Shiba Inu core developer Kaal Dhairya has issued a detailed security update following the September 12 incident that exploited validator signing power on the Shibarium PoS bridge to push a malicious state/exit and withdraw multiple assets. The post, published on September 21, 2025 outlines what happened, what has been done so far, and what will govern a phased restoration once independent reviews conclude.
Shiba Inu Core Dev Shares Another Update
In a personal foreword that framed both the technical and human dimensions of the episode, Dhairya opened by distancing himself from any singular leadership mantle and reiterated the original ethos driving his work. “I want to clarify first: I’m not ‘the lead.’ I never was and never want to be. I’m just a builder who bet on SHIB’s ethos,” he wrote, adding that “in moments like these, you realize you may have just been a pawn in the whole game.”
The Shiba Inu core dev cautioned that, given “the sophistication of this attack,” he could not presently vouch for the safety of any existing keys, and he signaled fatigue with expectations that individual contributors could “keep it all together” without broader structural support.
The account of the incident describes how, at 18:44 UTC on September 12, “unauthorized validator signing power was used to push a malicious state/exit through the PoS bridge.” The method, per the update, combined short-lived stake amplification with malicious checkpoint/exit proofs to authorize withdrawals. Post-incident on-chain activity linked to the attacker is said to include sales of portions of ETH, SHIB and ROAR, though the team is withholding the “evolving wallet graph” while containment and coordination with authorities continue. “We’ll release the full technical narrative after doing so no longer increases risk,” the post states.
Immediate measures include restricting specific bridge operations to prevent new unauthorized exits, upgrading and gating contract pathways covering deposits, withdrawals, claims and rewards, and applying “targeted defensive controls against misuse of delegated stake.” The team says it recovered and secured at-risk BONE at the stake-manager level and notes that any short-term BONE stake under the attacker remains “effectively immobilized” by interventions and protocol mechanics.
Key and custody hygiene steps have involved rotating validator signers and migrating contract control to multi-party hardware custody, while live monitoring and automated alerts continue in coordination with exchanges, external security researchers, incident-response firms and relevant authorities.
The update also engages frequently asked questions about validator compromise and operational accountability. It says validator signing keys were “primarily stored in AWS KMS, with rare usage on developer machines,” and that ultimate responsibility for key management lies with operational leadership. While a single intrusion vector has not been confirmed, preliminary possibilities include a developer machine compromise, a cloud KMS compromise, exposure during an AWS-to-GCP migration, or a supply-chain attack, such as via npm.
The post acknowledges decentralization shortcomings underscored by the fact that “10 of 12 validators” signed the malicious state, and it commits to greater validator decentralization, stronger key-rotation policy, tighter custody, improved disclosures, and higher due-diligence thresholds for sensitive access.
A roadmap preview sets out four gated phases. “Containment” remains ongoing with restricted bridge functionality and live monitoring; “Hardening,” in collaboration with Hexens, includes signer/validator hygiene, policy-level controls such as rate limits, challenge windows and circuit-breakers, and deny-list extensions where technically appropriate.
Next, “Safe Restoration” will not begin until independent reviews sign off on mitigations, post-incident integrity checks pass and drills on test environments succeed, with restoration executed in phases and with rollback levers; finally, a comprehensive technical postmortem will precede a community-reviewed remediation path for affected users and liquidity, with the update noting that “token-specific approaches may differ.”
Timelines remain intentionally unspecified: “We won’t publish dates that could be gamed by an adversary,” the team writes, reiterating that updates will post to official channels.
For Shiba Inu token holders and victims, the message is blunt: beware of scams, ignore unverified “recovery/claim portals,” and expect bridge restrictions to persist “until we confirm it’s safe to restore.” Questions about bridging back to Ethereum, the timing of bridge resumption, validator rotation and full audit all receive the same answer—safety first, details to follow when security allows. On fund recovery and potential compensation, the team says options are being evaluated and any proposal will be published for community review “once viable and secure.”
The Shiba Inu developer closes by reaffirming priorities and situating communication within a disciplined cadence. “Our priorities are unchanged: protect users, secure the network, contain the attacker, and restore services safely.” The next major communication, he writes, will be the technical postmortem and a remediation proposal “once the environment is safe for full disclosure.”
At press time, Shiba Inu traded at $0.00001207.