even protocols on Solana unaffected by the incident experienced capital outflows. He added that the entire DeFi TVL evaporated nearly $100 billion, emphasizing that in such events, there are no winners—only a shrinking “cake” that harms everyone.

Community Divergence on Aave’s Risk Management

After Aave froze rsETH markets, community opinions split on its risk management capabilities. Supporters argue that Aave’s quick response effectively contained further bad debt expansion, demonstrating resilience of decentralized lending protocols; critics suggest that Aave’s prior acceptance of rsETH as collateral may have lacked sufficient risk assessment, especially considering Spark had delisted rsETH in January.

Developer and Protocol Responses

Public Statements from Protocols

  • Kelp DAO: Official X account confirmed “suspicious activity in rsETH cross-chain,” and announced an investigation involving LayerZero, auditors, and security experts.
  • LayerZero: Official X post acknowledged “awareness of the incident, investigation underway.”
  • Aave: Official statement affirmed that rsETH on Ethereum mainnet is “fully supported,” but remains cautious and has kept the market frozen, emphasizing that exposure is within controllable limits.

Industry Disputes on Responsibility

Security researchers generally agree that Kelp DAO’s 1/1 DVN bridge configuration was the root cause. However, responsibility attribution is debated: some believe Kelp DAO, as the protocol developer, bears primary responsibility; others argue LayerZero, as the cross-chain infrastructure provider, also bears fault in configuration guidance and best practices.

Security Researcher Perspective

Technical Vulnerability Characterization

Multiple security analysts on X have provided in-depth analyses indicating that the core vulnerability lies in Kelp DAO’s configuration of LayerZero’s Omnichain Application (OApp): using a 1/1 DVN mode, relying on a single verification node, enabling attackers to forge cross-chain verification messages. Through carefully crafted payloads, attackers triggered minting of rsETH on target chains without real cross-chain assets, effectively creating nearly $300 million worth of synthetic assets out of thin air.

Historical Analogy and Lessons

Researchers compare this attack to the 2022 Nomad bridge incident: both involved configuration flaws in cross-chain verification mechanisms, with attackers exploiting message validation loopholes. Post-Nomad, industry vigilance increased, but as new bridge designs and complex assets like LRT emerged, new attack surfaces appeared. The Kelp DAO event underscores that cross-chain bridge security remains unresolved, and asset complexity only deepens systemic vulnerabilities.

Industry Impact Analysis: From Single-Point Vulnerabilities to Systemic Risk Propagation

Trust Shock in the LRT Sector

Value Anchoring of LRT Assets Under Scrutiny

rsETH, as a representative LRT asset, faces a fundamental test. Its value heavily depends on the integrity of the underlying ETH reserves. The bridge security flaw allows creation of “anchorless” tokens without touching the underlying reserves, undermining the peg and trust in LRT assets. This incident challenges the foundational assumptions of the LRT sector.

Potential for Stricter Transparency and Audits

Post-event, stricter standards for reserve transparency and audits in LRT protocols are likely. Kelp DAO will need to publish reserve reconciliation results to demonstrate rsETH’s backing, potentially setting a new benchmark for security standards in the LRT space.

Re-evaluation of Risk Isolation in Lending Protocols

Morpho’s Isolated Market Architecture Shows Advantages

In this incident, Morphos’s isolated markets limited rsETH’s risk exposure to roughly $1 million, distributed across two independent markets, avoiding systemic impact. In contrast, Aave’s unified lending pool design allowed contamination from a single collateral to propagate across the entire protocol.

Protocol Architecture as a Key Security Factor

The performance difference between Morpho and Aave highlights a crucial insight: in DeFi security, architectural risk isolation is more fundamental than post-hoc risk controls. While isolated markets may sacrifice some capital efficiency, they provide a firewall effect during extreme events.

Cross-Chain Bridge Security: Old Problem, New Variants

Risks in LayerZero Configuration Parameters

The core technical issue in the Kelp DAO incident stems from the 1/1 DVN bridge configuration. This setup introduces a single point of failure in cross-chain asset verification, where an attacker only needs to compromise one verification node to forge messages. LayerZero’s flexible configuration, while powerful, increases the risk of misconfiguration.

Industry Adoption of Best Practices for Cross-Chain Bridges

Post-incident, the industry is likely to accelerate the adoption of best practices: multi-DVN verification, time locks, transaction limits, and other security measures. Protocols like Curve Finance have already paused LayerZero infrastructure for security assessments, setting a precedent for wider adoption.

Multi-Scenario Evolution: Future Paths for DeFi Security

Baseline Path: Gradual Recovery, System Resilience

In this scenario, Aave gradually absorbs bad debt via reserves and income; Kelp DAO completes reserve reconciliation and publishes rsETH backing; the industry recovers after short-term pain. Key variables include: whether Aave can cover bad debt without slashing security modules; whether Kelp DAO’s reconciliation can restore rsETH’s perceived value; whether other LRT protocols can rebuild trust through transparency.

Stress Path: ETH Price Drop Triggers Secondary Liquidations

Monetsupply.eth warns that ETH, as the core collateral, faces liquidation risk if market utilization hits 100%. If ETH prices fall by 15-20%, significant additional bad debt could accrue, forcing the security module (stkAAVE) to be heavily utilized for the first time, directly impacting token holders. This could trigger a vicious cycle of liquidity drying up, failed liquidations, and expanding bad debt, affecting other ETH-collateralized DeFi protocols.

Rebuilding Path: Systematic Upgrade of DeFi Security Architecture

This incident may catalyze a comprehensive upgrade in DeFi security architecture, including: establishing industry standards for cross-chain bridge configuration (multi-DVN, time locks, transaction caps); normalizing reserve proof mechanisms for LRT protocols (daily or real-time reconciliation); tightening collateral eligibility criteria; exploring isolated markets in major lending protocols. Achieving these will require balancing security and efficiency, but the Kelp DAO event demonstrates that sacrificing security redundancy for efficiency can be prohibitively costly.

Conclusion

The $293 million Kelp DAO vulnerability event is more than a major hack; it is a real-world stress test of DeFi systemic risk. By exploiting a bridge configuration flaw, the attacker triggered a multi-layer contagion—from LRT assets to leading lending protocols and the entire DeFi ecosystem—ultimately causing $8.45 billion TVL evaporation in two days and over $13.2 billion in total chain-wide DeFi capital shrinkage.

In this storm, protocols’ fates diverged sharply: Aave faced immense pressure due to broad collateral acceptance; Morpho contained risk within a segmented market; SparkLend avoided major losses by delisting low-usage assets like rsETH early. These outcomes underscore a core principle: in DeFi, security is not just a set of technical measures but a philosophical choice in system architecture.

As of April 20, 2026, Kelp DAO has yet to publish reserve reconciliation; Aave’s bad debt resolution remains under discussion; rsETH’s true value awaits reassessment. These unresolved issues will continue to test DeFi’s resilience and governance. What is certain is that the 2026 security crisis will leave a profound mark on DeFi history—prompting the industry to rethink “efficiency-first” growth and seek a new balance between security and expansion.

AAVE-0.59%
ETH0.84%
ZRO2.19%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin