Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

KelpDAO hack exposes weak spots in Web3 security

May 6, 2026

Reid Hoffman says NFTs may make a comeback as AI agents strain online identity

May 6, 2026

RootData maps 30 Hyperliquid Web3 partners as it builds an on-chain liquidity OS

May 6, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»KelpDAO hack exposes weak spots in Web3 security
Security

KelpDAO hack exposes weak spots in Web3 security

May 6, 2026No Comments3 Mins Read

The KelpDAO hack showed several fault lines in Web3 security. The biggest problem was blockchains flawlessly executing transactions that were based on flawed data.

Web3 security is still at the forefront, as a way to rebuild trust in DeFi protocols. The KelpDAO hack had lasting repercussions for DeFi lending and raised issues on ramping up Web3 security.

DeFi hacks reached a one-year high in April, opening up a discussion on Web3 risks and better ways to intercept hacks. | Source: DeFiLlama.

The recent wave of hacks in April may make apps reassess the way they access data and permit transactions. Similar hacks continued in May, with $930K lost in the month to date. Recently, Bisq Protocol lost $858K based on flawed protocol logic and a fake client attack, according to DeFiLlama data.

Web3 apps have a data verification problem

According to Victor Fei of Ormilabs, the KelpDAO hack is a clear example of how an application can continue working, even if the blockchain state does not correspond to the data.

Fei explained that applications do not always refer back to the blockchain directly. Instead, they rely on intermediaries such as RPC nodes, instead of raw on-chain data. This is a requirement for Ethereum and other older chains, which are no longer viable to access directly for most apps.

With a limited source of data, a bridge can only rely on a small set of RPC nodes. When some sources are compromised or unavailable, the app may operate on bad data, while the underlying chain will still count the transactions as valid.

Most modern Web3 apps do not access the chain directly, but rely on some forms of indexing to fetch relevant information. The indexing can display flawed data or become a direct vector of attack.

See also  The Pet Collective’s 45 Million Fans Gain New Web3 Access with Theta

The KelpDAO exploit revealed this vulnerability in full. The verification process trusted a limited number of RPC sources, and attackers hijacked some of those sources. With a flawed data layer, the blockchain processed the transactions as usual and spent real coins in exchange for a fake balance.

The problem becomes even more serious if AI agents are allowed to act based on a limited and potentially flawed data layer.

What can increase Web3 security?

The biggest flaw in the KelpDAO, Drift Protocol, and other recent hacks is the speed of execution. Most of the transactions happened immediately and were finalized in the next block, with no cooldown period or extra checks. Web3 has advertised its ability for fast permissionless transactions, but it also allows bad actors to execute their heist with speed.

“The future of Web3 security comes down to speed. Our data shows that hacking and laundering are fast and cheap, while teams’ response is slow and expensive,” commented Vladyslav Syrotin, Head of Investigations at Global Ledger to Cryptopolitan.

Syrotin believes Web3 projects should lower their time-to-detection to catch unusual outflows, sudden liquidity drops, or suspicious smart contract calls.

According to Syrotin, alerts and blocks should be automated within one second after an attack, and victim reports and data labeling should be ready within 10 minutes. Currently, it takes hours or days to tally the total losses and track down the wallet clusters of the attackers.

Syrotin added that even a slower time frame, with 30-second alerts and labeling in four hours, can help prevent around half of the incidents and cut losses.

See also  North Korean workers have been infiltrating DeFi for 7 years: Researcher

Source link

exposes hack KelpDAO Security spots Weak Web3

Related Posts

RootData maps 30 Hyperliquid Web3 partners as it builds an on-chain liquidity OS

May 6, 2026

Crypto scammers weaponize Telegram Mini Apps for fake platforms

May 6, 2026

Shirtum crypto fraud case could top €24M as footballers face complaint

May 6, 2026

State Street says institutions want improved blockchain security in wake of recent DeFi attacks

May 6, 2026
Top Posts

Compound Foundation Proposes 3,000 ETH to Aave for rsETH Recovery

April 29, 2026

Bitfinex Customers Targeted in Phishing Attacks After Support Agent Hack

November 6, 2023

GCOIN Debuts as Playnance Accelerates Ecosystem Growth

March 18, 2026

Type above and press Enter to search. Press Esc to cancel.