Behind the 1.4 ETH theft: Lido's security mechanism teaches the industry a lesson

robot
Abstract generation in progress

In the early morning, a hacker invaded an Address in the Lido Oracle Machine multi-signature and exposed his whereabouts after stealing 1.4 ETH. Does the theft have any substantial impact on Lido?

Written by: @IsdrsP (Lido Validator Node Manager)

Compiled by: Nicky, Foresight News

On May 10th, the oracle service provider Chorus One disclosed that a hot wallet of the Lido oracle was hacked, resulting in the theft of 1.46 ETH. However, according to security audits, this isolated incident has limited impact, as the wallet in question was originally designed for lightweight operational purposes.

The attack on the Oracle Machine indeed sounds terrible. However, Lido's architectural design, the value philosophy of stakeholders, and a security-oriented contributor culture mean that the impact of such events is extremely limited — even if the Oracle Machine is completely compromised, it will not lead to catastrophic consequences.

So, what exactly makes Lido unique?

Thoughtful Design and Layered Protection Mechanism

The Oracle Machine of Lido is responsible for transmitting information from the consensus layer to the execution layer and reporting protocol dynamics. They do not control user funds. A single faulty Oracle Machine will only cause minor issues, and even if the arbitration process (quorum) is compromised, it will not result in catastrophic consequences.

What malicious actions might a single compromised Oracle Machine attempt?

A) Submit malicious report (but will be ignored by honest Oracle Machine);

B) depletes the ETH balance of this specific Oracle Machine Address (this address is used solely for operating transactions and does not hold the funds of stakers).

What responsibilities does the Oracle Machine actually bear?

The Oracle Machine of Lido is essentially a distributed mechanism composed of 9 independent participants (with 5/9 required for consensus), mainly responsible for reporting the protocol status, with the current core functions including:

• Token inflation rewards distribution (rebase)

• Withdrawal Process Handling

• Verification of node exit and performance monitoring for CSM (Community Security Module) reference.

These oracle machines will submit their observed state "reports" to the protocol. These reports are used to calculate the daily accumulated rewards or penalties, update the stETH balance, process and ultimately confirm withdrawal requests, calculate validator exit applications, and measure the performance of validators.

Essentially, the Lido Oracle Machine is different from what people usually understand as "multi-signature". The Oracle Machine cannot access the funds of stakers and protocols, nor can it control any protocol contract upgrades, let alone upgrade itself or manage membership. Instead, the Lido DAO maintains the list of Oracle Machines through voting.

The functionality of the Oracle Machine is extremely limited – it can only perform the following operations: submit reports that strictly adhere to deterministic, audited, and open-source algorithms designed for different protocol objectives; execute transactions in specific circumstances to implement the results of the reports (for example, the daily rebase operation of the protocol).

If 5 out of 9 Oracle Machines are compromised, what would be the worst-case scenario? In this case, the compromised Oracle Machines may collude to submit malicious reports, but any report must pass the on-chain enforced protocol rationality check.

If the report violates these reasonableness checks, its processing time will be extended (and may even never be) "settled", because the values in the report must conform to the allowable range of value changes within a specific time period (a few days or weeks).

In the worst-case scenario, this could mean that a rebase similar to stETH (whether positive or negative) would take longer to take effect, which would impact stETH holders, but the effect on most holders would be minimal unless someone is using stETH with leverage in DeFi.

There are also other possibilities: if a malicious Oracle Machine and its accomplices possess certain information, or have the ability to impose large penalties (such as massive confiscations) at the consensus layer, they may exploit the execution layer stETH update delay to seek economic benefits.

For example, if a large-scale confiscation occurs, some people may sell part of their stETH on a decentralized exchange (DEX) before the negative rebase takes effect. However, this will not affect the withdrawal operations initiated directly by users through Lido, as the protocol's "emergency mode" (bunker mode) will be activated to ensure a fair execution of the withdrawal process.

Instant and Complete Transparency

From start to finish, all participants in the Lido ecosystem — whether they are contributors, node operators, or Oracle Machine operators — always prioritize transparency and goodwill, ensuring the rights of stakers and the healthy development of the entire ecosystem.

Whether it is proactively releasing detailed post-analysis reports, compensating for staking losses caused by infrastructure downtime, voluntarily exiting validation nodes for preventive reasons, or quickly issuing comprehensive incident reports, these participants always view transparency as a top priority.

Continuous Iteration and Upgrade

Lido is always at the forefront of technology research and development, dedicated to using zero-knowledge proof (ZK) technology to enhance the security and trustlessness of the Oracle Machine mechanism. As early as the initial stages, the team invested over $200,000 in special funds to support trustless verification of consensus layer data through zero-knowledge proof technology.

These explorations of technology ultimately led to the official launch of the SP1 zero-knowledge Oracle Machine "Double Check" mechanism developed by the SuccinctLabs team within the year. This mechanism provides an additional layer of security verification for potential negative rebase operations through verifiable consensus layer data.

Currently, this type of zero-knowledge technology is still in the development stage. The related zero-knowledge virtual machine (zkVM) not only needs to undergo real-world testing, but also has limitations such as slower computation speed and higher computational costs, making it unable to fully replace trusted Oracle Machines. However, in the long run, these types of solutions are expected to become trust-minimized alternatives to existing Oracle Machines.

Oracle Machine technology is very complex and has various application scenarios in the DeFi field. In the Lido protocol, the Oracle Machine is carefully designed as a core component, significantly reducing the impact range of potential risks through an effective decentralized architecture, a separation of duties mechanism, and a multi-layer verification system.

Content source:

View Original
The content is for reference only, not a solicitation or offer. No investment, tax, or legal advice provided. See Disclaimer for more risks disclosure.
  • Reward
  • 10
  • Share
Comment
0/400
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
XuJunmingvip
· 05-12 08:11
Hold on tight, it's time to da moon 🛫
Reply0
View More