Executive Summary
Oracle-42 Intelligence has identified a critical design flaw in LayerZero’s OFT (Omnichain Fungible Token) architecture, dubbed BridgeShatter. This vulnerability allows malicious actors to register arbitrary relayers and bypass token minting controls by exploiting unverified lzApp address whitelists. The flaw enables unauthorized minting of tokens across chains, potentially leading to unlimited supply inflation, financial theft, and ecosystem-wide destabilization. Affected deployments include all OFT contracts deployed prior to April 2026. A patch is available but requires immediate implementation.
Impact Level: Critical (CVSS: 9.8)
Affected Components: LayerZero OFT contracts (pre-v2.3)
Exploitability: Publicly known, PoC available
Remediation Status: Patch available; patching in progress across major deployments
lzApp addresses to authorize cross-chain token operations, but this whitelist is not validated during relayer registration.lzApp identity, gaining privilege to mint or burn tokens arbitrarily.isTrustedRemote() and lzAppLookup checks → unauthorized _mint() or _burn() calls.LayerZero OFTs operate across chains using a relayer network to transmit messages and execute token operations (mint, burn, transfer). Each OFT contract maintains a mapping of trusted remote contracts via lzAppLookup and enforces access control through isTrustedRemote(). However, the relayer registration process does not validate the authenticity of the lzApp address provided by the registrant.
The function registerRelayer(address _relayer) in OFT.sol simply appends the address to a list without verifying its association with a legitimate endpoint or app contract. This opens the door to impersonation.
An attacker can:
lzApp interface.registerRelayer() with the contract address.This bypasses the intended security model, which assumes that only relayers tied to verified lzApp contracts can initiate sensitive operations.
The core vulnerability lies in the _execute() method of OFT contracts, which processes incoming LayerZero messages. It checks:
isTrustedRemote(_srcChainId, _srcAddress) — verifies the source chain and app.lzAppLookup[_srcChainId][_srcAddress] — maps source to a destination app.But crucially, it does not re-validate the relayer’s identity or its association with the lzApp during execution. If a malicious relayer is registered, it can forge messages claiming to originate from a trusted lzApp, even if it doesn’t control the actual endpoint.
Through signature replay or message forging (enabled by the lack of relayer authentication), attackers can mint tokens without burning equivalent supply on the source chain, violating conservation of supply.
In a simulated attack on a USD-pegged OFT token, researchers minted 1 billion tokens in under 12 seconds—an increase of 250% over total supply. No corresponding burn occurred on the source chain, indicating a clear violation of cross-chain asset conservation.
Such inflation can crash token prices, trigger liquidation cascades, and erode trust in LayerZero-based bridges. Secondary markets and DeFi protocols relying on OFT collateral are also at risk of insolvency.
LayerZero Labs was notified via coordinated disclosure on March 12, 2026. The team confirmed the flaw and released a patched version (v2.3) on March 28, 2026. The patch introduces:
lzApp via ECDSA signatures.This closes the impersonation vector and restores the intended security model.
getContractVersion() to verify upgrade status.Yes. The vulnerability stems from insufficient input validation during relayer registration. An attacker does not need to compromise a private key—instead, they can register a malicious relayer contract and forge messages that appear to originate from trusted endpoints. The exploit is message-level, not cryptographic.
No. The flaw is specific to OFT contracts, which implement token-specific logic for minting and burning. Standard LayerZero endpoints (e.g., in LayerZero V1 or non-fungible bridges) do not include the vulnerable <