Markets
BTC
ETH
SOL
XRP
BNB
ADA
DOGE
MCap
BTC
ETH
SOL
XRP
BNB
ADA
DOGE
MCap
Markets

Wasabi Protocol Lost $4.55 Million Because One Wallet Held the Admin Role for the Whole System

Wasabi Protocol's deployer EOA held the only ADMIN_ROLE for the entire permission system, and an attacker drained roughly $4.55 million from perp vaults across four chains. The vulnerability was governance, not code.

By Sarah Blake··3 min read
Wasabi Protocol Lost $4.55 Million Because One Wallet Held the Admin Role for the Whole System

Key Points

  • Wasabi Protocol's deployer EOA held the only ADMIN_ROLE for the entire permission system, and an attacker drained roughly $4.55 million from perp vaults across four chains.
  • The vulnerability was governance, not code.

One Ethereum address called wasabideployer.eth held the only ADMIN_ROLE in Wasabi Protocol's permission system on Thursday morning. By the afternoon, an attacker held it instead — and roughly $4.55 million of users' deposits had been routed out of the protocol's perpetual vaults across four chains.

The Electric Capital-backed perpetuals platform confirmed the breach in a series of posts after security firm Blockaid first flagged a suspicious upgrade transaction in the early hours of April 30. The mechanics are almost embarrassingly clean. Whoever controls wasabideployer.eth could call grantRole on Wasabi's permission contract and hand themselves admin rights with no delay. From there, the attacker pushed a helper contract that upgraded Wasabi's perp vaults and Long Pool to malicious implementations and drained the balances. There was no oracle manipulation, no flash loan, no exotic cross-chain trick — just a single externally owned account with too much authority and no timelock standing between it and the money.

The damage is multi-chain. On Ethereum, the compromised contracts were Wasabi's wWETH, sUSDC, wBITCOIN, wPEPE and Long Pool vaults. On Base, the attacker hit the sUSDC, wWETH, sBTC, sVIRTUAL, sAERO and sBRETT vaults. Funds also moved across Berachain and Blast deployments. Wasabi told users to revoke approvals immediately, and within hours the attacker began consolidating the loot through standard laundering rails.

Advertisement

728×90

What makes this drain instructive — and depressing — is that nothing about it required a sophisticated adversary. Wasabi's contracts were not buggy. The math worked. The vulnerability was governance, not code: a single private key controlling a role that should never sit on a hot wallet. There was no multisig requiring multiple signers, no timelock forcing a delay between a malicious upgrade being queued and executed, no on-chain alarm to wake up the team before vaults flipped. Every one of those mitigations is a checklist item in any post-2022 DeFi security review. Wasabi shipped without them anyway, and roughly $4.55 million walked out the door before anyone noticed.

The protocol raised a $3 million seed round in 2024 led by Electric Capital, with backers including Alliance, Memeland, and Pudgy Penguins CEO Luca Netz. Token incentives and venture money have flowed liberally into perpetuals trading on the assumption that the next Hyperliquid is hiding somewhere in the long tail. Audits and operational discipline have not flowed at quite the same rate. The Wasabi compromise will not be the last reminder that perp DEXs sit on top of the same custody model as a centralised exchange — they pool user collateral into vaults, and whoever can authorise contract upgrades can authorise the vault to be emptied.

DeFi protocols have lost more than $770 million to exploits in 2026, and that figure was already swollen before Wasabi added itself to the ledger. Most of the headline damage has come from infrastructure attacks — compromised RPC nodes, social engineering of validator sets, single-point-of-failure bridges. The basic admin-key compromise has never gone away. It killed Multichain in 2023; it nearly killed several smaller protocols last year; it just took a chunk out of Wasabi.

There are two questions a serious risk team will ask about Wasabi this week. The first is whether the team can claw back any of the funds — possible if exchanges co-operate quickly, unlikely if the attacker has any patience. The second, harder question is why a protocol with venture backing and a multi-chain footprint was running production governance off a deployer EOA in 2026 at all. The answer, almost always, is that someone built the contracts in a hurry, never planned for the protocol to grow this large, and never went back to harden the privilege model once the deposits started flowing in. By the time the post-mortem gets written, the money is already laundered.

Wasabi has said it will compensate affected users, though it has not yet specified how or to what extent. The team has paused trading and revoked the compromised contracts. None of that addresses the underlying lesson, which is the same lesson the Aave-led $303 million DeFi United coalition is currently trying to extract from Kelp DAO and that Tropykus drew last week from its own audit: the security model of a DeFi protocol is whatever its weakest privilege check happens to be, and a single signer with full upgrade authority is barely a privilege check at all.

The attacker's wallet is now visible on every blockchain analytics dashboard tracking the heist. Investors in Wasabi's vaults are not, because their balances no longer exist on chain.

MiningPool content is intended for information and educational purposes only and does not constitute financial, investment, or legal advice.

Advertisement

728×90

Related Stories

THORChain Lost $10.7 Million to a GG20 TSS Exploit on May 15 — Three Days Later Verus's Bridge Was Drained for $11.58 Million the Same Way Wormhole Was
Markets

THORChain confirmed on May 15 that one of its six Asgard vaults was compromised for roughly $10.7 million via a GG20 threshold-signature key-leak; on May 18, Blockaid flagged an $11.58 million drain on the Verus-Ethereum bridge caused by the same class of source-destination value-binding gap that broke Wormhole and Nomad in 2022.

·Tom Chen
Vitalik Buterin Says AI-Assisted Formal Verification Could Be the 'Final Form' of Secure Software — Even as AI Makes Hacking Easier
Tech

Ethereum's co-founder published a long essay on Sunday arguing that machine-checkable mathematical proofs, generated and verified by AI, could become the foundational security layer for blockchains, cryptography and critical internet infrastructure — even as the same AI capabilities accelerate vulnerability discovery on the offence side.

·Aubrey Swanson

Stay informed

Verifiable crypto journalism, delivered to your inbox.

Weekday mornings. No hype. No financial advice. Just what happened and why it matters.

No spam. Unsubscribe anytime. Read our privacy policy.