The Sui incident has sparked a debate on faith in the Blockchain industry: what is the bottom line of Decentralization?

The Debate of Belief in the Blockchain Industry: Reflections Triggered by the Sui Incident

Preface

Recent events mark a victory for capital rather than a victory for users, which is indeed a setback for the development of the industry.

The development direction of Bitcoin is completely different from that of Sui. Whenever there is a move in the industry that shakes decentralization, it triggers people's stronger belief in Bitcoin.

The world not only needs a better set of global financial infrastructure, but also needs to always reserve space for freedom for a portion of people.

In the past, consortium blockchains were once more popular than public blockchains because they met the regulatory needs of the time. The decline of consortium blockchains today also means that merely complying with regulatory demands does not satisfy the real needs of users. If there are no users who are subject to regulation, what is the need for regulatory tools?

1. Background of the Event

On May 22, 2025, the largest decentralized exchange (DEX) in a certain public blockchain ecosystem suffered a hacker attack, resulting in a sharp decrease in liquidity, multiple trading pairs collapsing in price, and losses exceeding $220 million.

The timeline of events is as follows:

  • May 22 morning: Hacker attacked DEX and extracted $230 million, DEX urgently suspended contracts and issued an announcement.
  • May 22 afternoon: Hackers transferred approximately 60 million USD across chains, with a remaining 162 million USD still in on-chain addresses. Verification nodes quickly took action, adding the hacker's address to the "deny service blacklist," freezing the funds.
  • On the evening of May 22: The project party confirmed that the funds have been frozen, and the refund process is about to begin.
  • May 23: DEX started to fix vulnerabilities and update contracts
  • May 24: The project party opens the source PR, explaining that funds will be recovered through an alias mechanism and a whitelist.
  • May 26: The project team initiated an on-chain governance vote to propose whether to execute the protocol upgrade and transfer the hacker's assets to a custodial address.
  • May 29: Voting results announced, over 2/3 of validating nodes' weight in support; protocol upgrade ready for execution.
  • May 30 to early June: The protocol upgrade takes effect, the specified transaction hash is executed, and the hacker's assets are "legally transferred away".

2. Attack Principle

Overview of the attack process:

  1. The attacker used flash loans to borrow a large amount of tokens, causing the trading pool price to plummet by 99.90%.

  2. The attacker creates extremely narrow liquidity positions on the DEX, amplifying subsequent calculation errors.

  3. The function used by the DEX to calculate the required token amount has an integer overflow vulnerability. An attacker claims to add a large amount of liquidity but actually only contributes 1 token.

  4. Due to an error in the overflow detection condition, the contract experienced a high bit truncation during the left shift calculation, severely underestimating the required token quantity.

  5. The attacker exchanged a massive amount of liquidity at a very low cost.

From a technical perspective, the vulnerability arises from the DEX using incorrect masks and judgment conditions in the smart contracts, allowing certain values to bypass detection. After the left shift operation, high-order data is truncated, and the system only receives a minimal amount of tokens but believes it has obtained significant liquidity.

3. Freezing Mechanism

The public chain has a special denial list mechanism internally, which has implemented the freezing of funds from this hack. In addition, its token standard also has a "regulated token" model, which comes with a built-in freezing function.

Emergency freezing utilizes this feature: validator nodes quickly add addresses related to stolen funds in their local configuration files. In theory, each node operator can modify the configuration to update the blacklist on their own, but to ensure network consistency, the foundation, as the original configuration publisher, has conducted centralized coordination.

The foundation first released a configuration update containing the hacker's address, and validators synchronized with the default configuration, temporarily "sealing" the hacker's funds on the chain. Behind this, there are actually high levels of centralization factors.

To rescue victims from frozen funds, the project team has launched a whitelist mechanism patch. This allows specific transactions to be pre-added to the "exemption list", enabling these transactions to bypass all security checks, including signatures, permissions, blacklists, etc.

It should be noted that the whitelist patch does not directly seize assets from hackers; it merely grants certain transactions the ability to bypass freezes, while the actual asset transfer still requires a legitimate signature or an additional system permission module to be completed.

Mainstream freezing solutions in the industry often occur at the token contract level and are controlled by multi-signatures from the issuer. For example, a certain stablecoin's contract has a built-in blacklist function, allowing the issuing company to freeze non-compliant addresses. This solution requires multi-signature to initiate a freeze request on-chain, which may lead to execution delays.

In comparison, the freezing in this event occurred at the underlying protocol level, operated collectively by validator nodes, with execution speeds far surpassing ordinary contract calls. Under this model, achieving fast execution means that the management of these validator nodes themselves is highly unified.

4. The Principle of "Transfer-Based Recycling" Implementation

What is even more surprising is that this public chain not only froze the hacker's assets but also plans to "transfer and recover" the stolen funds through an on-chain upgrade.

On May 27, DEX proposed a community voting plan, requesting an upgrade to the protocol to send the frozen funds to a multi-signature custody wallet. The foundation then initiated an on-chain governance vote.

On May 29, the voting results were announced, with approximately 90.9% of the weighted validators supporting the proposal. The official announcement stated that once the proposal is approved, "all funds frozen in the two hacker accounts will be retrieved into a multi-signature wallet without the need for hacker signatures."

According to the official GitHub PR, the protocol has introduced an address aliasing mechanism. The upgrade includes: pre-specifying alias rules in the configuration, allowing certain permitted transactions to regard legitimate signatures as being sent from hacker accounts.

Specifically, the list of rescue transaction hashes to be executed is bound to the target address (i.e., the hacker address), and any executor who signs and publishes these fixed transaction summaries is considered to have initiated the transaction as a valid owner of the hacker address. For these specific transactions, the validator node system will bypass the denial list check.

From the code level, a new judgment has been added to the transaction validation logic: when a transaction is intercepted by the blacklist, the system traverses its signers to check if they meet the alias rules. As long as there is a signer that meets the alias rules, this transaction is marked as allowed to pass, ignoring the previous interception error and continuing normal packing execution.

5. Opinion

$160 million, tearing apart the deepest underlying beliefs of the industry.

This incident may soon calm down, but the model it adopted will not be forgotten, as it subverted the foundation of the industry and broke the traditional consensus of immutability of the Blockchain under the same ledger.

In blockchain design, contracts are law, and code is the referee. However, in this incident, the code failed, governance intervened, and power superseded, forming a model of "voting behavior adjudicating code results."

The practice of directly appropriating transactions this time differs significantly from the way mainstream blockchains handle hacker issues.

This is not the first time "manipulating consensus", but it is the quietest one.

Historically:

In 2016, a certain public Blockchain rolled back transactions through a hard fork to compensate for losses due to The DAO incident, but this decision led to a chain split, and the process was highly controversial, ultimately resulting in different groups forming different consensus beliefs.

The Bitcoin community also faced similar technical challenges: the value overflow bug in 2010 was urgently patched by developers and the consensus rules were upgraded, completely erasing about 18.4 billion illegally generated Bitcoins.

These all adopt a hard fork model, rolling the ledger back to before the issue occurred, allowing users to decide which ledger system to continue using.

In contrast, this event did not choose to split the blockchain, but instead precisely targeted this event through a protocol upgrade and configuration aliasing. This approach maintained the continuity of the chain and most consensus rules unchanged, while also indicating that the underlying protocol can be used to implement targeted "rescue actions."

The problem is that historically, "fork rollback" allowed users to choose their beliefs; whereas this time, the "protocol correction" has made the decision for the users.

"Not your key, not your coin" may no longer apply.

In the long run, this means that the concept of "not your keys, not your coins" is being undermined on this blockchain: even if users have their private keys intact, the network can still prevent asset movement and redirect assets through collective protocol changes.

If this becomes a precedent for how the future Blockchain responds to major security incidents, and is even considered a convention that can be adhered to again, then "when a chain can break the rules for justice, it also has a precedent for breaking any rules."

Once there is a successful "public welfare money grab," the next time it may be an operation in the "moral gray area."

potential issues

If hackers really stole the users' money, can a group vote take away his money?

Is the voting based on who has more money (PoS) or who has more people? If the one with more money wins, then the scenes depicted in certain sci-fi works may come true soon; if the one with more people wins, then the clamor of the crowd will also rise.

Under traditional systems, it is normal for illegal gains to be unprotected, and freezing and transferring are routine operations of traditional banks. But isn't the inability to do this from a technical theory perspective the root of the development of the Blockchain industry?

The pressure for industry compliance is continuously increasing. Today, accounts can be frozen or balance modified due to hackers; will tomorrow allow for arbitrary changes due to geopolitical or conflicting factors? If the blockchain becomes a regionally limited tool, the value of the industry will be greatly compressed, at best becoming just another less functional financial system.

This is also the reason for the firm development of the industry: "Blockchain is valuable not because it cannot be frozen, but because even if you hate it, it does not change for you."

With the trend of regulation, can the blockchain preserve its own soul?

In the past, consortium chains were more popular than public chains because they met the regulatory needs of the time. The decline of consortium chains today also means that simply complying with this demand does not satisfy the real needs of users. Without users subject to regulation, what need is there for regulatory tools?

From the perspective of industry development, is "efficient centralization" a necessary stage in the development of Blockchain? If the ultimate goal of decentralization is to safeguard user interests, can we tolerate centralization as a transitional means?

The term "democracy" in the context of on-chain governance is actually token weighted. So, if a hacker holds a large amount of tokens (or one day the DAO gets hacked and the hacker controls the voting power), can they also "legally vote to clear their name"?

Ultimately, the value of the Blockchain lies not in whether it can be frozen, but in the choice not to do so even when the group has the ability to freeze it.

The future of a chain is determined not by its technical architecture, but by the set of beliefs it chooses to uphold.

SUI3.97%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 9
  • Repost
  • Share
Comment
0/400
DefiVeteranvip
· 11h ago
BTC is still stable, the eternal god.
View OriginalReply0
GasFeeDodgervip
· 17h ago
What good is regulating monopolies? Hurry up and lubricate btc.
View OriginalReply0
FarmToRichesvip
· 08-10 17:56
Working hard every day to earn a salary
View OriginalReply0
fren.ethvip
· 08-10 04:45
Rich people come in to Be Played for Suckers.
View OriginalReply0
GateUser-1a2ed0b9vip
· 08-10 04:43
Who bows down in front of capital?
View OriginalReply0
SocialFiQueenvip
· 08-10 04:38
The crypto world is just like this, let's start over.
View OriginalReply0
ZKProofstervip
· 08-10 04:34
hmm... technically speaking, sui just proved why we need *actual* decentralization. can't believe we're still having this debate in 2025 smh
Reply0
DataPickledFishvip
· 08-10 04:32
Centralized is the best in the world
View OriginalReply0
ConfusedWhalevip
· 08-10 04:31
Capital and regulatory hunting?
View OriginalReply0
View More
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)