April 07, 2026 ChainGPT

Solana Launches Stride Audits and SIRN After $270M Drift Exploit

Solana Launches Stride Audits and SIRN After $270M Drift Exploit
Five days after a $270 million exploit rocked the Solana ecosystem, the Solana Foundation unveiled a multi-part security overhaul aimed at shoring up DeFi defenses — and at improving how the network responds when things go wrong. What was announced - Stride: a structured evaluation program led by Asymmetric Research that will assess Solana DeFi protocols against eight security pillars and publish the results publicly. Protocols with more than $10 million in TVL that pass Stride will receive ongoing operational security and active threat monitoring paid for by Solana Foundation grants, with protections scaled to each project’s risk profile. Protocols above $100 million in TVL are eligible for foundation-funded formal verification — a mathematical check that proves smart contract execution paths are correct. - Solana Incident Response Network (SIRN): a membership-based consortium of security firms and researchers intended to coordinate real-time crisis response, building ties with exchanges, bridges, stablecoin issuers and other custodial actors. Who’s involved Founding participants include Asymmetric Research, OtterSec, Neodyme, Squads and ZeroShadow. The programs are open to all Solana protocols but will be prioritized by TVL. Why this matters — and what it won’t solve The announcements follow the Drift Protocol hack, in which a North Korean state-affiliated group stole roughly $270 million after a six-month social-engineering campaign. Crucially, Drift’s smart contracts were not directly exploited — they had passed audits. The attackers instead compromised contributor devices via a malicious code repository and a fake TestFlight app, used those devices to get multisig approvals, lock them into durable-nonce transactions, and execute them weeks later. That attack exposed a core gap: on-chain correctness does not equal off-chain trust. Formal verification and continuous on-chain monitoring are powerful, but neither would have prevented this breach. Formal verification can prove a contract’s logic, and 24/7 on-chain monitoring can flag suspicious transactions — yet the Drift transactions were valid by design and indistinguishable from legitimate administrative actions until they were executed to drain funds. Where SIRN could help While Stride’s checks wouldn’t have detected the human-targeted social engineering, an incident response network like SIRN could shorten reaction times after an exploit. Security observers pointed to a critical six-hour window after the Drift attack when Circle did not freeze more than $230 million in USDC that had been moved. A pre-established response network with direct lines to bridge operators, exchanges and stablecoin issuers might have constrained funds faster — though it’s unclear whether that would have stopped the attacker from using bridges like Wormhole and obfuscation tools such as Tornado Cash. Foundation’s stance and existing tools The Solana Foundation emphasized these programs “do not transfer the underlying responsibility away from the protocols themselves,” a pointed reminder after the Drift postmortem highlighted contributor-device compromise as the attack vector. Solana already offers several free security tools for builders, including Hypernative for threat detection, Range Security for real-time monitoring, and Neodyme’s Riverguard for attack simulation. Bottom line Stride and SIRN represent a meaningful step toward coordinated, proactive and reactive security on Solana — especially for high-value protocols — but they also underscore a hard lesson from Drift: technical correctness on-chain is necessary but not sufficient. Off-chain human and operational security remains the frontier where nation-state actors can still cause the greatest damage. Read more AI-generated news on: undefined/news