DeFi Bridge Verification

Cryptographically valid ≠ semantically right

Cross-chain bridge messages are cryptographically valid yet not necessarily semantically correct. Lemma adds a cryptographic layer that enables the receiving system to independently verify message origin before committing state.

P1 Verifiable Origin Liquid staking / restaking protocols · Cross-chain bridges · Lending protocols · DEXs 6 min read

Problem

Cross-chain bridge exploits in 2026 share one structural pattern.

Transactions are cryptographically valid, but cross-system assumptions about origin are not verified before execution. The receiving system commits based on trust assumptions that can be — and have been — subverted.

Three structural failures enable bridge attacks:

  • Single point of verification failure: When a DVN (Decentralized Verifier Network) operates with a 1-of-1 or low-threshold configuration, compromising its keys breaks the entire bridge.
  • RPC trust without verification: Verifiers trust RPC nodes as the source of truth. If an attacker compromises multiple RPCs and forces failover, the verifier approves a fake message as legitimate.
  • Absence of pre-execution origin checks: The receiving OFT adapter executes messages with valid signatures "as designed." There is no cryptographic path to independently ask whether the message was truly issued on the source chain.

The Kelp DAO attack (April 2026) is the clearest embodiment of this pattern. A 1-of-1 DVN approved a fake message, draining $292M. Post-incident malware on compromised RPC nodes deleted itself and the logs, eliminating forensic evidence.

The signature was valid. The message was forged. This gap must be closed with a cryptographic layer.

Scenario

Kelp DAO is a liquid restaking protocol built on EigenLayer. Its flagship token rsETH represents deposited, staked, and restaked ETH, deployed across 20+ chains via LayerZero OFT. At the time of the attack, TVL was approximately $1.57B.

Before Lemma — How the Attack Unfolded

April 18, 2026 17:35 UTC

Time Event
T-10h Attacker funded 9 operational wallets via Tornado Cash
17:35 Attacker called lzReceive with a spoofed cross-chain message
17:35 1-of-1 DVN approved the fake message
17:35 Kelp's OFT adapter released 116,500 rsETH (~$292M) to attacker-controlled address
17:35–18:20 Attacker deposited rsETH as collateral in Aave V3, borrowed ~106,467 WETH
18:21 Kelp emergency multisig executed pauseAll (46 minutes after the first malicious transaction)
Post-attack Malware on compromised RPC nodes deleted itself and the logs

Cascading impact:

  • Direct loss (rsETH drained): ~$292M
  • Aave V3 bad debt (uncollateralizable rsETH): ~$177M
  • Ecosystem TVL outflow (2 days post-attack): $13B+
  • rsETH depegged across 20+ chains
  • ZRO token -22% (24h)

After Lemma — The Same Attack Stops at the Boundary

Time Behavior with Lemma
17:35 Attacker calls lzReceive (same as above)
17:35 DVN approval still passes the fake message (DVN is not replaced)
17:35 Lemma pre-execution attestation activates. Origin proof verification fails — the message was not issued under verifiable conditions on the claimed source chain
17:35 OFT adapter does not commit. 116,500 rsETH remains in escrow
17:35 onward Conversion to Aave V3 collateral is impossible. No downstream cascading losses
Structural fact Stops at the boundary. No manual emergency halt needed

What This Means Structurally

Question Without Lemma With Lemma
Can a 1-of-1 DVN be exploited? Yes (single point of failure) Regardless of DVN approval, commit is rejected if origin proof cannot be verified
Can compromised RPCs inject fake messages? Yes No. Origin proofs are verified independently of RPC trustworthiness
Can log deletion erase traces? Yes On-chain anchored attestations survive
Exploit stop speed 46 minutes (manual) Instant (automatic rejection at write time)

Lemma does not replace the DVN layer. It adds a second independent verification layer as defense in depth. Even if the DVN is compromised, the commit cannot succeed without a verified origin proof.

Architecture

Lemma's four cryptographic layers correspond to the cross-chain bridge lifecycle.

1. ENCRYPT — Issuance-Time Confidentiality

At the moment a cross-chain message is generated on the source chain, the confidential states involved in issuance (custody path, solvency status, restaking depth) are encrypted with AES-GCM. Originals remain under the protocol's control; only attestable hashes ride in the message payload.

2. PROVE — Origin Authentication Gateway

A Lemma Origin Authentication Gateway is deployed at the issuance boundary on the source chain. At cross-chain message generation time:

proof(issuer_id, source_chain_id, action_hash, conditions_hash, timestamp)

is generated as a ZK proof. The proof binds the action to its source without revealing confidential states. The ZK circuit combines commitment and selective disclosure so only the integrity of issuer, source, and conditions is exposed — never the confidential states themselves.

The proof is attached to the message payload as an attestation and does not depend on the sender's continued honesty during transit.

3. DISCLOSE — Pre-Execution Verifier and Domain Policy

A Lemma Pre-Execution Verifier is integrated into the OFT adapter on the destination chain. Before the adapter commits:

  • Extract origin proof from incoming message
  • Verify ZK proof against issuer, source chain, and conditions
  • Check domain policy layer: replay-prevention nonce, custody path, restaking depth limits, solvency attestation

Policies are configurable per protocol. Conservative protocols may require all four; more permissive protocols may enable only a subset. If verification fails, the message is rejected at write time.

4. PROVENANCE — On-Chain Attestation Anchoring

All origin proofs are aggregated into a commitment tree whose root is periodically anchored on-chain. This provides post-hoc forensic evidence surviving log deletion, audit trails for regulatory compliance, and independent verification for dispute resolution — permanently.

Proven Facts

Lemma cryptographically guarantees the following facts in DeFi bridge verification:

  • Message issuing entity and issuance timestamp
  • Issuance conditions on the source chain (custody, solvency, restaking depth)
  • Cryptographic binding between origin proof and received message
  • Existence of a second verification layer independent of DVN approval
  • Automatic rejection under forgery, spoofing, and RPC compromise
  • On-chain anchored attestations surviving log deletion attacks
  • Independent verification by regulatory authorities and third-party auditors
Get Started

Ready to prove?

Talk to us about your use case. We respond within one business day.