rsETH Incident: Liquidate rsETH attacker positions














rsETH Incident: Liquidate rsETH attacker positions







Author

Aave Labs

Creator

0x66a28531E6f390A8CD44aB0C57a0F1aeb7E673FF

Simple Summary

As part of the Defi United recovery effort and technical plan, this proposal executes liquidations against the identified rsETH attacker’s positions on Aave V3 Ethereum Core and Aave V3 Arbitrum, subject to each position being eligible for liquidation at execution time.

The proposal is intended to reduce outstanding bad debt risk, recover available rsETH collateral through normal Aave liquidation mechanics, and route any recovered value according to the DAO-approved rsETH incident recovery process.

Motivation

On April 18, 2026, an external incident affecting Kelp’s LayerZero V2 Unichain–Ethereum rsETH route released 116,500 rsETH from the Ethereum-side OFT adapter to the attacker without a corresponding burn on the source chain. The incident was external to Aave. Aave’s smart contracts, oracles, repayment, and liquidation logic continued to function as designed. However, the attacker supplied 89,567 rsETH into Aave V3 and borrowed WETH and wstETH across Ethereum Core and Arbitrum markets.

These positions introduce direct protocol exposure backed by compromised rsETH. As rsETH accounting, backing, and redemption depend on external parties (Kelp, LayerZero, and others), the DAO should leverage protocol mechanisms to reduce risk. Executing standard Aave V3 liquidations on the attacker positions is the most straightforward path to recover rsETH collateral and contain bad debt exposure. This path prevents the attacker from withdrawing rsETH collateral, and allows the protocol to secure the collateral and halt further risk accumulation.

Specification

This proposal authorizes and executes liquidation calls against the known rsETH exploit attacker positions on Aave V3 Ethereum Core and Aave V3 Arbitrum.

Target Positions

MarketAttacker AddressCollateral SuppliedDebt BorrowedAction
Ethereum Core0x1f4c1c2e610f089d6914c4448e6f21cb0db3adef53,000.00 rsETH52,460.33 WETHLiquidate if eligible
Ethereum Core0x8d11aeac74267dd5c56d371bf4ae1afa174c2d49400.00 rsETH394.06 WETHLiquidate if eligible
Arbitrum0xeba786c9517a4823a5cfd9c72e4e80bf8168129b12,573.80 rsETH12,385.93 WETHLiquidate if eligible
Arbitrum0xcbb24a6b4dafaaa1a759a2f413ea0eb6ae1455cc9,299.00 rsETH4,309.21 WETH and 8.13 wstETHLiquidate if eligible
Arbitrum0x1b748b680373a1dd70a2319261328cab2a6f644c8,000.00 rsETH7,880.48 WETHLiquidate if eligible
Arbitrum0xbb6a6006eb71205e977eceb19fcad1c8d631c787770.00 rsETH758.50 WETHLiquidate if eligible
Arbitrum0x8d11aeac74267dd5c56d371bf4ae1afa174c2d491,024.43 rsETH28.69 WETH and 813.12 wstETHLiquidate if eligible
Arbitrum0xe9e2f48bb0018276391aec240abb46e8c3cad1814,500.00 rsETH4,432.77 WETHLiquidate if eligible

Aggregate Attacker Exposure

Collateral SuppliedWETH BorrowedwstETH Borrowed
89,567 rsETH82,650 WETH821 wstETH

Debt balances may differ slightly at proposal submission because borrow balances accrue continuously.

Payload Actions

The main objective of the payload is to seize the rsETH collateral from the attacker’s positions while ensuring no impact to the rest of users. The recovered rsETH will be transferred to a newly created multisig wallet, the Recovery Guardian (0x53cb4BB8F61fa45405dC75F476FaDAd801e653D9), which will act on behalf of the DAO to manage and resolve the rsETH incident. This Safe wallet is composed of DAO Service Providers and will hold the collateral and execute the necessary actions for resolution.

The proposal also grants temporary permissions to the Recovery Guardian to update Umbrella parameters if needed. However, Umbrella is already configured within this proposal to account for the potential increase in deficit (up to the total attacker debt at the time of the exploit), ensuring that Umbrella stakers are not impacted (e.g., no slashing can occur) by this proposal. Additionally, the Recovery Guardian is granted permission to eliminate deficits on Aave V3 Ethereum Core and Arbitrum markets, enabling the protocol to clear bad debt and prevent further risk. Both permissions are intended to be revoked once the incident is resolved.

For each attacker position, the proposal executes the following steps:

  1. Fetch position data and involved assets.
  2. Adjust risk parameters to make the position eligible for liquidation.
  3. Execute liquidations for rsETH/WETH or rsETH/wstETH on the relevant Aave V3 markets.
  4. Convert WETH or wstETH debt into deficit (no longer accruing interest).
  5. Transfer the seized rsETH collateral to the Recovery Guardian.

References

Copyright

Copyright and related rights waived via CC0.

by BGD Labs