AI x Crypto Security: Where the Attack Surface Is Shifting
The conventional read on crypto security is still circa-2022: smart-contract bugs are the dominant exploit vector, audits are the dominant defense, and protocols stand or fall on their code. Two developments in 2026 are forcing a recalibration. AI-assisted auditing has compressed the cost of finding subtle contract bugs on actively-maintained code, and AI-assisted offensive capability (Anthropic's Mythos Preview, released to a curated set of "systemically important" companies via Project Glasswing in May 2026, solved a 32-step / ~20-human-hour corporate-network attack simulation end-to-end without supervision) has compressed the cost of attacking everything else: frontends, signing UX, RPC infrastructure, dev credentials, browsers, and humans. The empirical record of the last 18 months already reflects the new shape. Three of the largest crypto loss events in that window (ByBit / Gnosis Safe, Resolv / Morpho, Kelp / LayerZero) were not contract bugs in the protocol whose name is in the headline. They were attacks on the surrounding infrastructure. This piece argues the shift is real, walks the three case studies, and specifies how TI's risk framework is recalibrating in response.
The Pattern, Stated First
Crypto's risk surface has three layers, each with a different cost curve to attackers. Layer 1 is the protocol's own contracts: well-audited, often formally verified, increasingly fed through AI-assisted review pipelines. Layer 2 is the infrastructure the protocol depends on but does not own: bridges, RPCs, oracles, frontends, build pipelines, signing UX, dev credentials. Layer 3 is the human surface: governance forums, founder identity, incident-disclosure channels, support staff.
Through 2024, Layer 1 was the cheapest attack vector and the dominant loss class. AI changes the relative economics. Layer 1 cost rises (audit quality up, hidden bug discovery probability down), while Layer 2 and Layer 3 costs fall (AI helps draft convincing fake frontends, find RPC misconfigurations, surface dev-credential leaks at scale, and produce deepfake-quality team impersonations). The aggregate "crypto security risk" headline can stay flat while the composition underneath rebalances completely.
Three different protocols, three different layers of the dependency graph, three different exploit techniques. None were Layer 1 contract bugs in the named protocol. The pattern is consistent enough that it should be the default reading of "crypto exploit" headlines from here forward, until proven otherwise: the headline names the asset that lost the money, and the actual attack lives somewhere else in the stack.
Case 1: ByBit / Gnosis Safe (February 2025)
The largest single crypto theft on record at the time of the incident drained ~$1.5B in BTC-equivalent from a ByBit cold wallet. The cold-wallet contract was a Gnosis Safe multisig. The Safe contract operated correctly. Multiple multisig signers reviewed the transaction in their wallet UIs and approved it. The transaction signed against a malicious payload that did not match the transaction shown in the frontend.
The attacker compromised the Gnosis Safe frontend infrastructure (build pipeline or hosting layer) and served the targeted ByBit signers a frontend that displayed an expected transaction in the UI while constructing a different one in the signing payload. Because the multisig flow requires the signer to confirm in the wallet (which displays a hash of the calldata, not a human-readable interpretation), the attack succeeded against signers practicing operational security at industry-standard levels.
The takeaway is structural. Smart-contract security is necessary and not sufficient. Once the signing UX surface is compromised, the strength of the underlying contracts becomes irrelevant: the contracts are doing what the signers told them to do, the signers were lied to about what they were telling them. AI-era attackers can convincingly clone signing UIs, intercept build pipelines, target specific high-value signers via deepfake-augmented social engineering, and serve region-specific or user-specific malicious bundles. The economic case for attacking the frontend layer was strong before AI; AI lowers the technical barrier to running the attack at scale.
TI's calibration in response: the Frontend Contract Consistency check on the methodology page is upgraded from binary pass/fail to a graded sub-criterion that scores transaction-preview infrastructure (does the signing UI surface a human-readable interpretation of the call), content integrity (subresource integrity hashes, signed bundles), and build-pipeline access controls.
Case 2: Resolv / Morpho (March 22, 2026)
An attacker spent ~$200K of capital to compromise a single offchain signing key tied to USR mint authority and minted 80 million unbacked USR tokens. The key had no onchain validation gating its use. That piece of the incident was a Layer 2 operational-security failure: a single EOA, in custody of a single team member, with no multisig or hardware-isolation requirement, controlling unbacked-mint authority on a synthetic stablecoin.
The cascade that followed was Layer 1 + Layer 2 in the formal sense (the contracts did exactly what they were specified to do, but the specification interacted poorly with stress conditions). USR's NAV-based oracle updated once per 24 hours. After the unbacked mint, the oracle continued to faithfully report the pre-exploit collateral-to-supply ratios for hours: RLP oracle read $1.29 while the market cleared at $0.52; USR oracle read near $1.00 while Curve pools showed $0.025. Secondary borrowers, uninvolved in the original exploit, rationally borrowed USDC against oracle-inflated USR collateral. Public-allocator vaults (including Gauntlet-curated Morpho markets) treated the resulting 100% utilization as a yield signal and continued supplying USDC into the affected markets for hours after the exploit was visible onchain. Bad debt before auto-allocator inflows: roughly $4,900. Bad debt after: ~$3.8M across Morpho markets, $8.9M total exposed.
The takeaway: a single offchain key tied to high-value mint authority is the same risk-class as a single-DVN bridge. AI lowers the marginal cost of the front-end social engineering and credential-extraction needed to compromise such keys, which means protocol-side controls (hardware isolation, multisig requirement on mint authority, onchain rate-limits on mint ceilings) need to scale up to compensate.
TI calibration: oracle-update cadence on stress-correlated collateral is now an explicit Oracle dimension sub-criterion. Auto-allocator stress-conditionality is now an explicit Liquidity dimension sub-criterion. Single-EOA mint authority on synthetic stables is now a hard floor-raiser on Admin Architecture regardless of how well-audited the contracts are.
Case 3: Kelp / LayerZero / Aave (April 18, 2026)
Attackers drained 116,500 rsETH (~$290M) from Kelp's LayerZero-powered cross-chain bridge by compromising a single DVN verifier path in a 1-of-1 configuration. The technical attack: obtain root access to LayerZero Labs' DVN RPC infrastructure, replace the op-geth binary on two of three nodes, and DDoS the uninfected third. A failover to the compromised nodes let the DVN attest a forged "burn" message claiming 116,500 rsETH had been burned on Unichain. The burn never happened: Unichain's outbound nonce stayed at 307 while Ethereum accepted nonce 308. The OFT Adapter on Ethereum released the funds as instructed.
The attacker then deposited 89,567 of the stolen rsETH (~76.9%) as collateral on Aave V3 across Ethereum and Arbitrum, borrowing 82,650 WETH and 821 wstETH (~$193M combined) in real ETH-denominated liabilities. Aave absorbed the second-order loss. Per LlamaRisk's two scenarios, Aave's bad-debt exposure runs ~$124M (Scenario 1, losses concentrated on L2 rsETH) to ~$230M (Scenario 2, losses spread across L1 + L2). The Arbitrum Security Council froze $71.5M of the attacker's ETH on-chain using the first invocation of ArbitrumUnsignedTxType, which may offset either scenario.
The structural finding from this case is the one most relevant to AI-era recalibration. BGD Labs flagged the single-DVN risk during rsETH listing review in February 2025 and recommended a multi-DVN configuration. The recommendation was not adopted. Aave accepted rsETH at up to 95% e-mode LTV without scoring the bridge's DVN security posture as part of the listing decision. This means the protocol's own contracts and risk framework can be best-in-class, and the protocol still loses if its dependency graph contains an unhardened messaging-layer link. Per Dune's LayerZero OApp Configuration dashboard, roughly 32% of LayerZero OApps were running 1-of-1 DVN configurations at the time of the incident. The same vulnerability shape sits across a meaningful fraction of cross-chain DeFi.
The AI-era angle: a 32-step network attack benchmark like Mythos's TLO maps directly onto this exploit shape. Multi-step targeting of an RPC provider, root access escalation, binary replacement, DDoS coordination, and forged-message construction is exactly the shape of attack AI capability is now compressing in cost. Defaults that already would not survive a sophisticated human team will not survive AI-augmented attackers either.
TI calibration: the Cross-Chain Messaging Posture check is now elevated in dimension weight. Default LayerZero V2 OApp Quickstart configurations carry a one-letter floor penalty regardless of how well the consuming protocol scores on other dimensions. RPC and node-provider diversification is now scored as concentration risk on parity with single-DVN messaging.
The Risk-Surface Shift, Stated Explicitly
The framework calibration that follows from these three cases is summarized below. Net protocol grades may not move materially in either direction; the composition of those grades is what changes.
AI-augmented audits + active maintenance lower hidden-bug residual
Dev credentials, signer custody, build pipeline integrity
Higher confidence on critical fund-handling contracts
ByBit-class attacks become economic at lower target sizes
Better tooling for impact analysis on proposed upgrades
1-of-1 DVN + default RPC configurations actively dangerous
Discovery economics inverted by AI-assisted review
Low-TVL legacy contracts now cheap to exploit
Generic phishing yields a predictable baseline rate
Founder/team impersonation against high-value signers
Direction of arrows reflects TI's calibration as of May 2026. Magnitudes vary by protocol; the shape of the rebalance matters more than any single weight change.
Three caveats. First, the Layer 3 prerequisite logic is unchanged: code-integrity must be cleared before parametric tuning is worth doing. AI is a multiplier on the existing framework structure, the structure stays. Second, the asymmetry favors defenders only in actively-maintained code. Legacy contracts, embedded systems, IoT-class hardware, and unmaintained services are the opposite case: AI capability widens the attacker advantage there. Third, intelligence-agency policy on vulnerability disclosure (the "equities process," whether to patch or hoard discovered exploits) skews toward patching when foreign threat actors can reasonably reach a discovered exploit. AI-augmented foreign actors raise the patch threshold floor. The defensive ecosystem benefits, with a lag.
What to Watch, Specific Indicators
Five concrete watch items that follow from the framework above:
- LayerZero 1-of-1 OApp share trend. Per Dune, ~32% of OApps were on 1-of-1 DVN at the time of the Kelp incident. LayerZero has announced it will no longer sign messages for apps on single-DVN configurations, forcing migration. Watching the migration curve over the next 90 days is the cleanest single indicator of how fast cross-chain DeFi is hardening against the post-AI threat model.
- Frontend integrity standards adoption. Subresource integrity hashes, signed bundles, transaction-preview tooling that surfaces human-readable calldata interpretation. Today these are not standard. The first major DeFi frontend that ships them in a way users can verify becomes the new default; everything older becomes a relative-risk outlier.
- Auto-allocator stress conditionality. Public allocators that treat 100% utilization as pure yield, without a deteriorating-collateral guard, are wrong-way allocation by design. The Resolv / Morpho cascade was generated by automated capital inflows after stress was already visible onchain. The next allocator that publishes documented stress-conditional behavior raises the bar for the cohort.
- AI-era audit signaling. Whether top auditors (Trail of Bits, Spearbit, OpenZeppelin, Cantina) publish methodology updates incorporating AI-assisted review. The absence of an updated methodology by the back end of 2026 is itself a signal that the audit market has not adjusted to the new economics.
- Anthropic Project Glasswing scope expansion. Currently Mythos-class capability is restricted to systemically important tech companies. If access broadens to security firms beyond the Glasswing-eligible set, the symmetric defender advantage strengthens. If it stays narrow, the advantage compounds for the Glasswing cohort and for whichever attacker capability proliferates outside Anthropic's governance perimeter first.
Closing Thoughts
The conventional 2022-era reading of crypto security (smart-contract bugs are the dominant exploit, audits are the dominant defense) is increasingly out of date. The empirical record of 2025 to 2026 says the named protocol's contracts ran correctly during most of the largest loss events; the exploit lived in the surrounding stack. AI capability accelerates this composition shift: smart-contract risk on actively-maintained code re-rates lower, infrastructure and operational-security risk re-rates higher, and the long-tail of unmaintained contracts re-rates higher still.
For TokenIntel users, the practical translation is that "the protocol has good audits" is no longer a sufficient comfort signal. The questions that matter from here forward are about the dependency graph: who runs the bridge, who runs the RPCs, who custodies the offchain mint keys, what does the signing UX show, who has access to the build pipeline. These were always real questions. AI capability raises the cost of getting them wrong by a margin that previously did not exist.
This is not an argument that crypto becomes more dangerous in net terms. The defender side gains too: AI-assisted auditing on top names is genuinely better than the 2022 baseline. The argument is that the shape of risk is changing, the weights inside our framework need to track that shape, and the risk-arrays on every TI research page from this point forward will reflect the recalibration described above.