$1 billion gone. 40+ protocols shut down. 15 exploits in May alone, per @TheDeFiPlug's running count through May 21, 2026.
The audits passed. The contracts compiled clean. Bridge drained. Key compromised. Governance manipulated. Protocol dead.
The code was not the problem. The problem was how these protocols were being run. I tracked every confirmed exploit through May 21. The same three failure modes appear in all 15 cases.
Every one traces back to operational security failure, not a code bug. Three failure modes appear across the full list: mint authority held by a single EOA, bridge admin keys without multisig or timelock, and governance structures concentrated enough that one actor can manipulate protocol parameters. None are code vulnerabilities. None show up reliably in a standard code review.
Crypto Times reported 40+ protocol shutdowns and $770M in hack-related losses as of May 9, 2026. CCN put the total above $1 billion by May 19. The count has not stopped.
The three failure modes, stated plainly before the list:
- EOA mint authority. One key, unrestricted minting, no co-signing requirement.
- Bridge admin keys without multisig. One wallet controls fund movement. No delay. No threshold.
- Governance concentration. One actor or coalition controls protocol parameters because token distribution allows it.
The 15 Exploits
1. KelpDAO/LayerZero — $290M (April 19, 2026, Ethereum/Bridge)
Root cause: Bridge drain via operational failure. Admin controls lacked multisig and timelock. Single point of failure: the attacker needed to control one key.
THS signal: The Security dimension flags single-key bridge admin as high-severity. A Security score below 40 on bridge protocols with single-wallet admin is a P1 remediation item.
Sources: Galaxy Research, CoinDesk
2. Drift Protocol — $200M+ (April 2026, Solana)
Root cause: North Korean state-sponsored actors, per TRM Labs attribution, exploited key management failures. Private key hygiene and access controls were insufficient for a nine-figure protocol.
THS signal: The Development dimension tracks key management signals and contributor access patterns. Single-contributor codebases with centralized key exposure flag under development health.
Sources: Bitcoin News, TRM Labs
3. Echo Protocol — $821K realized / $76.7M face-value exposure (May 2026, Monad)
Root cause: A single EOA held mint authority with no restriction or timelock. 1,000 eBTC minted with no right to mint.
THS signal: The Security dimension scores mint authority directly. A single-EOA mint role with no multisig scores near zero on the ownership centralization check.
4. Verus Protocol — $11.5M (May 2026, Ethereum)
Root cause: Ethereum bridge exploit via key compromise. The bridge admin key had no adequate rotation policy and no multisig threshold.
THS signal: Security flags bridge contracts with unchecked admin privilege. Key compromise risk is elevated when bridge admin functions are callable by a single wallet.
5. TransitFinance — $1.8M (May 2026, Multi-chain)
Root cause: Dependency and admin risks in the routing contract. Third-party dependency calls were not adequately sandboxed. The admin role had elevated permissions with no time-delay protection.
THS signal: The Development dimension scores dependency hygiene and external call risk.
6. Aurellion Labs — $456K (May 2026, Arbitrum)
Root cause: Contract drain on Arbitrum. The specific exploit vector was not publicly confirmed at time of writing. The attack pattern is consistent with the admin key compromise category across May exploits.
THS signal: The Security dimension covers ownership renouncement, hidden mint functions, and admin privilege scope.
Source: @TheDeFiPlug. Note: specific vector unconfirmed. Attributed as admin drain in running count only.
Entries 7–9: Three Bridge Admin Key Drains (May 2026, Various EVM)
Pattern: Single-point admin control. No timelock on parameter changes. No multisig threshold on fund movement. Each bridge drained within hours of the attacker gaining key access.
THS signal: The Security dimension scores bridge contract architecture directly. A single-admin key bridge scores below 40 on the Security dimension.
Source: @TheDeFiPlug running count, May 2026. Three additional bridge drains — protocol names not publicly confirmed at time of writing.
Entries 10–12: Three Governance Exploits (May 2026, Various)
Pattern: Token distribution was concentrated enough that a single actor or coordinated group pushed malicious parameter changes through governance without reaching standard quorum thresholds. Low quorum requirements. No timelock on proposal execution.
THS signal: The Tokenomics dimension measures holder concentration via Gini coefficient. High concentration with low governance quorum is a compounding risk. The Community dimension flags governance participation health.
Source: @TheDeFiPlug running count, May 2026. Protocol names not publicly confirmed at time of writing.
Entries 13–14: Two Oracle Manipulation Attacks (May 2026, EVM)
Pattern: Single oracle source, no circuit-breaker logic. Attackers used flash loans to temporarily move prices, trigger liquidations or minting thresholds, then exit before the oracle corrected.
THS signal: Oracle architecture is part of Security scoring. A single unguarded price feed carries this exploit class as a structural precondition.
Source: @TheDeFiPlug running count, May 2026. Protocol names not publicly confirmed at time of writing.
Entry 15: Admin Key Drain (May 2026, BSC)
Pattern: Protocol admin key leaked or phished. Full admin access allowed the attacker to drain the treasury in one transaction. No timelock, no multisig, no delay.
THS signal: Security checks ownership renouncement status, admin function scope, and timelock configuration. An active admin key with unrestricted treasury access is a critical flag.
Source: @TheDeFiPlug running count, May 2026.
Not predict with certainty. But flag the structural risk at a level that should stop capital from entering, or force a remediation decision before a protocol goes live. Every exploit on this list had a detectable on-chain precondition. None required predicting attacker behavior. They required reading the contract's access control state.
Here is how the three failure modes map to THS dimensions:
| Failure Mode | THS Dimension | What It Flags |
|---|---|---|
| Mint authority centralization (single EOA) | Security | Mint function flag, ownership centralization |
| Bridge admin key without multisig | Security | Ownership centralization, no timelock |
| Governance concentration | Tokenomics + Community | Gini coefficient, top-wallet control, low governance participation |
I'm not saying THS would have stopped these exploits. I'm saying the preconditions were on-chain, they were measurable, and a health scan run before deployment or capital entry would have produced a low score on the relevant dimension. What you do with that score is your decision.
For context on how those scores are calculated, read how Token Health Scan scores a protocol. For the broader failure mode taxonomy, read DeFi token collapse patterns.
Three checks, in order of frequency across the May exploit list.
1. Audit who holds mint authority.
Single EOA holding mint authority is the highest-frequency pattern in this list. Migrate to multisig with timelock before reaching meaningful TVL. Echo Protocol is the case study: $76.7M in exposure from a single unchecked mint function.
2. Check your bridge architecture.
Every bridge that drained in 2026 had the same structure: one admin key, no delay, no multisig threshold. This is a governance structure decision, not a code rewrite. KelpDAO/LayerZero lost $290M to it. Verus Protocol lost $11.5M to it. The architecture that enabled both exploits is common.
3. Review your governance concentration.
If the top 10 wallets hold enough tokens to reach quorum without broader participation, you have a single point of failure. A Gini analysis quantifies exactly how concentrated that risk is. The three governance exploits in May all started from high Gini scores and low quorum thresholds. Neither required a code vulnerability.
For more on the gap between audits and operational risk, read why a smart contract audit isn't enough in 2026, DeFi audit admin key failure, and 5 on-chain signals of DeFi exploits in 2026.
The structural risks behind every exploit on this list are measurable before they become a crisis. Token Health Scan scores any protocol across Security, Liquidity, Tokenomics, Community, and Development. The scan takes under a minute. You get a score on each dimension and a prioritized remediation checklist. Run a free scan at tokenhealthscan.com. No login. No SQL. Just the data.
References
- CCN, "DeFi Hacks 2026: $1 Billion+ Lost and Counting," May 19, 2026
- Crypto Times, "40+ DeFi Protocols Shut Down in 2026: Inside the $770M Hack Crisis," May 9, 2026
- CCN, "$400M+ Lost to Exploits, Bridge Attacks and Protocol Breaches," April 17, 2026
- Galaxy Research, KelpDAO/LayerZero bridge exploit, April 2026
- CoinDesk, KelpDAO exploit reporting, April 2026
- Bitcoin News / TRM Labs, Drift Protocol, April 2026
- @TheDeFiPlug, running DeFi exploit count thread (15 exploits documented through May 21, 2026)