Legitimate Overrides

Between 2014 and 2026, we documented 705 exploit cases resulting in $78.81B in cumulative losses. Of these, $9.60B was intervention-eligible—losses where a protocol override could have prevented or reduced damage. This research asks a simple question: when code fails, who should be allowed to intervene, and how?

Intervention is already happening

Smart contracts promise deterministic execution—yet real-world protocols increasingly face situations where the code behaves correctly by its own logic while the protocol's intent is violated. The research question is not to settle whether intervention is desirable, but to understand when and how protocols actually intervene in practice, and what legitimacy constraints could apply if a community chooses to allow intervention.

Documenting interventions is an attempt to make the tradeoffs legible.

The data reveals a clear trend: as exploits have grown in sophistication, so have response mechanisms. Protocols now regularly deploy pauses, freezes, quarantines, and recovery procedures. The challenge lies not in the absence of response, but in its governance—balancing the need for rapid action against the imperative of legitimate authority.

Aggregate intervention success over time
Aggregate intervention outcomes showing the growing effectiveness of protocol-level responses.
Case-level intervention success patterns
Case-level analysis reveals variation in outcomes by response speed and authority type.

The scale of the threat

2022 peaked at $58B in annual losses, driven by the Terra/Luna collapse and the FTX implosion. After a 91% decline, losses climbed back to $3.76B in 2025. The threat is not receding—it is restructuring around new attack surfaces.

Losses follow a power law (α ≈ 1.33): the top 10 incidents account for 40% of all losses, and the top 1.4% of cases produce 80% of cumulative damage. This extreme concentration means a small number of well-designed interventions could have disproportionate impact.

Pareto distribution of intervention-eligible exploits
Pareto distribution: the top-ranked exploits dominate cumulative losses (α = 1.33 ± 0.01).
Top 10 exploits by value lost
The breakdown of the top 10 largest exploits by value.

Four layers of loss

Not all losses are equal. We decompose the $78.81B into four layers:

Layer 1 — Systemic collapses (Terra/Luna, FTX). These are beyond intervention scope; no kill-switch prevents a bank run. Layer 2 — Social engineering and off-chain attacks. These bypass on-chain logic entirely. Layer 3 — Technical exploits where the protocol had intervention capability but did not act in time. Layer 4 — Technical exploits where intervention mechanisms were absent.

Layers 3 and 4 constitute the $9.60B intervention-eligible market. Of this, $2.51B has actually been prevented—a 26.0% effectiveness rate, leaving a $7.09B opportunity gap.

Four-layer decomposition of total value lost
Decomposing the $78B total loss into systemic, social, and technical layers.

Attack vectors

Logic Bugs lead with 231 cases, exploiting unanticipated state transitions in smart contracts. Key Compromise follows at 127 cases, where stolen private keys bypass all contract-level safeguards. Oracle Manipulation accounts for 62 cases but carries the highest per-incident severity—flash loan attacks can drain pools in a single transaction.

The vector evolution tells a story: in 2020–21, flash-loan-driven oracle attacks dominated. By 2023–24, attackers shifted to key compromise and social engineering, exploiting the human layer. Each vector class demands a different intervention architecture: pausing for logic bugs, key rotation for compromises, oracle circuit-breakers for manipulation.

Distribution of attack vectors by frequency and severity
Attack vector distribution showing frequency vs. severity.

Who responds, and how well?

We classify every intervention by its authority level—who makes the decision to act. Signer Sets (multisig key holders) handle 71.2% of interventions by count, acting fastest at a median of 30 minutes. Governance votes, while the most legitimate, take 30+ days and cover just 11.5% of cases.

The middle ground—Delegated Bodies like Security Councils and Emergency subDAOs—account for 17.3% of cases but show the strongest capital protection at $1.10B prevented. They balance speed (60–90 minute median) with democratic accountability through elected membership and constrained mandates.

Distribution of intervention authority types
Authority usage distribution: Signer Sets dominate frequency, but Delegated Bodies handle high-value cases.
Containment success and losses prevented by authority
Governance has the highest containment success (77%) but Delegated Bodies and Signer Sets prevent more total capital.

The golden hour

The paper's core finding: speed and legitimacy are inversely correlated. Interventions within 60 minutes prevent 82.5% of losses on average. After 24 hours, effectiveness drops to 10.9%. We call this the "golden hour"—the window where rapid action is existentially important.

This creates a fundamental tradeoff. Fast responders (Signer Sets) act unilaterally—effective, but centralizing. Slow responders (Governance) are democratic but arrive after assets have been drained. The question is whether we can design mechanisms that are both fast and legitimate.

Speed vs effectiveness trade-off scatter plot
Speed vs. effectiveness: each dot is an intervention case. Faster containment correlates with higher success.

A taxonomy of intervention

We propose a two-dimensional classification: Scope (what gets affected—Account, Module, Protocol, Network) × Authority (who decides—Signer Set, Delegated Body, Governance). This creates a 5×3 effectiveness matrix that maps the design space.

The sweet spot: Account × Delegated Body achieves 92% containment success—narrow scope limits collateral damage while elected bodies provide legitimacy. The danger zone: Protocol × Signer Set achieves only 33%, where broad scope combined with unchecked authority produces unreliable outcomes.

Scope × Authority effectiveness matrix
The Scope × Authority effectiveness matrix. Darker green = higher containment success rate.

The $7 billion opportunity

Of $9.60B in intervention-eligible losses, the industry has prevented $2.51B—a 26.0% effectiveness rate. The remaining $7.09B represents the intervention opportunity gap: losses that could have been prevented with better mechanism design.

The path forward is not more centralized kill-switches, nor slower governance rituals. It is composable intervention architectures—tiered authority with automatic escalation, constrained emergency powers with mandatory sunset clauses, and scope-limited permissions that preserve the principle of minimal intervention.

Explore the full research →