On March 23, 2026, the Resolv Protocol — a delta-neutral stablecoin on Solana — suffered a control plane failure that allowed approximately 80 million USR tokens to be created without valid collateral backing, extracted for approximately $25M in ETH and USDC via decentralised exchanges, and left the protocol with $95M in assets against $173M in outstanding token liabilities. The USR peg collapsed from $1.00 to $0.27.
The attack was not sophisticated. A single privileged key was compromised and used to call the mint() function directly. The function had no collateral ratio validation — it executed without checking whether the protocol had sufficient reserves to back the tokens being created. No transaction limit prevented the full 80M from being minted in a single call. No real-time monitoring detected the anomalous volume. No automated circuit breaker paused the protocol. Each of these is an individually identifiable control gap. In combination they produced a complete and irreversible loss. For technology auditors, the Resolv case is the clearest possible illustration of what happens when minting is treated as an operational function rather than a financial process subject to the same controls as any payment, issuance, or fund transfer in a regulated environment.
| Control Area | What Was Required | What Was Absent | Severity | Framework Ref |
|---|---|---|---|---|
| Access Control — Single-Key Authority | Multi-party authorisation (minimum 3-of-5 multisig) required for any call to mint(). No single key holds unilateral mint authority. Role segregation between collateral confirmation and mint execution. | A single SERVICE_ROLE key held unrestricted mint authority. No second approver. No quorum. No independent confirmation at any stage. Equivalent to a single individual with unconstrained payment authority in a regulated institution. | CRITICAL | ITGC AC-01 SOX 404 / COSO NIST PR.AC-4 OCC § 15.14 |
| Mint Validation — No Reserve Gate | The mint() function must verify FMV(collateral) ≥ mint amount before execution — not as a policy check but as a hard protocol prerequisite that causes the transaction to revert if the condition is not met. Multi-source oracle price feeds required. The OCC NPR explicitly requires this following the PayPal $300 trillion technical minting error. | The mint() function had no collateral ratio validation logic. It executed unconditionally on receipt of a valid signed call. 100K USDC backed 80M USR — ~800x overcreation — with no rejection, no alert, and no revert. | CRITICAL | ITAC IA-05 OCC NPR § 15.11 GENIUS Act § 4(b) NIST PR.DS-7 |
| Mint Controls — No Transaction Limits | Per-transaction mint cap and rolling daily and weekly issuance limits enforced at the smart contract level with governance-approved thresholds. Any mint request exceeding defined limits must fail at the protocol level without manual intervention. | No maximum mint limit per transaction or per time window. The full 80M USR was minted in a single function call with no automated rejection, no operations alert, and no governance escalation triggered. | CRITICAL | ITAC IA-05 NIST PR.IP-1 OCC NPR § 15.12 GENIUS Act § 4(b) |
| Monitoring — No Anomaly Detection | Real-time alert on any mint event exceeding a defined volume threshold. Automated circuit breaker pausing the protocol on anomalous volume. DEX outflow monitoring for large protocol token swaps. Sub-minute detection capability. | No real-time alert existed for anomalous mint volume. Tokens were minted, transferred, and converted before any monitoring detected the events. No automated pause capability triggered by volume anomalies. | HIGH | ITGC MO-03 NIST DE.CM-8 NIST DE.AE-1 OCC § 15.14 |
| Reconciliation — No Three-Ledger Check | Continuous automated reconciliation of on-chain token supply versus custodial collateral versus protocol reserve. Automated halt if coverage ratio falls below 100% at any intraday point. Timestamped evidence retained for RPAF examination. | No automated reconciliation ran between token supply and reserve assets. The $78M insolvency gap opened during the attack and was identified by market participants through on-chain analysis, not by any internal protocol control. | CRITICAL | ITGC RC-01 NIST DE.CM-1 GENIUS Act § 4(b) OCC NPR § 15.11 |
| Key Management — No HSM Protection | FIPS 140-2 Level 3 HSM for all privileged key storage. Key material must never exist in plaintext outside the HSM boundary. Geographic redundancy. Dual-control for all key operations. Quarterly rotation and access recertification. | The compromised SERVICE_ROLE key was accessible through a single credential compromise. No evidence of HSM-grade protection, geographic key distribution, or dual-control requirements in publicly available protocol documentation. | CRITICAL | ITGC AC-06 NIST PR.AC-4 FFIEC Info Sec OCC § 15.14 |
| Incident Response — No Emergency Pause | Emergency pause capability exercisable without the compromised key. Crisis communication protocol with defined user notification SLA. Redemption gating procedure to protect remaining liquidity. Incident response playbook tested quarterly. | No emergency pause triggered during the attack. No structured crisis communication. No redemption gating applied. The protocol remained operational throughout the full extraction sequence. | HIGH | NIST RS.MI-1 NIST RS.CO-3 FFIEC BCP OCC Bulletin 2023-17 |
| Resolv Control Failure | TradFi Audit Equivalent | Framework |
|---|---|---|
| Single key, no multisig — unrestricted mint authority | ITGC: Segregation of duties failure. A single role with unilateral authority to execute financial transactions without a second approver is a material weakness in any regulated environment. In SOX 404 terms, a single individual who can both initiate and approve a payment is a segregation of duties finding regardless of the transaction medium. | SOX 404 ITGC SD-1 COSO Component 2 |
| Minting 80M tokens against 100K USDC | ITAC: Payment without confirmed funding balance. Every regulated payment system validates the source account balance before funds are released. A stablecoin mint function is operationally a payment instruction — it creates a liability on behalf of the protocol. The same input validation and approval workflow requirements apply regardless of the technology layer. | ITAC IA-05 FFIEC IT Handbook OCC ITGC |
| No per-transaction mint caps | ITGC: Limit controls failure. Transaction limits with exception alerts are baseline controls in every regulated payment and trading system. Every trading system enforces position limits with automated rejection above threshold. The same pattern is required for any system that creates financial liabilities. | ITGC AC-07 FFIEC IT Handbook NIST PR.IP-1 |
| $78M insolvency gap undetected until after collapse | ITGC / COSO ERM: Three-ledger reconciliation failure. Token supply versus collateral is structurally identical to bank ledger versus custody ledger versus sub-ledger. The reconciliation requirement is a regulatory standard in any environment where a firm holds assets on behalf of clients. The implementation differs; the requirement does not. | ITGC RC-01 COSO ERM GENIUS Act § 4(b) |
| No circuit breaker during active extraction | Operational Resilience / BCP: Automated halt controls are standard in regulated TradFi systems. Market-wide circuit breakers, firm-level position limits, and automated order rejection have been regulatory requirements for decades. Any system that can issue or transfer financial value is expected to detect and halt anomalous volume spikes. | FFIEC BCP NIST RS.MI-1 OCC § 15.14 Operational Resilience |
| No crisis communication or redemption gating | Incident Response: OCC Bulletin 2023-17 and SR 20-24 set expectations for incident response documentation, communication timelines, and recovery procedures. Redemption gating is the stablecoin equivalent of a trading halt during a critical incident — a standard operational resilience tool, not an optional enhancement. | OCC Bulletin 2023-17 SR 20-24 NIST RS.CO-3 FFIEC BCP |