Multichain (Backtest 2023-06-01)
Admin key compromise — CEO Zhaojun arrested by Chinese police, private keys to bridge wallets controlled by single person, funds drained from multiple bridge contracts across Fantom, Ethereum, and other chains
What Hindenrank Would Have Said
As of June 1, 2023
“Very high risk — centralized key infrastructure contradicts decentralized security claims, with $1.5B at stake and a track record of exploits. The combination of opaque MPC node operations, China-based leadership, and ecosystem-critical dependency makes Multichain one of the highest systemic risks in DeFi.”
Grade Predicted This Failure
Flagged by dimensions: Mechanism Novelty, Interaction Severity, Track Record, Scale Exposure, Documentation Quality, Regulatory Risk
One or more collapse scenarios directly matched the actual failure mode.
Top Risks Identified
- 1.MPC key management relies on opaque node infrastructure with unverified operator diversity and no on-chain collateral requirements
- 2.Two prior exploits ($7.9M ECDSA key derivation in Jul 2021, $3M approval drain in Jan 2022) demonstrate recurring security failures
- 3.Critical single-point-of-failure risk: CEO controls cloud server infrastructure hosting MPC nodes, creating centralized custody despite decentralized claims
- 4.Massive honeypot ($1.5B TVL locked in bridge contracts) amplifies impact of any key compromise or operational failure
- 5.China-based team and leadership create elevated regulatory and operational risk given China's hostile crypto regulatory posture
Collapse Scenarios
Admin key compromise / centralized custody failure
ElevatedCEO or singular infrastructure operator is compromised, arrested, coerced, or acts maliciously — gaining effective control over all MPC signing keys
Ronin bridge hack (March 2022) — $625M stolen via compromised validator keys; Harmony Horizon bridge (June 2022) — $100M stolen via 2-of-5 multisig compromise
Cryptographic implementation failure in MPC scheme
ModerateFlaw in SMPC implementation allows private key reconstruction from on-chain signatures, similar to the July 2021 ECDSA k-value reuse vulnerability
Anyswap V3 ECDSA exploit (July 2021) — $7.9M stolen using same R-value vulnerability, a flaw known since 2010
Chinese regulatory shutdown freezing all operations
ModerateChinese authorities arrest team members or seize infrastructure hosting MPC nodes, rendering the bridge inoperable
China crypto ban (2021) forced migration of mining operations; multiple Chinese crypto executives arrested in 2022-2023 crackdowns
See how today's protocols score
The same 8-dimension rubric applied to 672+ live protocols.