Cryptic Daily logo

Cryptic Daily

News for markets, builders, and policy

NewsCrypto NewswireWeb3 BuilderWeb3 Fraud FilesAbout

Independent Crypto Journal

Cryptic
Daily

Daily reporting on crypto markets, builders, policy, and fraud without the noise floor most sites mistake for momentum.

XTelegramRSS

Explore

  • Home
  • News
  • Crypto Newswire
  • Web3 Builder

Categories

  • Crypto Newswire
  • Web3 Builder
  • Web3 Fraud Files

Company

  • About
  • Contact
  • Editorial Policy
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Advertise

© 2026 Cryptic Daily. All rights reserved.

Cryptocurrency prices are for informational purposes only. Not financial advice.

Home›Web3 Fraud Files›Resolv Infinite Mint Exposed the Soft Un…
Web3 Fraud Files

Resolv Infinite Mint Exposed the Soft Underbelly of Stablecoin Issuance

Berat Oshily

Berat Oshily

Editorial desk

YesterdayUpdated April 9, 20267 min read
Share••LinkedIn•
A futuristic digital vault appears to break open as glowing crypto coins pour uncontrollably into a damaged blockchain network. The image suggests a stablecoin system failure caused by compromised minting infrastructure.

The infinite mint at Resolv Labs on March 22 was not a pricing glitch or a routine stablecoin wobble. It was a direct failure of issuance control: an attacker used a compromised privileged key to mint about 80 million unbacked USR and pull roughly $23 million to $25 million in value out of the system, a sequence that broke the peg within hours and turned a design assumption into a balance-sheet event. Chainalysis and CoinDesk both framed the episode as a stablecoin crisis, but the deeper signal is about how much DeFi supply control still sits outside hard onchain limits.

The infinite mint at Resolv was an authority failure, not a market accident

Resolv did not lose control because traders attacked a weak pool or because an oracle printed the wrong number. It lost control because the protocol’s mint path trusted a privileged actor to decide how much USR should exist, and the contract itself did not enforce a ceiling tied to collateral. Chainalysis’ incident write-up says the attacker first got access to Resolv’s AWS KMS environment, then used the protocol’s SERVICE_ROLE key to authorize output amounts far beyond the deposited USDC. That distinction matters. A lot of incident coverage still separates smart contract risk from operational risk as if the second category is softer and somehow less structural. In practice, once a service role can finalize supply, offchain key custody becomes monetary policy. The issue is not just that a key was compromised. The issue is that a compromised key could still ask the contract to mint nonsense and receive a yes. That is why this story belongs in Web3 Fraud Files rather than in the narrower bucket of token volatility or market panic. The peg break was downstream. The source event was governance over issuance without onchain enforcement of the issuer’s own economic promise.

USR’s off-chain settlement path turned a 1:1 promise into blind trust

Resolv’s own documentation marketed USR as an overcollateralized stablecoin that users could mint and redeem on a 1:1 basis for liquid collateral. The USR overview says the token can be minted and redeemed 1:1, while the mint documentation says USR is created by depositing liquid USD-neutral assets on a 1:1 value basis. Those statements read like hard economic rules. In operational terms, they were softer than they looked. Chainalysis describes a two-step process where users request a swap, then a privileged offchain service completes it and specifies the amount of USR to mint. The contract checked for authorized completion and a minimum output. It did not bind the output to the input with an onchain ratio check, an oracle guard, or a max mint ceiling. That gap turned a stablecoin promise into a trust assumption about a backend signer. Once that assumption broke, the 1:1 rule stopped being a rule and became a description of normal behavior. That is the real violence of an infinite mint. It does not just add fake supply. It reveals that the monetary constraint was social or operational all along. Builders watching similar role-based flows across issuance systems, treasuries, and wrappers should read this through the lens of Web3 Builder, because the attack surface sits in system design, not just in contract syntax.

Audits and allowlists did not bound issuance where it mattered

Resolv’s security page did not signal negligence in the lazy sense. The security documentation lists allowlisted mint and redeem access, a public Immunefi bug bounty, and a long series of audits spanning token contracts, request managers, treasury components, staking logic, and the ExternalRequestsCoordinator. That stack tells you the team took formal review seriously. It also tells you where the standard playbook stops. Audits can validate code paths. They cannot rescue an architecture that leaves the core economic bound outside the contract. If the protocol says a dollar in should mean roughly a dollar out, then the contract needs to enforce that invariant or at least bracket it tightly. Resolv instead left the amount decision in the hands of a privileged service flow, which meant the control that mattered most was neither public nor credibly machine-bounded at settlement. This is why the case lands harder than a simple key compromise headline suggests. Key compromise happens. The system design decides whether that compromise becomes inconvenience, temporary pause, or immediate insolvency pressure. The market has started to price that distinction more aggressively, especially as large exploits move from exotic code bugs toward operator, signer, and backend failures that spill into broad trust damage across Crypto Newswire.

wstUSR conversion and thin liquidity turned fake supply into real losses

The attacker did not stop at minting unbacked USR. Chainalysis says the position was converted into wstUSR, then routed through stablecoin pools and into ETH, which made the exploit more than a supply distortion on paper. It became a liquidity extraction event. That route matters because it shows how wrappers and staking layers can act as shock absorbers for the attacker rather than for users. By shifting into wstUSR, the attacker moved from the token that would absorb the first impact of panic selling into a derivative that represented a claim on the staking pool, then cashed out through the market’s own conversion rails. The price data underscores how fast the damage hit. CoinGecko’s historical data shows USR near $0.9969 on March 21 and about $0.3022 on March 22, the day of the exploit. That is not a slow confidence bleed. That is a one-day repricing of whether the token’s supply discipline still meant anything. CoinDesk’s reporting also described a roughly 70% collapse after the attacker minted 80 million USR, reinforcing the point that the market did not wait for a postmortem. It priced the broken issuance model immediately. The lesson here is not that liquidity failed to save the peg. It is that liquidity became the exit path through which fabricated supply translated into hard losses for everyone else.

Infinite mint is becoming a system design test for DeFi issuers

Rekt’s source brief chose infinite mint as the headline for a reason. The phrase captures a class of failure that still cuts through every layer of crypto sophistication. The exploit does not need a novel primitive, cross-chain complexity, or market-wide dislocation. It needs one trusted path to create assets without a hard bound. Resolv’s own docs describe USR as overcollateralized, redeemable, and supported by an insurance layer through RLP. Those features matter in normal operation. They do not matter enough when the creation function itself can exceed the collateral function. Once that happens, insurance becomes secondary and redemption logic becomes a queueing problem around a false numerator. This is why the attack should be read as a warning to every protocol that still uses service roles, coordinators, or backend signers to finalize issuance or withdrawal values. The next security premium in DeFi will go to systems that publish their offchain assumptions and reduce them where they can. Max mint caps, ratio checks, per-request ceilings, segmented keys, and fast pause conditions are no longer hardening extras. They are table stakes for anything that wants to present itself as money, quasi-money, or collateral-adjacent. The protocols that ignore that shift will keep discovering that fully collateralized means much less than users think when the contract does not enforce the phrase at the point of issuance.

The next wave of post-Resolv changes will show up in supply operations before it shows up in token branding. Watch for protocols to bind privileged mint flows to hard ceilings, split service roles across narrower permissions, and publish clearer machine-enforced invariants around issuance and redemption.

This article is for informational purposes only and does not constitute financial or investment advice.

Reference Desk

Sources & References

6 Linked
  • 01Chainalysis - Lessons from the Resolv Hackchainalysis.com↗
  • 02CoinDesk - Resolv Stablecoin Drops 70% After $80M Exploit After Attacker Mints USRcoindesk.com↗
  • 03Resolv Docs - USR Overviewdocs.resolv.xyz↗
  • 04Resolv Docs - USR Mintdocs.resolv.xyz↗
  • 05Resolv Docs - Securitydocs.resolv.xyz↗
  • 06CoinGecko - Resolv USR Historical Datacoingecko.com↗
Berat Oshily
SocialFollow on X
Berat Oshily
Web3 & NFT Correspondent

Berat Oshily has spent the last ten years deep in the weeds of crypto security not from the sidelines, but hands-on, working contracts, breaking systems, and figuring out exactly where things go wrong. Based in Birmingham, he focuses on Web3 fraud: the scams, the exploits, the rug pulls, and the smart contract vulnerabilities that cost real people real money. He knows how attackers think because he has spent years testing the same systems they target. Beyond the technical work, Berat has a knack for making complicated on-chain fraud understandable whether he's talking to security professionals or someone who just lost funds to a phishing link. You'll often find him at blockchain conferences across the UK and Europe, sharing what he knows.

Continue Reading

Related Articles

Additional reporting and adjacent stories connected to this topic.

3 Picks
A shadowy figure stands amid glowing blockchain trails and digital assets in a dark forensic setting. The scene conveys a major crypto hack investigation focused on theft and money laundering.
Web3 Fraud Files
8 min read

Yesterday

Maryland Man Charged Over $50M Uranium Finance Hacks

Federal prosecutors have charged a Maryland man over the 2021 Uranium Finance exploits, turning a long-running DeFi hack into a named criminal case built on fraud, laundering, and post-hack spending.

Berat Oshily
Berat Oshily
Yesterday
A glowing blockchain control system shows one compromised pathway disrupting an entire crypto network. The image represents governance and transaction workflow risks behind a major protocol exploit.
Web3 Fraud Files
7 min read

Yesterday

Drift Protocol Hack Exposes Governance Risk in Solana Durable Nonce Workflows

Drift Protocol’s $285 million exploit exposed how durable nonce workflows, weak signer review, and zero-delay governance can turn admin control into a balance-sheet event.

Berat Oshily
Berat Oshily
Yesterday
Investigators examine glowing blockchain trails while shadowy hackers appear in the distance across a dark digital network. The image suggests a major crypto exploit with suspected nation-linked actors.
Web3 Fraud Files
7 min read

Yesterday

Drift Beckons North Korea-Linked Hackers After $285M Exploit

Drift Protocol’s response to its $285 million exploit has shifted on-chain as the project publicly beckons wallets tied to the attack while forensic scrutiny intensifies.

Berat Oshily
Berat Oshily
Yesterday
Trending Desk
Live
01

Cipher Digital Stock Jumps as Miner-to-Data-Center Pivot Comes Into Focus

02

Where Bitcoin Goes Next After Its Worst Quarter Since 2018

03

Resolv Infinite Mint Exposed the Soft Underbelly of Stablecoin Issuance

04

Nakamoto Shares Hit New Low as Bitcoin Treasury Firm Sells BTC

05

Solana Foundation Backs STRIDE Security Push After $285M Drift Hack

Browse latest coverage