Crypto’s obsession with transparency has given attackers a detailed map of the building.

There is a certain faith embedded in the architecture of decentralized finance: that openness, by itself, is a safeguard. Post the collateral on-chain. Expose the positions. Wire the liquidations into code and let anyone inspect the machine. Proponents argue that verifiability is the whole point, that sunlight, in finance as in politics, is the best disinfectant.

Two incidents from April suggest the doctrine deserves rather more scrutiny than it typically receives.

On April 18th, Aave’s guardian froze markets linked to rsETH and wrsETH after an attacker drained roughly 116,500 rsETH (about 18% of circulating supply, valued at approximately $292 million) from KelpDAO’s LayerZero-powered bridge. The stolen tokens were promptly redeployed as collateral to borrow assets from Aave. Governance discussions now put the attacker’s outstanding borrow at around 126,000 ETH, with the protocol’s bad debt growing as ETH appreciates: the shortfall is fixed in ETH terms while the backstops are largely dollar-denominated.

AAVE’S CORE LOGIC WAS NEVER TOUCHED. AND IT DIDN’T NEED TO BE.

That sequence is instructive. Public composability, the very feature that allows DeFi protocols to interlock so elegantly in bull markets, becomes a transmission mechanism for damage in bad ones. Collateral posted in one system became a balance-sheet problem in another. Lenders with no direct exposure to the bridge repriced their risk and pulled capital anyway. Infrastructure that is interoperable by design is also, by design, indiscriminate about what it carries.

Drift, which lost somewhere between $270 million and $285 million earlier this month, illustrates a related but distinct vulnerability. The attack did not exploit a straightforward contract bug. According to reporting by CoinDesk and analysis from BlockSec, it turned on Solana durable nonces and multisig approval manipulation: pre-signed approvals that remained valid long enough for the attacker to seize administrative control. The protocol’s governance and control structures were public, structured and machine-readable. They were also, in that sense, a gift.

Considered together, the two episodes reveal a pattern the industry has been reluctant to name directly. In one case, visible composability transmitted upstream failure into downstream credit markets. In the other, legible operational logic was studied, mapped and used against its own designers. The weak point in both instances was not sloppy code. It was the assumption that making a system readable to everyone makes it safer for everyone.

This is where the standard arguments for radical transparency start to strain. Markets do require verification. They need audit trails, observable claims on assets and mechanisms for holding counterparties accountable. What they do not obviously require is the continuous, real-time publication of live operating detail: collateral flows, liquidation triggers, signer structures, governance pathways, all of it available to anyone with the patience to read it and the motivation to push on what they find.

Serious credit markets have long understood the distinction. Counterparties, auditors and regulators receive what they need to assess risk and verify control. The rest is not broadcast. The reasoning is not sinister; it is practical. A borrower managing size cannot narrate every treasury move and defensive repositioning without inviting predation. A lender cannot publish every trigger condition and control route without turning its own safeguards into part of the attack surface.

For institutional participants, including treasury teams, boards and risk committees, this is not a philosophical argument. It is an operational one. Embedding public infrastructure dependencies into a product by design, and then treating the resulting exposure as unforeseeable, is not a defensible posture. Nor is describing a protocol’s governance architecture as an internal matter after that architecture has been available for inspection on a public blockchain for months.

Opacity, properly understood, is not the enemy of accountability. It is a control in its own right. Selective disclosure can preserve verifiability where it matters, covering positions, reserves and solvency, while withholding the live operational detail that turns a protocol’s own architecture into a weapon. The Aave spillover and the Drift exploit both point in the same direction. What should be verifiable should be. What can be weaponized probably should not be on public display by default.

Transparency made crypto legible. It also made it considerably easier to find the weak points and exploit them.

April 19, 2026

4 minutes Read

The Perils of the Glass House