Wormhole Counter-exploit Forces Scrutiny of Multisigs in DeFi

A set of criteria had to be met before the counter-exploit could happen. Does that make it centralized?

article-image

maximlacrimart/Shutterstock.com modified by Blockworks

share

The spectrum of decentralization has been a hot topic following a counter-exploit recently executed by Jump Crypto on the Wormhole hacker who stole 120,000 ETH — around $325 million — in February last year.

After receiving an order from the High Court of England, Oasis — a privately owned app deployed on top of decentralized finance (DeFi) protocol MakerDAO — carried out a counterattack by adding an “authorized third party” to its multisig. The third party — believed to be Jump — then used it to upgrade Oasis’ proxy contract, ultimately seizing the funds.

Many industry participants raised concerns about this move as an indication of the centralization of DeFi, and whether these upgradable contracts should be used at all.

Wait, what’s a proxy contract?

In an interview with Blockworks, Joe Coll, a venture investor at Framework Ventures, said that proxy contracts provide upgradability to a protocol’s set of smart contracts.

“When contracts are immutable — when they’re non-upgradable, it requires the entirety of the network to fork out the code,” Coll said.

Uniswap is one example of this type of protocol. That’s why Uniswap, over several years, deployed discrete versions of its market-leading decentralized exchange, the most recent being “Uniswap V3.” Previous versions are still operating — just as they always have been since their original deployment — and will continue to do so as long as the Ethereum network is producing blocks.

Had Uniswap instead used proxy contracts, it could instead have retired the older versions.

“When a user sends a transaction through a proxy contract, it will point it to another contract that contains the core logic, almost like a router,” Coll said.

Proxy contracts can be controlled in multiple different ways: It could be upgraded by a single private key, it could also be upgraded through on-chain votes where an entire community would have to use tokens to vote before any changes were made to the contract, or it could be controlled by a multisig, he said.

A multisig — short for multi-signature — is a cryptocurrency wallet with two or more key holders. 

In the case of the counter-exploit, the proxy contract was controlled by a 4 of 12 Oasis multisig — a known group of individuals who maintained multiple private keys that collectively enable transaction authorization.

“The nuance here is that a few days before all of this happened, what they described as a white hack group came to [Oasis] and identified a previously ‘vulnerability’ within this multisig proxy contract,” Coll said. “And once that was realized by them, and apparently realized by the court as well, the opportunity for unilateral action by this multisig was actually possible, and that’s what the court appears to have enforced.”

Does this mark the end of decentralization?

The short answer to this question is no, though lessons can be learned from this counter-exploit.

“Multisigs exist because [protocols] want to do something fast, and just because it has upgradability doesn’t mean they can do everything,” Coll said. 

In this particular situation, Coll notes that it was a “really nuanced combination with a vulnerability that was unknown in the middle of it.”

“Multisigs can be very legitimate and they can maintain decentralization if they’re implemented in the right way,” Coll said.

This sentiment is shared by Blockworks Research analyst Dan Smith, who noted that this particular exploit was a unique situation.   

“The real issue here is the use of proxies AND a centralized multisig. It’s the combination of both things. Proxies play an important role in DeFi and aren’t going anywhere anytime soon,” Smith said.

As proxy contracts are upgraded by their owners, a centralized multisig owner can remove this one aspect of decentralization.

“The UK gov forced Oasis — a private company [headquartered] in [the] UK — to let this counter-exploit happen,” Smith said. “People are not immune to regulation just because they build on blockchain rails.”

Code, on the other hand, when deployed in an immutable fashion, is much more resistant to interference, whether justified or not.


Don’t miss the next big story – join our free daily newsletter.

Tags

Upcoming Events

Salt Lake City, UT

WED - FRI, OCTOBER 9 - 11, 2024

Pack your bags, anon — we’re heading west! Join us in the beautiful Salt Lake City for the third installment of Permissionless. Come for the alpha, stay for the fresh air. Permissionless III promises unforgettable panels, killer networking opportunities, and mountains […]

recent research

ao cover.jpg

Research

Arweave recently launched the testnet for AO computer, a new messaging protocol that will sit atop a PoS network and aims to become a scalable global compute platform through parallel processing and modularity.

article-image

Ore’s price more than tripled as the supply of new tokens paused

article-image

I spend an unhealthy amount of time thinking about crypto securities law — and I can’t see how ETH is now a securities offering under Howey

article-image

Regulators in South Korea, Japan and Singapore could follow Hong Kong’s lead as Asia responds to spot bitcoin ETF approval in the US

article-image

Martin Grant worked with the Fed for roughly 30 years before leaving his position in 2022

article-image

BitGo CEO Mike Belshe shared his thoughts on the halving and bitcoin ETFs in an interview with Blockworks

article-image

Crypto markets were largely the only ones open over a tense weekend, and they took a beating for it