Wormhole (Backtest Jan 2022)
Attacker exploited a signature verification vulnerability in the Solana-side Wormhole contract, forging a VAA to mint 120,000 wETH without depositing collateral on Ethereum. The verify_signatures function did not validate that the instruction sysvar account was the real sysvar, allowing the attacker to substitute a fake sysvar with pre-set valid signatures, bypassing the 13/19 guardian threshold entirely.
What Hindenrank Would Have Said
As of January 1, 2022
“Elevated risk — novel cross-chain messaging architecture with billions in locked collateral, a young track record, and high-complexity signature verification across multiple chains, partially offset by reputable guardian operators and strong growth trajectory.”
Scenario Predicted the Failure Mode
The C- grade (56/100) did not cross the D+ threshold for a high-risk flag. However, our collapse scenario analysis predicted the exact failure mode that occurred.
Flagged by dimensions: Mechanism Novelty, Interaction Severity, Oracle Surface, Track Record, Scale Exposure
One or more collapse scenarios directly matched the actual failure mode.
Top Risks Identified
- 1.Cross-chain signature verification on Solana uses a split instruction pattern due to compute limits, where VAA signatures are verified across multiple transactions — if the verification chain can be bypassed or spoofed, an attacker could forge valid-looking VAAs to mint unbacked wrapped tokens worth billions
- 2.The lock-and-mint architecture concentrates ~$3-4B of locked collateral across bridge contracts on multiple chains, creating a massive honeypot where a single vulnerability in any chain's contract could drain the entire bridge's reserves on that chain
- 3.Guardian network operates with a 13-of-19 proof-of-authority threshold — while guardians are reputable validators (Certus One, Chorus One, Figment, P2P), the permissioned set means compromise or collusion of 13 entities could produce fraudulent attestations for arbitrary cross-chain messages
- 4.Protocol has been live for less than 6 months in its current V2 form (launched August 2021), with complex multi-chain contract deployments across Solana, Ethereum, BSC, and Terra that have had limited time for organic battle-testing at current TVL levels
Collapse Scenarios
Signature Verification Bypass Leading to Unbacked Wrapped Token Mint
ElevatedAn attacker discovers a flaw in the Solana-side split signature verification (verify_signatures) that allows forging or bypassing the 13/19 guardian signature threshold — for example, by spoofing the instruction sysvar account or exploiting the multi-instruction verification chain to mark signatures as valid without actual guardian attestation
Poly Network exploit (August 2021) demonstrated that cross-chain bridge contract vulnerabilities can enable unauthorized minting/transfers of hundreds of millions of dollars. ChainSwap exploit (July 2021) showed that signature verification flaws in bridge contracts can allow attackers to forge authorization for cross-chain transfers.
Guardian Collusion or Key Compromise Draining Bridge Reserves
Moderate13 or more of the 19 Wormhole guardian private keys are compromised through coordinated attack on guardian infrastructure, social engineering, insider collusion, or a state-level actor targeting guardian entities (Certus One/Jump Crypto, Chorus One, Figment, P2P, etc.)
Ronin bridge exploit demonstrated that validator key compromise on a proof-of-authority bridge can result in hundreds of millions in losses. The Ronin bridge had a 5-of-9 validator threshold and 4 validators were controlled by a single entity, enabling the attacker to compromise just one additional validator to drain $625M.
Chain-Specific Contract Exploit via Multi-Runtime Implementation Gap
ModerateA vulnerability is discovered in one chain's Wormhole contract implementation (Solana Rust, EVM Solidity, or Terra CosmWasm) caused by semantic differences between runtimes, chain-specific features, or implementation-level bugs in translating the same logic across different programming languages
The Poly Network exploit (August 2021, $610M) exploited a cross-chain message verification flaw that was chain-specific. This demonstrated that multi-chain implementations with different contract runtimes create semantic gaps that attackers can exploit.
See how today's protocols score
The same 8-dimension rubric applied to 672+ live protocols.