The Resolv hack: How one compromised key printed $23M

Nature of the Resolv hack

  • Several commenters stress this was not a classic “smart contract exploit” but began with compromise of Resolv’s AWS environment.
  • The attacker gained access to a privileged signing key in AWS KMS (or at least the ability to use it) and used it to mint large amounts of USR.
  • The contract logic only checked for a valid signature and did not enforce a mint cap, enabling essentially unlimited unbacked token creation.
  • Around $23–25M was extracted before admins paused the protocol; some note that taking “only” part of the supply may preserve enough confidence for the token to retain value.

Key management and security design

  • Strong criticism of keeping a mint-authority key in cloud infrastructure; suggestions include airgapped machines, offline CAs, hardware tokens, and more paranoid operational practices.
  • Others counter that if the system design requires online signing for active minting, fully offline keys are impractical.
  • Debate over KMS/HSM: using an HSM does not remove the need to harden access; “you still have to secure the HSM.”
  • Some argue MPC/multisig with multiple keyholders is safer than a single privileged key.

Debate over “code is law” and centralization

  • Some lean into “code is the contract” and accept exploits and chain forks as part of the ecosystem’s “battle testing.”
  • Others highlight that admin powers like freezing or reversing transactions mean these systems are effectively centralized payment platforms, not trustless crypto.
  • There is disagreement over what qualifies as a “cryptocurrency”; stricter definitions would exclude stablecoins and even Ethereum, which others see as out of step with common usage.

Purpose and value of stablecoins

  • Skeptics see stablecoins as pointless: capped upside, issuer risk, centralization, and overlap with existing payment rails.
  • Supporters cite uses:
    • Dollar-like asset without volatility for trading within crypto.
    • Workarounds for restrictive banking, card network prudishness (porn, gambling, weed), and AML/KYC roadblocks.
    • Cross-border payments and some international trade, especially in regions with weak banking infrastructure or cash limits.
  • There is sharp disagreement over how common and realistic these use cases are.

Illicit use, regulation, and crime vs. utility

  • Several assert stablecoins and crypto broadly are primarily for crime, money laundering, and speculation, with non-criminal users as cover.
  • Others push back, arguing that traditional finance increasingly excludes “edge” but legal activities due to FATF/AML pressure, making crypto an alternative.
  • Overall, the thread reflects deep skepticism about the industry’s legitimacy, with a minority emphasizing niche but real frictions that crypto can alleviate.

Speculation about an inside job

  • Multiple commenters question whether the hack was internal; others note that crypto history makes this suspicion common.
  • No concrete evidence is cited either way; the true origin of the AWS compromise remains unclear in the discussion.