Kelp DAO claims LayerZero’s 'default' settings are what actually caused the massive $290 million disaster

TL;DR
Kelp DAO disputes LayerZero's claim that its setup caused a $290 million exploit, asserting that LayerZero's default settings were to blame. The incident involved attackers draining 116,500 rsETH from Kelp's bridge.
Key points
- Kelp DAO disputes LayerZero's blame for the exploit
- LayerZero's default settings are claimed to be the cause
- 116,500 rsETH worth $290 million was drained
- Kelp plans to publish a memo to counter LayerZero's claims
- The exploit involved poisoning LayerZero's verifier servers
Mentioned in this story
The popular Spiderman meme showing three identical superheroes pointing fingers at each other is having its crypto moment today.
Kelp DAO is set to push back on LayerZero's post-mortem of Sunday’s $290 million exploit, which essentially blames Kelp, a L2 source familiar with the matter told CoinDesk. Kelp plans to dispute the cross-chain messaging firm's claim that it ignored repeated warnings to move away from a single-verifier setup. CoinDesk has reviewed and verified the memo Kelp plans to publish.
Kelp is a liquid restaking protocol that takes user-deposited ether, routes it through a yield-generating system called EigenLayer, and issues a receipt token, rsETH, in exchange.
LayerZero is the cross-chain messaging infrastructure that moves rsETH between blockchains, using entities called DVNs (decentralized verifier networks) to verify whether a cross-chain transfer is valid.
On Saturday, attackers drained 116,500 rsETH, worth about $290 million, from Kelp's LayerZero-powered bridge by poisoning the servers that LayerZero's verifier relied on to check transactions.
Kelp, the source said, is planning on saying the DVN that was compromised via what it calls a "sophisticated state-sponsored attack” was LayerZero's own infrastructure, not a third-party verifier.
Attackers compromised two of LayerZero's own servers that check whether cross-chain transactions are legitimate, then flooded the backup servers with junk traffic to force LayerZero's verifier onto the compromised ones.
All of that infrastructure was built and run by LayerZero, not Kelp, the sourceclaimed.
The source contested LayerZero's framing of the "1/1 configuration" as a fringe choice made against guidance. LayerZero's post-mortem said KelpDAO chose a 1-of-1 DVN setup despite expressing recommendations to configure multi-DVN redundancy.
A "1/1 configuration" means only a single validator must sign off on a cross-chain message for the bridge to act on it, leaving the system with no second check to catch a compromised or forged instruction. A multi-validator configuration (such as 2/3, 3/5, etc.) ensures there is no single point of failure that can approve a forged message on its own.
They added that, through a direct communications channel with LayerZero, which has been open since July 2024, they produced no specific recommendation for Kelp to change the rsETH DVN configuration.
LayerZero's own quickstart guide and default GitHub configuration point to a 1/1 DVN setup, the source told CoinDesk, adding 40% of protocols on LayerZero are currently using the same configuration.
The configuration Kelp ran also appears in LayerZero's own V2 OApp Quickstart, where the sample layerzero.config.ts wires every pathway with one required DVN and no optional DVNs. That’s the same 1/1 structure.
Kelp's core restaking contracts were not touched, and the exploit was isolated to the bridge layer, they added. Its emergency pause, 46 minutes after the drain, blocked two follow-up attempts that would have released an additional ~$200 million in rsETH.
CoinDesk reached out to LayerZero for comment on the story and didn't hear back by the time of publication.
'Deflecting responsibility'
Security researchers are also not buying LayerZero's isolated framing, which pinned the blame on Kelp.
Kelp is a liquid restaking protocol. Its core competency is staking infrastructure, EigenLayer integration, and liquid staking token management. When integrating with LayerZero, Kelp relied on LayerZero's documentation, their defaults, and their team's guidance to make configuration decisions, the source claimed.
Yearn Finance core team developer Artem K, who is popularly known as @banteg on X, posted a technical review of LayerZero's public deployment code and said that the reference setup ships with single-source verification defaults across every major chain, including Ethereum, BSC, Polygon, Arbitrum and Optimism.
That deployment also leaves a public endpoint exposed that leaks the list of configured servers to anyone who queries it.
Banteg flagged in his analysis that he can't prove which configuration Kelp used, but noted that LayerZero usually asks new operators to use its default setup, which its post-mortem criticized.
Chainlink community manager Zach Rynes put it bluntly on X, alleging that LayerZero was "deflecting responsibility" for its own compromised infrastructure and accused the company of throwing Kelp under the bus for trusting a setup LayerZero itself supported.
As such, LayerZero has said it will no longer sign messages for any application running a single-verifier setup, forcing a protocol-wide migration.
Read more: 'DeFi is dead': crypto community scrambles after this year's biggest hack exposes contagion risk
Q&A
What caused the $290 million exploit involving Kelp DAO?
Kelp DAO claims that LayerZero's default settings, not its own setup, were responsible for the exploit.
How much rsETH was drained during the Kelp DAO exploit?
Attackers drained 116,500 rsETH, which was valued at approximately $290 million.
What is Kelp DAO's response to LayerZero's post-mortem report?
Kelp DAO plans to dispute LayerZero's assertion that it ignored warnings about its single-verifier setup.
What role does LayerZero play in the Kelp DAO exploit?
LayerZero provides the cross-chain messaging infrastructure that was compromised during the exploit, allowing attackers to drain funds.





