Cryptic Daily logo

Cryptic Daily

News for markets, builders, and policy

NewsCrypto NewswireWeb3 BuilderWeb3 Fraud FilesAbout

Independent Crypto Journal

Cryptic
Daily

Daily reporting on crypto markets, builders, policy, and fraud without the noise floor most sites mistake for momentum.

XTelegramRSS

Explore

  • Home
  • News
  • Crypto Newswire
  • Web3 Builder

Categories

  • Crypto Newswire
  • Web3 Builder
  • Web3 Fraud Files

Company

  • About
  • Contact
  • Editorial Policy
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Advertise

© 2026 Cryptic Daily. All rights reserved.

Cryptocurrency prices are for informational purposes only. Not financial advice.

Home›Web3 Builder›Solana Foundation Backs STRIDE Security…
Web3 Builder

Solana Foundation Backs STRIDE Security Push After $285M Drift Hack

Zashleen Singh

Zashleen Singh

Editorial desk

YesterdayUpdated April 9, 20268 min read
Share••LinkedIn•
A futuristic crypto trading hub appears under attack as glowing security networks and protective shields activate around it. The image suggests a major Solana DeFi hack followed by a coordinated ecosystem security response.

Solana Foundation is moving beyond grants and developer tooling into direct security coordination after the $285 million Drift hack, a shift that could change how large Solana DeFi protocols are monitored before an exploit starts. The Foundation and Asymmetric Research launched STRIDE and the Solana Incident Response Network on April 6, less than a week after attackers drained Drift in a fast, governance-led operation that exposed how much risk still sits outside audited contract code, according to Decrypt.

STRIDE puts the Solana Foundation closer to the security perimeter

The biggest takeaway from the Foundation’s response is not that a new program exists. It is that Solana now appears willing to fund standing security services for protocols that clear a common threshold, rather than leaving protection to a patchwork of audits, bug bounties, and private vendor relationships. In its April 6 security rollout, the Foundation said protocols with more than $10 million in TVL that pass STRIDE’s review will receive ongoing operational security and active threat monitoring, while protocols above $100 million in TVL can also receive formal verification. That is a material change in posture. It pushes the chain’s non-profit steward closer to the line where application risk becomes network reputation risk. In practice, Solana is saying that when enough value concentrates in a few protocols, base-layer credibility cannot stay fully detached from protocol security quality. Readers following recent market and infrastructure coverage will recognize why that matters: capital does not price a chain and its largest DeFi venues as separate systems during a crisis. Once one major venue fails, the chain’s risk premium moves too. STRIDE looks like an attempt to compress that gap before the next attacker does.

The Drift hack showed that operations can fail even when code holds

Drift matters here because the exploit was not framed as a classic code bug. BlockSec’s April 3 analysis describes a coordinated attack that combined signer manipulation with Solana durable nonce transactions, letting pre-signed approvals remain valid until the attacker chose to execute them. BlockSec says the attacker induced two of five Security Council signers to pre-sign malicious governance transactions, then used full admin privileges to list a malicious collateral asset, manipulate its oracle pricing, loosen withdrawal protections, and drain real assets from the protocol’s lending paths. That sequence changes the lesson. The failure sat in the approval pipeline, not in the matching engine or the lending logic alone. Asymmetric Research made the same broader point in its STRIDE launch note, arguing that many serious DeFi failures stem from misconfigured multisigs, weak access controls, and operational gaps that audits do not catch. That is the layer Solana is now trying to standardize. It is also why this story belongs alongside ongoing exploit coverage: the real battle is shifting from code review alone toward the human and governance interfaces that decide what privileged code gets to do.

Durable nonce risk forced Solana to treat timing as a security problem

One reason the Drift exploit hit so hard is that it weaponized a feature built for convenience. According to Solana’s durable nonce documentation, nonce-based transactions replace the recent blockhash with a stored nonce, allowing delayed submission after signing. That is useful for offline or staged workflows, but it also strips away the short expiry window that normally causes a stale signed transaction to die on its own. BlockSec argues that this changed the economics of signer error in Drift, because once a malicious durable nonce transaction had valid approvals, the attacker no longer needed speed or fresh access. They only needed timing. Decrypt’s reporting on the Foundation response captures why that detail now matters beyond one protocol: Solana launched STRIDE and SIRN days after Drift was hit, signaling that the chain’s security conversation has moved from isolated incident cleanup to shared operational defense. This is less about banning a feature and more about accepting that time itself has become part of the attack surface. If a protocol wants delayed execution, it now has to build expiration, review, or timelock discipline around that choice. That design pressure will shape the next generation of tooling far more than another round of audit headlines in builder-focused coverage.

Formal verification for top protocols changes the security cost curve

The Foundation’s choice to fund formal verification for protocols above $100 million in TVL may prove more important than the monitoring headline. Monitoring helps catch suspicious behavior. Formal verification aims to narrow what a contract can do at all. In the Solana announcement, the Foundation describes it as a proof-based method that checks smart contract behavior across possible states and execution paths. That does not solve signer fraud, governance manipulation, or compromised operators by itself, but it changes the economics for the protocols that matter most to the chain’s credibility. Formal verification has usually been available to the best-funded teams or to protocols willing to tolerate longer development cycles and higher engineering overhead. By subsidizing that work at the high end of TVL, Solana is trying to turn a premium security practice into default infrastructure for its largest DeFi venues. That makes sense after Drift because the exploit showed how quickly a protocol incident becomes a chain-wide confidence event. Even when the original breach sits outside core code, the market still asks whether the protocol had layered controls everywhere it should have. The Foundation appears to be answering that question with money, standards, and public review rather than messaging alone. That is a sharper response than the sector usually gets after a nine-figure exploit.

SIRN signals that incident response is becoming shared infrastructure

The other half of the rollout, SIRN, matters because it treats active incidents as coordination failures as much as technical failures. In the Solana Foundation’s announcement, SIRN is described as a membership-based network for real-time crisis response, with founding participants including Asymmetric Research, OtterSec, Neodyme, Squads, and ZeroShadow. Asymmetric’s own post says members will share threat intelligence, coordinate response to active incidents, and keep refining the STRIDE framework as real cases come in. That sounds mundane until you place it against the tempo of modern DeFi exploits. Decrypt reported that Drift was drained in under 12 minutes on April 1, a pace that leaves almost no room for ad hoc outreach once the first suspicious transactions hit the chain. A standing response network is an admission that call-your-auditor-and-hope is not a plan when the window between anomaly and extraction is measured in blocks. It also creates a subtle new hierarchy inside Solana DeFi. Protocols that meet STRIDE standards and sit near the top of TVL will likely receive faster, deeper defensive attention than smaller teams that remain outside that lane. That may frustrate parts of the market, but it is also how security budgets usually work once capital concentration gets large enough.

Public assessments could create a new trust premium for Solana DeFi

The last piece to watch is transparency. Asymmetric says STRIDE findings will be published publicly, giving users and investors visibility into protocol security posture. That could do more than improve internal controls. It could create an external sorting mechanism for capital. If users can compare not just yields and token incentives but also whether a protocol passed an eight-pillar review, receives threat monitoring, and qualifies for deeper verification support, then security stops being a vague branding claim and becomes a market variable. That would move Solana closer to a world where protocols compete on disclosed operating discipline, not just on liquidity and headline returns. The chain has been moving in that direction for some time, but Drift accelerated the timeline. BlockSec’s write-up makes plain that the exploit exploited governance and operational assumptions over weeks, not just a code defect in a single block. Once that lesson lands, public security assessments become easier to justify to teams, allocators, and market makers alike. The real significance of STRIDE may be that it converts post-hack introspection into a durable ranking system for protocol trust. That is a stronger long-term answer than a one-week burst of security marketing after a crisis.

Solana’s next test will come when a large protocol faces a live threat and STRIDE or SIRN has to show that shared monitoring and shared response can actually interrupt the path from suspicious approval to extracted funds. The protocols that join early will help define whether Solana becomes the first major chain to treat application-layer security as public infrastructure rather than private overhead.

This article is for informational purposes only and does not constitute financial or investment advice.

Reference Desk

Sources & References

5 Linked
  • 01Decrypt - Solana Foundation to Help Secure DeFi Protocols Following $285 Million Drift Hackdecrypt.co↗
  • 02Solana - Raising the Bar on Solana Securitysolana.com↗
  • 03BlockSec - Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitationblocksec.com↗
  • 04Asymmetric Research - Introducing STRIDE: A Security Program for the Solana Ecosystemblog.asymmetric.re↗
  • 05Solana Docs - Durable Noncessolana.com↗
Zashleen Singh
SocialFollow on X
Zashleen Singh
Web3 & Investigative Reporter

Zashleen Singh doesn't just report on Web3 she digs into it. With a background in software development across top tech companies and the Web3 space, she brings a developer's precision to investigative journalism. Specialising in crypto fraud, decentralised applications, and Web3 infrastructure, she has covered over 200 blockchain projects and broken major rug pull investigations that sparked real community action.

Continue Reading

Related Articles

Additional reporting and adjacent stories connected to this topic.

3 Picks
A futuristic DeFi reserve system is shown strengthening its protective layers around a glowing stablecoin vault while reward flows are redirected into a safer capital buffer. The image suggests a protocol shifting from headline yield toward stronger reserves and more sustainable financial design
Web3 Builder
7 min read

Yesterday

Circle’s Arc Chain Pushes Stablecoins Closer to the Base Layer With a Quantum-Era Design

Circle’s Arc chain pushes USDC deeper into the infrastructure stack with stablecoin gas, deterministic settlement, and a staged post-quantum security roadmap.

Zashleen Singh
Zashleen Singh
Yesterday
A futuristic crypto prediction market platform is shown rebuilding its core trading system, with glowing liquidity rails and stablecoin-style settlement channels running through the network. The scene conveys a major infrastructure overhaul focused on faster matching, collateral flow, and native stablecoin settlement.
Web3 Builder
7 min read

Yesterday

Polymarket Rebuilds Its Trading Engine as It Moves Toward a Native Stablecoin Rail

Polymarket is rebuilding its trading engine, smart contracts, order book, and collateral rail as it shifts toward a native stablecoin model.

Zashleen Singh
Zashleen Singh
Yesterday
A futuristic DeFi reserve system is shown strengthening its protective layers around a glowing stablecoin vault while reward flows are redirected into a safer capital buffer. The image suggests a protocol shifting from headline yield toward stronger reserves and more sustainable financial design.
Web3 Builder
8 min read

Yesterday

Sky Protocol Floats Structural Upgrades as It Tightens Capital Protection

Sky Protocol’s proposed structural upgrades point to a harder capital-protection stance as governance weighs a stronger solvency buffer and a more sustainable staking rewards model.

Zashleen Singh
Zashleen Singh
Yesterday
Trending Desk
Live
01

Cipher Digital Stock Jumps as Miner-to-Data-Center Pivot Comes Into Focus

02

Where Bitcoin Goes Next After Its Worst Quarter Since 2018

03

Nakamoto Shares Hit New Low as Bitcoin Treasury Firm Sells BTC

04

Solana Foundation Backs STRIDE Security Push After $285M Drift Hack

05

BitGo Mint Pushes the Stablecoin Race Deeper Into Institutional Infrastructure

Browse latest coverage