April 17, 2026
Detections

How Three Compounding Failures Let an Attacker Mint $1.2B in Bridged Tokens

The Hyperbridge exploit exposed what happens when a cross-chain bridge has no hard limits between proof verification and unrestricted minting authority.

Hypernative

On April 13, an attacker forged a cross-chain message through Polkadot's Hyperbridge protocol, seized minting authority over a bridged DOT token contract, and minted 1B tokens in a single transaction.

Cross-chain bridges were the defining vulnerability class of 2022, when exploits on Ronin, Wormhole, and Nomad collectively drained more than $1B. A new generation of bridges, Hyperbridge among them, replaced multisig committees with cryptographic proof verification, promising security equivalent to the underlying chains. The latest exploit raises an uncomfortable question about whether the new architectures have closed the structural gaps or simply moved them.

This was not a private key compromise or a social engineering attack. Three independent security failures in proof verification, message validation, and access control compounded into unrestricted control. Any one of them being absent would have stopped the exploit. All three were open.

What is Hyperbridge and why the stakes were higher than $237,000

Hyperbridge is a cross-chain interoperability protocol built on Polkadot by Polytope Labs, launching on Polkadot mainnet in November 2024 with native support for Ethereum, Optimism, Arbitrum, Base, BNB Chain, and Gnosis, later adding Polygon.

The protocol's design thesis is explicit: replace the multisig committees that have historically controlled bridge infrastructure with cryptographic proof verification. Hyperbridge uses zk-light clients and storage proofs to authenticate cross-chain messages, positioning itself as offering security equivalent to the blockchains it connects. Polkadot designated it as the ecosystem's native interoperability layer in April 2025, and a 795,000 DOT (~$3M) liquidity incentive campaign deployed bridged DOT into Uniswap V4 pools across Ethereum, Arbitrum, Base, and BNB Chain. As of February 2026, the protocol had processed over $300 million in cross-chain volume.

The dollar figure of this exploit, $237,000, understates its significance. Hyperbridge holds admin-level control over bridged token contracts on destination chains. A validation failure in its proof pipeline does not just drain a pool. It grants the ability to mint unlimited supply of any token the gateway manages. The attacker demonstrated this by inflating bridged DOT supply to approximately ~1.16×10⁵⁹tokens. The same vulnerability class, targeting a token with deeper liquidity, would have produced a fundamentally different outcome.

How the attack unfolded

The malicious actor began with a $500 transaction testing the exploit logic about 15 minutes before the main attack, targeting the Hyperbridge's HandlerV1 contract. The Hypernative platform flagged the deployer and the deployed contract  as suspicious, giving the first sign of the impending exploit.

At 03:55 UTC on April 13, 2026, the attacker deployed a pair of purpose-built contracts and executed the full exploit in a single transaction. The attack moved through four stages:

  • Forged proof submission. The attacker submitted a forged ISMP (Interoperable State Machine Protocol) state proof to Hyperbridge's HandlerV1.handlePostRequests() function. The VerifyProof() function failed to check that the leaf_index parameter was less than leafCount, allowing the MMR calculation to skip the requested commitment entirely. The attacker recycled data from a previously legitimate transaction to construct a proof that passed verification without binding to any real cross-chain state.
  • Administrative takeover. The forged message carried a ChangeAssetAdmin action, routed through TokenGateway.onAccept(), transferring admin and minter privileges on the bridged DOT token contract to the attacker. The EthereumHost contract's challengePeriod (a built-in fisherman dispute window designed to allow forged state commitments to be challenged before becoming actionable) was set to zero, meaning the protocol's own defence against exactly this class of attack was disabled. No secondary authorisation or confirmation was required. Legitimate governance functionality, accessed through a forged proof, was sufficient for complete control.
  • Unlimited minting. With minter privileges, the attacker minted 1,000,000,000 DOT against a circulating supply of approximately 356,000 tokens. No supply cap or inflation limit existed.
  • Liquidation. The minted tokens were routed through OdosRouter V3 into Uniswap V4 pools, yielding approximately 108.2 ETH (~$237,000). Bridged DOT price on Ethereum collapsed from approximately $1.22 to near zero.

The attacker continued operating after the initial DOT exploit. At 04:20 UTC, a subsequent transaction used the same pipeline to seize admin control of the ARGN and ARGNOT contracts and mint 1 billion of each. Four additional DOT re-exploit transactions followed between 04:26 and 05:07 UTC before the EthereumHost contract was frozen. Polytope Labs' exploit advisory extended the scope further, advising that all ERC6160Ext20 tokens issued through the same TokenGateway infrastructure including ARGN, ARGNOT, MANTA, and CERE should be treated as compromised.

What failed

Three independent security gaps, any one of which, if closed, would have stopped the exploit,  were all open simultaneously. The MMR bounds check would have rejected the forged proof. Proof-to-request binding in handlePostRequests() would have caught the decoupled message even with the bounds check bug. And the authenticate() modifier on TokenGateway.onAccept() would have blocked the admin takeover even if both proof-layer failures existed. Beyond these three, no downstream constraint existed either: the admin change executed without delay or confirmation, the mint imposed no supply cap, and no automated response triggered between the role change and the drain.

Each of these was a valid function operating within its designed parameters. The protocol did not fail because one function misbehaved. It failed because three separate safety nets were absent, and the privileged path behind them could change administrative control, mint unlimited supply, and drain liquidity in a single transaction, with no hard limits at any stage.

The downstream impact extended beyond Hyperbridge's own contracts. DOT's price on centralised exchanges dropped approximately 5–8%, with native DOT briefly falling to $1.16. Upbit and Bithumb suspended all DOT deposits and withdrawals. Any LP positions, vault shares, or synthetic assets backed by bridged DOT were rendered worthless.

The problem was not only who had access. It was that no layer of defence existed independently and when the first failed, every subsequent stage was unguarded.

How each stage could have been stopped

Each stage of the Hyperbridge exploit passed through a gap where a hard control could have stopped the sequence. What follows maps each gap to the policy that would have closed it, the monitoring signal that would have surfaced it, and the automated onchain response that would have contained it.

Forged proof acceptance

The gap. The VerifyProof() function accepted a proof decoupled from the message it claimed to authenticate. No secondary check validated that the proof bound to its payload.

Policy. A proof-to-message binding policy requiring cryptographic binding between the proof and the specific message payload would have rejected the forged proof before any governance action reached the TokenGateway.

Monitoring and response. For protocols that rely on cross-chain proof verification, monitoring for messages where the proof's referenced state does not correspond to a recently finalized block on the source chain would have identified the recycled proof data at the infrastructure layer. Configured as a trigger for automated onchain response, this detection would have paused the gateway contract before the forged message could propagate downstream.

Unauthorised administrative takeover

The gap. Hyperbridge's EthereumHost contract includes a challengePeriod for exactly this purpose so there is a window for disputes where forged commitments can be challenged before actioning. It was set to zero so the ChangeAssetAdmin action executed instantly, with no time delay, multi-step confirmation, or secondary authorisation. A single forged message was sufficient to transfer full minting authority.

Policy. An administrative authority policy: block any transaction that changes admin or minter roles on a gateway-managed token contract unless it originates from a verified multi-step governance process with a minimum time delay of N blocks. The attacker's forged ChangeAssetAdmin action would have been rejected regardless of whether the proof passed verification, because the role change itself would have failed the policy's structural requirements. This policy does not evaluate whether the message is authentic. It evaluates whether the governance path is legitimate.

Monitoring and response. Any change to admin or minter roles on gateway-managed token contracts represents a high-severity governance event. Monitoring for ChangeAssetAdmin calls, cross-referenced against expected governance processes, would have flagged the unauthorised role transfer the instant it executed. For Hyperbridge, where admin changes should only originate from verified Polkadot consensus, any role change arriving through an unrecognised path triggers an automated contract pause, freezing all downstream token operations before the attacker can use the newly acquired privileges.

Unlimited supply minting

The gap. The minting function imposed no cap on supply inflation. The attacker minted 2,805 times the existing circulating supply in a single call.

Policy. A supply inflation policy: block any mint transaction that would increase total supply of a gateway-managed token by more than X% relative to the supply at the last verified checkpoint. The 1,000,000,000 DOT mint, a 280,500% increase, would have been blocked immediately. This policy does not evaluate whether the minter is authorised. It evaluates whether the resulting state is safe.

Monitoring and response. A rule tracking total supply of gateway-managed tokens against a baseline would have fired on the billion-token mint. The threshold does not need to be sophisticated: any single mint exceeding the total existing supply by orders of magnitude is anomalous regardless of context. Paired with automated response, the detection triggers an immediate freeze on the minted tokens and a pause on the affected pool, preventing liquidation even if the mint itself succeeds.

Rapid full-pool liquidation

The gap. No rate limit existed on the volume of tokens that could be swapped from gateway-managed contracts. The attacker drained all available liquidity in a single transaction.

Policy. A withdrawal velocity policy: block any sequence of swaps or transfers from gateway-managed contracts that exceeds Y in total value within a Z-minute window. Velocity limits do not prevent legitimate bridge usage. They prevent rapid, full-pool liquidation.

Monitoring and response. Monitoring for large, rapid swaps of gateway-managed tokens through DEX routers, particularly swaps that represent a significant percentage of pool liquidity, would have flagged the OdosRouter-to-Uniswap V4 liquidation as it occurred. Automated response at this stage can freeze remaining pool liquidity or pause the router interaction, limiting the attacker's extraction even after minting succeeds.

The combination that constitutes a drain

The gap. Each individual action, an admin role change, a mint, a swap, is individually routine. The combination of all three in a single transaction, with the mint volume exceeding normal parameters by orders of magnitude, is a drain pattern. No policy evaluated the sequence as a whole.

Policy. A stateful combination policy: block any transaction in which an administrative role change on a token contract is followed by a mint or transfer exceeding threshold T within the same transaction or within N blocks. This catches the attack at the intersection of individually valid actions that together constitute a drain pattern, regardless of whether any single action appears malicious in isolation.

Monitoring and response. Contract deployment anomaly detection would have surfaced the earliest signal: the attacker deployed purpose-built contracts targeting Hyperbridge's HandlerV1 and TokenGateway interfaces, deploying and calling them in the same transaction. Monitoring for new contract deployments that interact with a protocol's core verification or governance contracts triggers an automated alert and, when configured, a pre-emptive pause before the forged proof is even submitted.

Hypernative's platform detected the exploit at 03:55:23 UTC, within the same minute as the attack transaction. But detection alone did not stop what followed. The attacker continued operating for over an hour with subsequent transactions at 04:20, 04:26, 04:33, 04:51, and 05:07 UTC exploiting additional tokens before the contract was frozen. This is the gap that automated onchain response closes. Monitoring surfaces risk as it develops. Policies enforce hard limits at the point of execution. Automated response connects the two, blocking unsafe state changes or pausing affected contracts without waiting for a human to review the alert. The three layers are complementary, and the more stages an attack must pass through, the lower the probability that any single bypass results in a drain.

Operational safety

This matters beyond adversarial scenarios.

The same policy and response layer that would have stopped this exploit also prevents accidental misconfigurations during normal bridge operations. Hyperbridge paused bridging for five days in February 2026 after a Polkadot runtime upgrade introduced an incompatibility between parathreads and BEEFY light client verification. That pause was a correct operational decision. But it illustrates a broader point: bridge infrastructure routinely undergoes upgrades, parameter changes, and governance actions that carry configuration risk.

Consider a scenario where a team member deploying a routine upgrade to a TokenGateway contract accidentally grants minting authority to a test address instead of the production governance contract. Without policy enforcement, that misconfiguration is functionally identical to what the attacker achieved, an unauthorised address with minting authority. Or a governance proposal that adjusts supply parameters miscalculates by an order of magnitude, intending a 10,000 token mint but submitting 10,000,000. Without a supply inflation policy, the error executes.

Transaction validation asks: is this specific action malicious? Policy enforcement asks: is the resulting protocol state safe? The second question catches a much wider range of problems, because it does not require the cause to be adversarial.

The protocol did not fail because one function misbehaved. It failed because a privileged path existed that could change administrative control, mint unlimited supply, and drain liquidity in a single transaction, with no hard limits at any stage.

Reach out for a demo of Hypernative’s solutions, tune into Hypernative’s blog and our social channels to keep up with the latest on cybersecurity in Web3.

Secure everything you build, run and own in Web3 with Hypernative.

Website | X (Twitter) | LinkedIn

Secure everything you build, run, and, own onchain

Book a demo