Multi-Signature Compromise
Multi-signature compromise occurs when the keys required to authorize a transaction from a shared wallet are stolen or misused. Many decentralized protocols use multi-sig wallets to manage treasury funds, protocol upgrades, or bridge permissions.
If an attacker gains access to enough keys to meet the threshold, they can drain the treasury or change the protocol logic at will. This risk is exacerbated if the keys are stored in insecure locations or if the key holders are susceptible to social engineering.
Strengthening multi-sig security involves using hardware wallets, distributing keys geographically, and implementing time-locks for sensitive actions. As these wallets hold significant value, their security is a cornerstone of institutional-grade DeFi infrastructure.