Back to blog

Resolv Protocol Exploited: $80M USR Minted in Catastrophic OpSec Failure

3 min read
Resolv Protocol Exploited: $80M USR Minted in Catastrophic OpSec Failure

On March 22, 2026, the Resolv Protocol suffered a massive security breach resulting in the unauthorized minting of 80 million USR stablecoins. The incident immediately crashed the token's dollar peg by nearly 80%, trading down to the $0.020 to $0.20 range across decentralized exchanges.

Exploit Mechanism: An OpSec Failure

An analysis of the exploited contract reveals that the vulnerability was not a traditional logic bug, but rather a catastrophic failure in operational security and architectural design regarding off-chain trust. The root cause was traced back to the USR minting contract, which relied entirely on an off-chain service with a privileged key to dictate the exact mint amount.

While the contract contained minimum deposit checks, it entirely lacked a maximum upper limit or an on-chain collateral to mint ratio validation. Because the contract blindly trusted the off-chain payload, the compromised privileged key acted as an unlimited money printer for the attacker.

The transaction flow proceeded as follows:

  • The attacker initially deposited approximately $200K in USDC collateral.
  • Using the compromised off-chain signer, the attacker forced the protocol to process the deposit at a completely arbitrary and inflated ratio.
  • This resulted in the initial mint transaction of nearly 50 million uncollateralized USR tokens.
  • A subsequent transaction minted an additional 30 million USR, bringing the total exploited supply to 80 million unbacked tokens.
  • Because the system functioned exactly as programmed, the minting contract collected a 0.1% fee on the exploit itself, netting the protocol's fee collector roughly 50,000 USR in commission from the attack.

Market Impact and The Real Victims

Following the minting process, on-chain data shows the primary attacker systematically swapping the stolen USR for ETH across liquidity pools, acquiring over $23 million worth of Ethereum.

While Resolv stated that their collateral remained intact and the treasury was untouched, the damage was simply shifted elsewhere. The real victims of this exploit were the liquidity providers on decentralized exchanges like Curve. When the attacker dumped 80 million unbacked USR into the pools, the LPs absorbed the toxic assets while the attacker drained the valuable ETH and stablecoin liquidity.

Comprehensive Security by FailSafe

Stablecoin issuers face unique threats: trusting off-chain signers without on-chain invariant checks can destroy an entire economic model. FailSafe’s AI-driven auditing goes beyond basic code review to detect architectural flaws, privileged key risks, and missing validation bounds before deployment.

Secure Your Protocol

Lessons Learned

It is reported that Resolv underwent 18 separate audits. In fact, an earlier audit flagged a "missing upper limit validation" on a completely different contract, yet this exact vulnerability in the core minting contract was overlooked.

In these scenarios, it is critical to enforce rigid mathematical invariants directly at the smart contract level. Stablecoin architectures rely entirely on their collateral to mint ratios to maintain their peg.

When protocols separate minting requests from off-chain validation, the on-chain contract must still strictly enforce that the final minted amount mathematically corresponds to the transferred collateral, and impose strict maximums per transaction. Relying solely on external signers or failing to validate the final execution amounts leaves protocols exposed to infinite minting vulnerabilities. As a comprehensive security partner, FailSafe consistently tests for these exact missing upper limits, missing on-chain ratio validations, and centralized points of failure to ensure protocols remain resilient against both logic bugs and OpSec compromises.

Ready to secure your project?

Get in touch with our security experts for a comprehensive audit.

Contact Us