Wormhole Counter-exploit Forces Scrutiny of Multisigs in DeFi

A set of criteria had to be met before the counter-exploit could happen. Does that make it centralized?

article-image

maximlacrimart/Shutterstock.com modified by Blockworks

share

The spectrum of decentralization has been a hot topic following a counter-exploit recently executed by Jump Crypto on the Wormhole hacker who stole 120,000 ETH — around $325 million — in February last year.

After receiving an order from the High Court of England, Oasis — a privately owned app deployed on top of decentralized finance (DeFi) protocol MakerDAO — carried out a counterattack by adding an “authorized third party” to its multisig. The third party — believed to be Jump — then used it to upgrade Oasis’ proxy contract, ultimately seizing the funds.

Many industry participants raised concerns about this move as an indication of the centralization of DeFi, and whether these upgradable contracts should be used at all.

Wait, what’s a proxy contract?

In an interview with Blockworks, Joe Coll, a venture investor at Framework Ventures, said that proxy contracts provide upgradability to a protocol’s set of smart contracts.

“When contracts are immutable — when they’re non-upgradable, it requires the entirety of the network to fork out the code,” Coll said.

Uniswap is one example of this type of protocol. That’s why Uniswap, over several years, deployed discrete versions of its market-leading decentralized exchange, the most recent being “Uniswap V3.” Previous versions are still operating — just as they always have been since their original deployment — and will continue to do so as long as the Ethereum network is producing blocks.

Had Uniswap instead used proxy contracts, it could instead have retired the older versions.

“When a user sends a transaction through a proxy contract, it will point it to another contract that contains the core logic, almost like a router,” Coll said.

Proxy contracts can be controlled in multiple different ways: It could be upgraded by a single private key, it could also be upgraded through on-chain votes where an entire community would have to use tokens to vote before any changes were made to the contract, or it could be controlled by a multisig, he said.

A multisig — short for multi-signature — is a cryptocurrency wallet with two or more key holders. 

In the case of the counter-exploit, the proxy contract was controlled by a 4 of 12 Oasis multisig — a known group of individuals who maintained multiple private keys that collectively enable transaction authorization.

“The nuance here is that a few days before all of this happened, what they described as a white hack group came to [Oasis] and identified a previously ‘vulnerability’ within this multisig proxy contract,” Coll said. “And once that was realized by them, and apparently realized by the court as well, the opportunity for unilateral action by this multisig was actually possible, and that’s what the court appears to have enforced.”

Does this mark the end of decentralization?

The short answer to this question is no, though lessons can be learned from this counter-exploit.

“Multisigs exist because [protocols] want to do something fast, and just because it has upgradability doesn’t mean they can do everything,” Coll said. 

In this particular situation, Coll notes that it was a “really nuanced combination with a vulnerability that was unknown in the middle of it.”

“Multisigs can be very legitimate and they can maintain decentralization if they’re implemented in the right way,” Coll said.

This sentiment is shared by Blockworks Research analyst Dan Smith, who noted that this particular exploit was a unique situation.   

“The real issue here is the use of proxies AND a centralized multisig. It’s the combination of both things. Proxies play an important role in DeFi and aren’t going anywhere anytime soon,” Smith said.

As proxy contracts are upgraded by their owners, a centralized multisig owner can remove this one aspect of decentralization.

“The UK gov forced Oasis — a private company [headquartered] in [the] UK — to let this counter-exploit happen,” Smith said. “People are not immune to regulation just because they build on blockchain rails.”

Code, on the other hand, when deployed in an immutable fashion, is much more resistant to interference, whether justified or not.


Get the news in your inbox. Explore Blockworks newsletters:

Tags

Decoding crypto and the markets. Daily, with Byron Gilliam.

Upcoming Events

Javits Center North | 445 11th Ave

Tues - Thurs, March 24 - 26, 2026

Blockworks’ Digital Asset Summit (DAS) will feature conversations between the builders, allocators, and legislators who will shape the trajectory of the digital asset ecosystem in the US and abroad.

recent research

Flying_Tulip.png

Research

Flying Tulip's perpetual put option provides real principal protection, but investors must pay a valuation premium today for products that have to be built over the next 24 months. This structure works best as a stablecoin substitute where the put allows continuous monitoring—accept opportunity cost in exchange for asymmetric upside if the team executes on its ambitious cross-collateral architecture.

article-image

As flows consolidate and volatility fades, finding edge now means knowing which games are still worth playing

article-image

Value distribution came to $1.9 billion distributed in Q3, though total revenues have yet to beat 2021 heights

article-image

MegaETH public sale auction ends tomorrow, and the free money machine has attracted people who like free money

article-image

With tBTC under the hood, Acre abstracts bridging and converts non-BTC rewards to bitcoin

article-image

Accountable is also eyeing mid-November for mainnet launch

article-image

“Adjusted for size, I think it may be the most successful ETP launch of all time,” Bitwise CIO Matt Hougan says