From LayerZero to Chainlink: Why Are $4 Billion in Assets Rethinking Their Cross-Chain Strategy?

Markets
更新済み: 2026/05/18 06:55

Cross-chain interoperability protocols form the backbone of DeFi operations. As assets move across dozens of blockchains, they rely on underlying cross-chain messaging systems. However, when the security of these systems comes into question, the entire ecosystem of applications built on top becomes vulnerable.

In Q2 2026, the crypto industry is experiencing an unprecedented "rail switch" in cross-chain infrastructure. Leading protocols and institutions—including Lombard Finance, Solv Protocol, Kraken, and others—have announced migrations from LayerZero to Chainlink’s Cross-Chain Interoperability Protocol (CCIP), with assets totaling roughly $4 billion transferred. These moves are not only reshaping the competitive landscape of cross-chain solutions, but also raising a central question: As DeFi infrastructure increasingly becomes a layer for systemic risk, what is driving protocols to choose sides differently?

Event Overview and Migration Landscape

The Catalyst: An Attack Triggering Industry-Wide Repercussions

On April 18, 2026, Kelp DAO—a liquid restaking protocol—suffered an attack on its LayerZero-based cross-chain bridge, resulting in losses of approximately $292 million and involving 116,500 rsETH tokens. The attacker "poisoned" internal RPC nodes, hijacked the decentralized verification network (DVN) process, then minted large quantities of unsupported tokens on the target chain and cashed them out in lending markets.

The uniqueness of this incident lies in the attack vector: it didn’t exploit smart contract code vulnerabilities, but instead compromised the verification layer of the cross-chain infrastructure. Polygon co-founder Sandeep later wrote that most current cross-chain infrastructure security models essentially function like a "notary office"—a small committee monitors activity on one chain and attests to it on another. If this committee or its underlying data is compromised, the entire verification system collapses.

Disputes Over Responsibility

After the attack, LayerZero and Kelp DAO engaged in weeks-long debates over responsibility. LayerZero initially attributed the incident to Kelp DAO’s use of a "1-of-1" single validator configuration, calling it an application-layer misconfiguration. Kelp DAO countered, stating that this setup had received explicit approval from LayerZero team members, providing Telegram chat records as evidence.

On May 9, 2026, LayerZero issued a public statement admitting to "making a mistake"—allowing its own verification network to safeguard high-value assets under a vulnerable configuration. The team also announced it would discontinue support for 1-of-1 DVN setups and migrate default routing to a stricter 5-of-5 validator configuration.

Migration Timeline and Asset Scale

Despite the public apology, clients continued to leave. Within weeks of the attack, a series of migration announcements ensued:

Date Protocol/Institution Asset Scale Migrated Key Information
Early May 2026 Kelp DAO ~$1.5 billion TVL Migrated rsETH cross-chain routing to CCIP
May 7, 2026 Solv Protocol ~$700 million tokenized Bitcoin Includes SolvBTC and xSolvBTC, spanning four blockchains
May 8, 2026 Re.xyz ~$475 million TVL Switched reUSD cross-chain solution to CCIP
May 14, 2026 Kraken kBTC and future wrapped assets Designated CCIP as sole cross-chain infrastructure option
May 15, 2026 Lombard Finance Over $1 billion in Bitcoin collateral Includes LBTC and BTC.b, fully deprecating LayerZero

Data Source Note: The migration figures above are aggregated from public disclosures by each protocol, totaling approximately $4 billion.

Lombard’s migration is especially significant in Bitcoin DeFi. The protocol’s core product, LBTC, is a liquid staked Bitcoin token, meaning assets flowing through its cross-chain bridge are backed by the largest crypto asset by market cap. Lombard co-founder Jacob Phillips stated that internal security reviews showed Chainlink CCIP delivers "the highest level of cross-chain security in the industry."

Asset Flows and Technical Rationale Behind the $4 Billion Migration

Composition and Distribution of Migrated Assets

This migration wave covers around $4 billion in assets across multiple DeFi segments. In terms of asset types, liquid restaking derivatives (such as rsETH), tokenized Bitcoin products (like SolvBTC, LBTC, BTC.b), and wrapped assets (such as kBTC) make up the bulk of the migration. These assets share key characteristics: high value density, frequent cross-chain transfers, and minimal tolerance for security lapses.

From a chain coverage perspective, target chains include Solana, Etherlink, Berachain, Corn, TAC, among others. Some protocols (like Lombard) have completely ceased using LayerZero on Ethereum Layer 2 networks such as Morph and staking protocols like Swell.

Architectural Differences Between Two Technical Approaches

Migrating parties widely cite CCIP’s security architecture as the main reason for their choice. The following table outlines the key technical differences between the two protocols:

Comparison Dimension LayerZero (OFT) Chainlink CCIP
Verification Model Modular DVN, customizable at application layer Decentralized Oracle Network (DON) dual architecture, independent validation
Security Design Relies on application-layer validator selection (can be as low as 1/1) Separation of submit DON and execute DON + proactive Risk Monitoring Network (RMN)
Critical Weakness Single point of failure possible with sparse DVN configuration Multi-layer defense, built-in rate limiting
Compliance Module No public certification records Holds both ISO 27001 and SOC 2 Type II certifications
Operational Scale Total bridged assets ~$44 billion Total on-chain transaction value exceeds $28 trillion

These technical differences were starkly highlighted by the Kelp DAO attack. Post-incident research found that 47% of LayerZero omnichain applications (OApp) still use the same 1-of-1 DVN configuration, exposing over $4.5 billion in risk. Tether’s omnichain stablecoin USDT0 is the largest risk exposure, with deployments on Ethereum, Optimism, and Base all using this configuration.

CCIP’s architecture divides cross-chain transactions into two independent stages—submission and execution—supported by an independent proactive risk monitoring network that can quickly pause the protocol upon detecting abnormal activity. Cliff White, VP of Engineering at Re.xyz, noted that CCIP’s 16 independent validator nodes and built-in rate limiting were crucial security factors in their migration decision.

LayerZero’s modular DVN was designed to give application developers control over security choices, but this flexibility led some apps to opt for lower-security setups. This is more a governance issue than a purely technical one. As security researchers have pointed out, it’s a "governance problem" rather than a simple technical flaw. Chainlink CCIP, by contrast, embeds high security standards at the protocol level, reducing reliance on application-layer configurations—each approach reflects a different design philosophy with its own trade-offs.

Industry Impact Analysis: Rebuilding Trust and Repricing Systemic Risk

Cross-Chain Security: From Optional to Essential

The most profound impact of this migration wave is elevating cross-chain infrastructure security from a technical option to a core variable in business decisions. Before the Kelp DAO attack, cross-chain protocol selection often depended on cost, speed, and ecosystem coverage. Afterward, security architecture, independent audits, and compliance modules moved to the forefront of decision-making.

Lombard’s migration announcement specifically highlighted not only adopting CCIP, but also deploying its own "security alliance" as an additional verification layer. This dual-insurance model—"infrastructure + protocol-built security layer"—is becoming standard practice for high-value asset protocols.

Systemic Risk Attributes of Cross-Chain Bridges

The Kelp DAO incident revealed a broader industry reality: cross-chain bridges are no longer peripheral infrastructure, but have become the primary layer for systemic risk in DeFi. According to post-mortem data, the attacker borrowed over $236 million in assets on Aave, turning losses from a single protocol into bad debt pressure across the entire lending market. On-chain data shows about 30,765 ETH (worth roughly $71 million at the time) was frozen on the Arbitrum network, prompting Aave to initiate legal proceedings.

This chain reaction confirms a shift in DeFi risk management paradigms—from focusing solely on smart contract audits to comprehensive evaluations of the entire interoperability infrastructure and its risk transmission pathways.

Concentration Risk Discussion Around CCIP

With roughly $4 billion in assets flowing into CCIP, market attention is now turning to concentration risk. Chainlink reports that CCIP has supported over $28 trillion in cumulative on-chain transaction value, handling an average of $90 million in weekly cross-chain token transfers. However, as a cross-chain protocol carries more assets, it itself can become the next systemic risk node—should an issue arise, the impact could scale exponentially.

This discussion is still in its early stages. CCIP’s multi-layer security architecture and independent RMN mechanism currently provide the industry’s highest level of protection, but the reality of concentration risk means the market must continually balance efficiency against risk dispersion.

Conclusion

The migration of approximately $4 billion in assets may seem like a simple switch of infrastructure providers, but it fundamentally reflects the crypto market’s repricing of "security premium." Against the backdrop of frequent cross-chain bridge security incidents—three major attacks in just three weeks in April 2026, with cumulative losses exceeding $570 million—the choice of infrastructure is no longer just a matter of technical merit, but has become a calculation of survival probability.

From an industry development perspective, this process brings short-term pain but also drives an overall upgrade in cross-chain security standards. Regardless of which technical approach ultimately prevails, the industry has established a new consensus baseline: infrastructure supporting the transfer of billions of dollars in assets must feature multi-layer, independently verifiable security architectures—not reliance on any single validator entity.

The content herein does not constitute any offer, solicitation, or recommendation. You should always seek independent professional advice before making any investment decisions. Please note that Gate may restrict or prohibit the use of all or a portion of the Services from Restricted Locations. For more information, please read the User Agreement
コンテンツに「いいね」する