BREAKING: LayerZero Blamed for $292M Hack – 47% of Apps at Risk in 2026

Direct answer: Kelp DAO’s explosive memo reveals that LayerZero personnel explicitly approved the 1-of-1 verifier setup that the protocol later blamed for the $292 million rsETH bridge hack, shifting the blame back to LayerZero’s own security oversight.

Key statistic: Data from CoinGecko and Dune Analytics shows 47% of roughly 2,665 active LayerZero OApp contracts ran a 1-of-1 DVN configuration over the 90 days ending April 22, 2026, exposing more than $4.5 billion in market value to the same class of risk that enabled the exploit.

Why it matters for your bottom line: This incident reveals a fundamental security flaw in LayerZero’s architecture—one that was known and approved by the team—and signals an imminent migration of capital and trust away from LayerZero toward more robust interoperability solutions like Chainlink CCIP.

Context: What Happened

On May 5, 2026, Kelp DAO published a memo titled “Setting the Record Straight Around the LayerZero Bridge Hack,” claiming that LayerZero personnel reviewed Kelp’s configurations for over 2.5 years across eight integration discussions without ever warning that a 1-of-1 verifier setup posed a material security risk. The memo includes screenshots of Telegram exchanges where a LayerZero team member said: “No problem on using defaults either — just tagging [redacted] here since he mentioned you may have wanted to use a custom DVN setup for verifying messages, but will leave that to your team!” Kelp argues that the “defaults” referenced were the 1-of-1 LayerZero Labs DVN configuration later cited by LayerZero as the application-level setup that enabled the exploit.

LayerZero’s April 19 postmortem had stated that Kelp’s rsETH application relied on LayerZero Labs as its sole verifier and that the setup “directly contradicts” LayerZero’s recommended multi-DVN model. However, Kelp’s evidence—along with LayerZero’s own bug bounty scope, OFT Quickstart, and GitHub examples—shows that LayerZero treated verifier-network choices as application-level configuration while presenting a one-DVN setup as the default.

The exploit, linked to North Korea’s Lazarus Group, drained 116,500 rsETH worth roughly $292 million from Kelp’s LayerZero-powered bridge. Two additional forged transactions totaling more than $100 million were signed and processed by the LayerZero Labs DVN before Kelp paused its contracts. LayerZero said the protocol “functioned exactly as intended” and subsequently banned 1-of-1 configurations.

Strategic Analysis: Winners, Losers, and Structural Shifts

Who Gains?

Chainlink CCIP emerges as the clear winner. Kelp has already migrated rsETH off LayerZero’s OFT standard to Chainlink’s Cross-Chain Interoperability Protocol, signaling a vote of confidence in Chainlink’s multi-oracle security model. This migration could trigger a domino effect as other protocols reassess their interoperability choices.

Competing interoperability protocols (e.g., Axelar, Wormhole) also stand to benefit as developers seek alternatives to LayerZero. The hack exposes a systemic risk in LayerZero’s architecture that competitors can exploit in their marketing and security audits.

Attackers (Lazarus Group) successfully executed a $292 million heist, demonstrating the profitability of targeting cross-chain bridges with single-verifier setups. This will likely encourage copycat attacks.

Who Loses?

LayerZero suffers severe reputational damage. The protocol is now caught in a blame game with Kelp, and the data showing 47% of active OApps using the same risky configuration undermines its claim that the exploit was a user misconfiguration. LayerZero’s decision to ban 1-of-1 setups only after the hack suggests reactive rather than proactive security governance.

Kelp DAO lost $292 million and had to migrate its entire infrastructure, incurring significant operational costs and user trust erosion. While Kelp’s memo shifts blame to LayerZero, the damage is done.

Users of 1-of-1 DVN OApps are now exposed to potential service disruptions as LayerZero enforces its ban, and their funds remain at risk until they migrate to multi-DVN configurations.

Structural Implications

The incident exposes a fundamental tension in LayerZero’s design: the protocol treats verifier network selection as an application-level responsibility, yet its default templates and documentation promote a single-verifier setup. This misalignment creates a security gap that attackers can exploit. The fact that LayerZero’s bug bounty explicitly excludes “misconfigurations” further disincentivizes security researchers from reporting such issues.

Moreover, Kelp’s allegation of substantial overlap in addresses granted ADMIN_ROLE on both the LayerZero Labs DVN and the Nethermind DVN raises governance concerns. If true, it suggests that LayerZero’s decentralized verifier network is not as decentralized as advertised, introducing a single point of failure.

Second-Order Effects

Regulatory scrutiny will intensify. The $292 million hack, attributed to North Korea, will likely attract attention from financial regulators and law enforcement. Cross-chain bridges may face stricter compliance requirements, including mandatory multi-verifier setups and real-time monitoring.

Insurance and auditing markets will adapt. We expect a surge in demand for security audits that specifically test verifier configurations, and insurance products that cover losses from single-verifier exploits may become prohibitively expensive or unavailable.

Developer migration away from LayerZero could accelerate. The combination of a high-profile hack, blame-shifting, and a reactive policy change undermines developer confidence. Protocols building on LayerZero may now prioritize interoperability solutions with proven multi-oracle security, such as Chainlink CCIP.

Market / Industry Impact

The total value locked (TVL) in LayerZero-powered bridges could decline sharply as protocols migrate. The $4.5 billion exposed in 1-of-1 setups represents a significant portion of LayerZero’s ecosystem value. If even a fraction of that value moves to competitors, LayerZero’s market share could erode by 20-30% within the next quarter.

Chainlink’s CCIP, already adopted by major institutions, is poised to capture a larger share of the cross-chain interoperability market. Kelp’s migration serves as a case study that other protocols can reference when making security decisions.

Executive Action

  • Assess exposure: If your protocol uses LayerZero’s OFT standard, immediately audit your DVN configuration. If you are running a 1-of-1 setup, migrate to a multi-DVN configuration or consider switching to an alternative interoperability protocol.
  • Review security dependencies: Evaluate whether your interoperability provider’s security model aligns with your risk tolerance. Single-verifier setups should be treated as high-risk, especially for high-value assets.
  • Monitor regulatory developments: Expect increased scrutiny on cross-chain bridges. Proactively engage with regulators to demonstrate compliance with best practices, such as multi-verifier attestation and real-time anomaly detection.

Why This Matters

This is not a one-off exploit. It reveals a systemic vulnerability in one of the most widely used interoperability protocols, with $4.5 billion still at risk. The blame game between LayerZero and Kelp distracts from the core issue: the protocol’s architecture allowed a single point of failure, and the team approved it. Executives must act now to protect their assets and user trust.

Final Take

LayerZero’s post-hack response—banning 1-of-1 setups and blaming users—is too little, too late. The data shows that the protocol’s own defaults and documentation encouraged the very configuration that led to the exploit. For the sake of the entire DeFi ecosystem, interoperability providers must learn from this incident and prioritize security over speed. The $292 million question is: will they?




Source: CoinDesk

Rate the Intelligence Signal

Intelligence FAQ

A 1-of-1 DVN setup means only one verifier (LayerZero Labs) is used to confirm cross-chain messages. This creates a single point of failure, as compromising that verifier allows attackers to forge transactions. LayerZero’s recommended multi-DVN model requires multiple independent verifiers, reducing risk.

If your protocol uses a 1-of-1 DVN configuration, yes—migrate to a multi-DVN setup or an alternative like Chainlink CCIP. Even if you use multiple DVNs, the reputational risk and potential service disruptions from LayerZero’s policy changes warrant a review of your interoperability provider.