Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
DeFi Security Incidents 2026: Cross-Protocol Risks Triggered by Kelp DAO Vulnerability and Aave Credit Exposure Analysis
On April 18, 2026, at 17:35 UTC, a seemingly ordinary cross-chain transaction triggered the most consequential security incident in DeFi history. Kelp DAO’s rsETH cross-chain bridge was attacked due to a configuration vulnerability, allowing the attacker to mint 116.5k rsETH out of thin air, worth approximately $293 million, accounting for about 18% of the token’s total circulating supply. This event not only set a new record for single-incident losses in DeFi in 2026 but also sparked a systemic crisis through the composability between DeFi protocols: Aave’s TVL evaporated by $8.45 billion in two days, and the total DeFi TVL across all chains shrank by $13.21 billion.
However, the Kelp DAO incident was not an isolated case. In the first four months of 2026, multiple security incidents occurred in the DeFi space, with total losses reaching hundreds of millions of dollars. From governance hijacking to bridge exploits, from oracle manipulation to smart contract reentrancy, attack vectors are becoming increasingly complex, and the deep coupling between protocols amplifies the destructive power of single points of failure.
The Kelp DAO Bridge Vulnerability Incident: Timeline
On April 18, 2026, at 17:35 UTC, the attacker exploited a configuration flaw in Kelp DAO’s LayerZero cross-chain bridge, forging a cross-chain message that resulted in the minting of 116.5k rsETH without real ETH backing on the Ethereum mainnet. About 46 minutes after the attack, Kelp DAO used an emergency multisig to pause rsETH contract functions on the mainnet and multiple Layer 2 chains. During this period, the attacker attempted two follow-up minting attempts of 40k rsETH each, both reverted due to contract freezes.
After the attack succeeded, the attacker did not choose to sell the minted rsETH on secondary markets. Instead, most of it was deposited into Aave V3 and V4 as collateral, borrowing real WETH and ETH. On-chain data shows the attacker collateralized and sold approximately 106.5k ETH, worth about $250 million.
This operation exposed Aave to a bad debt risk estimated between $177 million and $236 million. Aave promptly froze the rsETH markets on Ethereum mainnet and Layer 2s like Arbitrum, Optimism, and Base, and set the Loan-to-Value ratio of rsETH to zero. Protocols like Compound and Euler also followed suit, suspending or restricting related assets.
From Vulnerability to Chain Reaction
Community responses to Kelp DAO’s reaction speed vary. Some members consider the 46-minute response time relatively fast for cross-chain bridge incidents; others point out that from 17:35 to 20:10, nearly three hours passed, creating a vacuum of information that fueled market panic. Additionally, Kelp DAO’s 1/1 DVN configuration decision sparked discussions within the community about the sufficiency of security audits.
Data and Structural Analysis: Quantifying the Chain Reaction
2026 DeFi Security Overview
Attack Frequency and Losses
In the first 18 days of April 2026, crypto protocols suffered over $606 million in total losses from hacking, making it the most damaging month since February 2025. Notably, Drift Protocol lost about $285 million on April 1 due to governance hijacking, and Kelp DAO’s loss was approximately $293 million—these two account for the majority of the month’s total losses. The consecutive high-value attacks reflect a new phase of security testing for DeFi.
Evolution of Attack Patterns
Security researchers observe two main new features in 2026 attack methods: first, an increased proportion of exploits targeting cross-chain bridge and derivative asset configuration vulnerabilities, with attackers penetrating protocol configuration and governance layers beyond just smart contract code; second, attackers are becoming more adept at leveraging DeFi’s composability to amplify attack effects, turning single-point vulnerabilities into systemic shocks. In the Kelp DAO case, instead of selling minted assets directly, the attacker used them as collateral to extract real assets, exemplifying this trend.
Quantitative Impact on Aave
TVL and Token Price Changes
Based on Gate data and on-chain monitoring, as of April 20, 2026, Aave’s impact is as follows:
Industry Assessment of Aave’s Contract Security
It is noteworthy that the core Aave smart contracts were not compromised. The attacker exploited the bridge vulnerability in Kelp DAO to mint “air collateral,” borrowing real assets within Aave through protocol composability. Aave founder Stani clarified in an AMA that this was an “upstream pollution” event, not a protocol bug. This view is widely accepted among industry security researchers.
Possible Paths to Cover Bad Debt
Two main hypotheses exist on how Aave might cover the bad debt: first, gradually offsetting it through protocol reserves and approximately $12 million monthly income; second, if the gap exceeds reserves, using staked AAVE tokens in the security module, effectively passing the cost of the Kelp DAO vulnerability to the most loyal stakers. As of April 20, Aave has not announced a final plan.
rsETH Price and De-pegging Analysis
Changes in rsETH Circulation
The attack minted 116.5k rsETH (about 18% of circulating supply) out of thin air, with no real ETH backing. rsETH across more than 20 chains faces uncertainty regarding backing, pending reconciliation of reserves and circulating supply by Kelp DAO.
Questions on rsETH Pricing Mechanism
Industry analysts note that rsETH, as a Liquid Restaking Token (LRT), derives its value heavily from the integrity of the underlying ETH reserves. If the reserve and circulating supply diverge, the asset’s peg could be fundamentally destabilized. Kelp DAO’s 1/1 DVN configuration effectively concentrates cross-chain verification security responsibility on a single node, sacrificing redundancy for efficiency, exposing systemic vulnerabilities of LRT assets in cross-chain scenarios.
SparkLend’s Cautious Strategy Validation
Spark Protocol’s Proactive Risk Management
Monetsupply.eth, head of Spark Protocol’s strategy, disclosed that as early as January 2026, Spark proactively delisted low-usage assets including rsETH, tightening collateral scope and functionality. This cautious risk control was initially met with community dissatisfaction but proved prudent during the Kelp DAO incident.
Liquidity Comparison
Despite ETH liquidity tightening due to rsETH risk exposure on Aave, SparkLend maintained sufficient ETH withdrawal liquidity. It also adopted a higher upper limit on ETH borrowing rates, sacrificing some market share to Aave but building a healthier balance sheet during the crisis.
Significance of Asset Screening
Spark’s early delisting of rsETH highlights an important principle: in DeFi lending, collateral quality screening is more critical than expanding collateral types to chase TVL. During extreme events, broad collateral acceptance can become a vulnerability entry point, while prudent asset selection is the first line of defense for protocol security.
Potential Reconfiguration of Lending Protocol Competition
Post-incident, the competitive logic among DeFi lending protocols may shift. Previously growth-oriented strategies focused on maximizing TVL will be re-evaluated by communities and investors, with asset quality and risk isolation becoming core metrics for security assessment. Spark’s strategy, gaining market recognition after the crisis, may prompt other protocols to recalibrate collateral policies.
Dialogue Among Community, Developers, and Security Researchers
Community Sentiment: From Panic to Reflection
Panic Withdrawals and Data Discussions
Within hours of the incident, discussions on platforms like X (Twitter) in both Chinese and English exceeded hundreds of millions of views. Initial community reactions centered on panic withdrawals and asset safety concerns. 0xngmi, founder of DeFiLlama, pointed out that even protocols on Solana unaffected by the incident experienced capital outflows. He added that the entire DeFi TVL evaporated nearly $100 billion, emphasizing that in such events, there are no winners—only a shrinking “cake” that harms everyone.
Community Divergence on Aave’s Risk Management
After Aave froze rsETH markets, community opinions split on its risk management capabilities. Supporters argue that Aave’s quick response effectively contained further bad debt expansion, demonstrating resilience of decentralized lending protocols; critics suggest that Aave’s prior acceptance of rsETH as collateral may have lacked sufficient risk assessment, especially considering Spark had delisted rsETH in January.
Developer and Protocol Responses
Public Statements from Protocols
Industry Disputes on Responsibility
Security researchers generally agree that Kelp DAO’s 1/1 DVN bridge configuration was the root cause. However, responsibility attribution is debated: some believe Kelp DAO, as the protocol developer, bears primary responsibility; others argue LayerZero, as the cross-chain infrastructure provider, also bears fault in configuration guidance and best practices.
Security Researcher Perspective
Technical Vulnerability Characterization
Multiple security analysts on X have provided in-depth analyses indicating that the core vulnerability lies in Kelp DAO’s configuration of LayerZero’s Omnichain Application (OApp): using a 1/1 DVN mode, relying on a single verification node, enabling attackers to forge cross-chain verification messages. Through carefully crafted payloads, attackers triggered minting of rsETH on target chains without real cross-chain assets, effectively creating nearly $300 million worth of synthetic assets out of thin air.
Historical Analogy and Lessons
Researchers compare this attack to the 2022 Nomad bridge incident: both involved configuration flaws in cross-chain verification mechanisms, with attackers exploiting message validation loopholes. Post-Nomad, industry vigilance increased, but as new bridge designs and complex assets like LRT emerged, new attack surfaces appeared. The Kelp DAO event underscores that cross-chain bridge security remains unresolved, and asset complexity only deepens systemic vulnerabilities.
Industry Impact Analysis: From Single-Point Vulnerabilities to Systemic Risk Propagation
Trust Shock in the LRT Sector
Value Anchoring of LRT Assets Under Scrutiny
rsETH, as a representative LRT asset, faces a fundamental test. Its value heavily depends on the integrity of the underlying ETH reserves. The bridge security flaw allows creation of “anchorless” tokens without touching the underlying reserves, undermining the peg and trust in LRT assets. This incident challenges the foundational assumptions of the LRT sector.
Potential for Stricter Transparency and Audits
Post-event, stricter standards for reserve transparency and audits in LRT protocols are likely. Kelp DAO will need to publish reserve reconciliation results to demonstrate rsETH’s backing, potentially setting a new benchmark for security standards in the LRT space.
Re-evaluation of Risk Isolation in Lending Protocols
Morpho’s Isolated Market Architecture Shows Advantages
In this incident, Morphos’s isolated markets limited rsETH’s risk exposure to roughly $1 million, distributed across two independent markets, avoiding systemic impact. In contrast, Aave’s unified lending pool design allowed contamination from a single collateral to propagate across the entire protocol.
Protocol Architecture as a Key Security Factor
The performance difference between Morpho and Aave highlights a crucial insight: in DeFi security, architectural risk isolation is more fundamental than post-hoc risk controls. While isolated markets may sacrifice some capital efficiency, they provide a firewall effect during extreme events.
Cross-Chain Bridge Security: Old Problem, New Variants
Risks in LayerZero Configuration Parameters
The core technical issue in the Kelp DAO incident stems from the 1/1 DVN bridge configuration. This setup introduces a single point of failure in cross-chain asset verification, where an attacker only needs to compromise one verification node to forge messages. LayerZero’s flexible configuration, while powerful, increases the risk of misconfiguration.
Industry Adoption of Best Practices for Cross-Chain Bridges
Post-incident, the industry is likely to accelerate the adoption of best practices: multi-DVN verification, time locks, transaction limits, and other security measures. Protocols like Curve Finance have already paused LayerZero infrastructure for security assessments, setting a precedent for wider adoption.
Multi-Scenario Evolution: Future Paths for DeFi Security
Baseline Path: Gradual Recovery, System Resilience
In this scenario, Aave gradually absorbs bad debt via reserves and income; Kelp DAO completes reserve reconciliation and publishes rsETH backing; the industry recovers after short-term pain. Key variables include: whether Aave can cover bad debt without slashing security modules; whether Kelp DAO’s reconciliation can restore rsETH’s perceived value; whether other LRT protocols can rebuild trust through transparency.
Stress Path: ETH Price Drop Triggers Secondary Liquidations
Monetsupply.eth warns that ETH, as the core collateral, faces liquidation risk if market utilization hits 100%. If ETH prices fall by 15-20%, significant additional bad debt could accrue, forcing the security module (stkAAVE) to be heavily utilized for the first time, directly impacting token holders. This could trigger a vicious cycle of liquidity drying up, failed liquidations, and expanding bad debt, affecting other ETH-collateralized DeFi protocols.
Rebuilding Path: Systematic Upgrade of DeFi Security Architecture
This incident may catalyze a comprehensive upgrade in DeFi security architecture, including: establishing industry standards for cross-chain bridge configuration (multi-DVN, time locks, transaction caps); normalizing reserve proof mechanisms for LRT protocols (daily or real-time reconciliation); tightening collateral eligibility criteria; exploring isolated markets in major lending protocols. Achieving these will require balancing security and efficiency, but the Kelp DAO event demonstrates that sacrificing security redundancy for efficiency can be prohibitively costly.
Conclusion
The $293 million Kelp DAO vulnerability event is more than a major hack; it is a real-world stress test of DeFi systemic risk. By exploiting a bridge configuration flaw, the attacker triggered a multi-layer contagion—from LRT assets to leading lending protocols and the entire DeFi ecosystem—ultimately causing $8.45 billion TVL evaporation in two days and over $13.2 billion in total chain-wide DeFi capital shrinkage.
In this storm, protocols’ fates diverged sharply: Aave faced immense pressure due to broad collateral acceptance; Morpho contained risk within a segmented market; SparkLend avoided major losses by delisting low-usage assets like rsETH early. These outcomes underscore a core principle: in DeFi, security is not just a set of technical measures but a philosophical choice in system architecture.
As of April 20, 2026, Kelp DAO has yet to publish reserve reconciliation; Aave’s bad debt resolution remains under discussion; rsETH’s true value awaits reassessment. These unresolved issues will continue to test DeFi’s resilience and governance. What is certain is that the 2026 security crisis will leave a profound mark on DeFi history—prompting the industry to rethink “efficiency-first” growth and seek a new balance between security and expansion.