Wormhole Counter-exploit Forces Scrutiny of Multisigs in DeFi

A set of criteria had to be met before the counter-exploit could happen. Does that make it centralized?

article-image

maximlacrimart/Shutterstock.com modified by Blockworks

share

The spectrum of decentralization has been a hot topic following a counter-exploit recently executed by Jump Crypto on the Wormhole hacker who stole 120,000 ETH — around $325 million — in February last year.

After receiving an order from the High Court of England, Oasis — a privately owned app deployed on top of decentralized finance (DeFi) protocol MakerDAO — carried out a counterattack by adding an “authorized third party” to its multisig. The third party — believed to be Jump — then used it to upgrade Oasis’ proxy contract, ultimately seizing the funds.

Many industry participants raised concerns about this move as an indication of the centralization of DeFi, and whether these upgradable contracts should be used at all.

Wait, what’s a proxy contract?

In an interview with Blockworks, Joe Coll, a venture investor at Framework Ventures, said that proxy contracts provide upgradability to a protocol’s set of smart contracts.

“When contracts are immutable — when they’re non-upgradable, it requires the entirety of the network to fork out the code,” Coll said.

Uniswap is one example of this type of protocol. That’s why Uniswap, over several years, deployed discrete versions of its market-leading decentralized exchange, the most recent being “Uniswap V3.” Previous versions are still operating — just as they always have been since their original deployment — and will continue to do so as long as the Ethereum network is producing blocks.

Had Uniswap instead used proxy contracts, it could instead have retired the older versions.

“When a user sends a transaction through a proxy contract, it will point it to another contract that contains the core logic, almost like a router,” Coll said.

Proxy contracts can be controlled in multiple different ways: It could be upgraded by a single private key, it could also be upgraded through on-chain votes where an entire community would have to use tokens to vote before any changes were made to the contract, or it could be controlled by a multisig, he said.

A multisig — short for multi-signature — is a cryptocurrency wallet with two or more key holders. 

In the case of the counter-exploit, the proxy contract was controlled by a 4 of 12 Oasis multisig — a known group of individuals who maintained multiple private keys that collectively enable transaction authorization.

“The nuance here is that a few days before all of this happened, what they described as a white hack group came to [Oasis] and identified a previously ‘vulnerability’ within this multisig proxy contract,” Coll said. “And once that was realized by them, and apparently realized by the court as well, the opportunity for unilateral action by this multisig was actually possible, and that’s what the court appears to have enforced.”

Does this mark the end of decentralization?

The short answer to this question is no, though lessons can be learned from this counter-exploit.

“Multisigs exist because [protocols] want to do something fast, and just because it has upgradability doesn’t mean they can do everything,” Coll said. 

In this particular situation, Coll notes that it was a “really nuanced combination with a vulnerability that was unknown in the middle of it.”

“Multisigs can be very legitimate and they can maintain decentralization if they’re implemented in the right way,” Coll said.

This sentiment is shared by Blockworks Research analyst Dan Smith, who noted that this particular exploit was a unique situation.   

“The real issue here is the use of proxies AND a centralized multisig. It’s the combination of both things. Proxies play an important role in DeFi and aren’t going anywhere anytime soon,” Smith said.

As proxy contracts are upgraded by their owners, a centralized multisig owner can remove this one aspect of decentralization.

“The UK gov forced Oasis — a private company [headquartered] in [the] UK — to let this counter-exploit happen,” Smith said. “People are not immune to regulation just because they build on blockchain rails.”

Code, on the other hand, when deployed in an immutable fashion, is much more resistant to interference, whether justified or not.


Start your day with top crypto insights from David Canellis and Katherine Ross. Subscribe to the Empire newsletter.

Tags

Upcoming Events

Salt Lake City, UT

WED - FRI, OCTOBER 9 - 11, 2024

Pack your bags, anon — we’re heading west! Join us in the beautiful Salt Lake City for the third installment of Permissionless. Come for the alpha, stay for the fresh air. Permissionless III promises unforgettable panels, killer networking opportunities, and mountains […]

recent research

Research report - cover graphics (3).jpg

Research

The Across protocol emerges as a dominant bridge within the Ethereum and L2 ecosystem, settling notable volumes with low latency, low fees, and no slippage. Across seeks to expand beyond just bridging as an application, to ultimately become modular, optimistic middleware for settling generalizable cross-chain intents.

article-image

Crypto is likely to stay politicized until the Democrats pivot their questionable stance on the segment, Galaxy CEO says

article-image

The US House last week passed its first-ever crypto-focused bill in a full floor vote, but what else is in the pipeline?

article-image

Sponsored

TRON will also be using Google Cloud’s suite of solutions that empower the Web3 space

article-image

The latest post from Degen said that Conduit expected the resync to be done by early Tuesday morning

article-image

The holdings disclosure is the first from a state investment board

article-image

Alexey Pertsev’s verdict by a Dutch Court shouldn’t impact Roman Storm’s upcoming trial, CoinCenter’s Peter Van Valkenburgh says