The Governance Layer Blockchain Forgot
- Kirk M. Anderson, MBA, CISSP, CISM, PMP

- 39 minutes ago
- 7 min read

In under two minutes, Bybit lost $1.5 billion. The cryptography worked perfectly, and that is the problem.
The blockchain industry has spent enormous resources hardening its technical controls: hardware security modules, multi-party computation wallets, multi-signature thresholds. These tools work. But three of the largest thefts in blockchain history were not cryptographic failures. They were governance failures, and they share a structural cause the industry has not yet built the infrastructure to address.
Three Incidents. One Gap.
The pattern is consistent enough now to be definitive.
Ronin Bridge — March 2022 — $625M. Attackers compromised five of nine validator nodes, acquiring the signing authority needed to authorize withdrawals. The breach went undetected for six days and was only discovered when a user reported being unable to withdraw funds. No continuous monitoring system flagged the unauthorized access during that window. Not because the signals were absent, but because no governance infrastructure existed to connect them in real time.
Euler Finance — March 2023 — $197M. An attacker exploited a logical flaw in Euler's smart contract to manipulate collateral and debt accounting, executing a flash loan attack that drained approximately $197 million. Post-incident analysis by Chainalysis confirmed that an MEV bot was observably involved in the transaction sequence on-chain. The attack exploited a vulnerability that had passed multiple audits. The signals of unusual protocol interaction existed in the transaction data. Nobody was watching for them.
Bybit — February 2025 — $1.5B. Three authorized signers, operating through a 3-of-6 multisig configuration, approved a transfer that appeared entirely routine. Every HSM was functioning, every MPC threshold was met, every access control passed, and every compliance dashboard showed green. What the signers could not see, because the Safe{Wallet} interface they were using had been compromised via a malicious JavaScript injection into Safe's AWS infrastructure, was that the transaction routed control of the cold wallet to attacker-controlled addresses. The cryptographic controls were sound. The human approval layer was not, and no monitoring system detected the behavioral anomaly in time.
Combined losses: $2.3 billion. In each case, post-incident analysis confirmed what continuous governance monitoring would have seen. In each case, the industry's response was to invest in better forensics: tools designed to investigate what already happened, not to detect what is about to.
The forensics tools are the autopsy. The industry needs the cardiologist.
What the Regulations Now Require and What Most Institutions Have
Two dates every licensed digital asset institution should have memorized: MiCA became fully enforceable on December 30, 2024. DORA became fully enforceable on January 17, 2025. The examination schedule is active. These are not aspirational frameworks, and what most institutions currently have is not what they require.
Periodic security audits assess controls at a point in time and produce no ongoing evidence. DORA Article 10 requires continuous mechanisms to detect anomalous activities, behavioral as well as signature-based. A point-in-time audit does not satisfy a continuous monitoring requirement.
Compliance dashboards track framework check boxes. DORA Article 19 requires major incident notification to the National Competent Authority within four hours of classification, with evidence. A dashboard of green indicators is not a tested notification capability.
Signature-based detection tools generate alerts when known attack patterns appear. The three incidents above did not match signature databases. They were behavioral: compromised validator access, interface integrity failure, unusual protocol interaction. DORA Article 10's requirement for behavioral anomaly detection cannot be met by tools built for enterprise IT and adapted for blockchain.
Key management policies define thresholds and access controls but do not monitor the behavioral patterns of the humans who hold and operate the keys. MiCA Article 72 requires immediate notification of significant cyber threats, which demands real-time awareness, not periodic review of whether policies are documented.
This is not a gap of intent. It is a gap of infrastructure, and the specific tools the industry has built explain exactly where that gap sits.
The Infrastructure That Exists Versus the Infrastructure That Is Missing
The blockchain industry has built genuinely sophisticated tools, just for the wrong layer of the problem. What exists today addresses what already happened. What is missing addresses what is about to.
Chainalysis and on-chain forensics investigate the past, tracing funds after movement. Continuous behavioral governance watches the present, detecting anomalies before a transaction settles.
Fireblocks and MPC custody protect the key in transit and at rest. Human-layer governance monitors the behavioral patterns of the people who hold and operate those keys.
Hexagate and protocol monitoring watch the smart contract at the protocol level. Institutional governance oversees the organization that owns the contract, with board-visible output.
Audit firms provide episodic code assessment before deployment. Runtime contract monitoring covers every block, every call, and every governance vote, continuously.
Compliance platforms track framework checkboxes. A regulatory evidence package provides article-level DORA and MiCA mapping that is examination-ready and independently verifiable.
Every tool in the first column is widely deployed. Every capability in the second column, as a coherent institutional layer purpose-built for blockchain infrastructure, does not yet exist in any widely adopted form. That is the governance layer the industry built without.

What a Governance Failure Costs
Blockchain governance failures differ from traditional cyber incidents in one critical way: the losses are often irreversible. There is no cyber insurance policy that restores $1.5 billion in drained custody and no incident response firm that recovers funds already moved across multiple chains. The intervention window is pre-transaction. Once it closes, recovery depends on attacker cooperation, chain-level intervention, or law enforcement action, none of which are reliable or fast.
Financial. Losses are immediate, often unrecoverable through conventional means, and measured in minutes. The window between a behavioral signal and a settled transaction is sometimes a single block.
Regulatory. A major incident triggers mandatory NCA notification within four hours of classification. Institutions that cannot demonstrate continuous monitoring evidence face examination findings independent of the incident itself. For digital asset licenses, regulatory consequences can include suspension of operations pending remediation, which compounds the financial damage.
Operational. A custody failure does not only drain assets. It halts settlement rails, suspends custody operations, and freezes customer withdrawals. Operational restoration depends on forensics timelines set by investigators rather than management decisions. Paralysis of this kind persists for days or weeks.
Reputational. When a governance breach becomes public, the question boards and investors ask is not why the technology failed. It is why leadership did not have visibility. Too often, the answer is that governance was treated as a technology problem rather than a leadership one.
Five Questions. Ask Them This Week.
These are not rhetorical. Each has a specific answer your leadership team should be able to provide with evidence, not with a reference to your last security audit and not with "we have controls in place."
1. Can we detect anomalous signing behavior in our multisig operations in real time? The Bybit incident succeeded because the human approval layer was compromised without triggering any monitoring system. If your answer requires more than 48 hours to produce, your key governance is operating on assumption, not evidence.
2. If a DORA Article 19 reportable incident occurred tonight, could we produce a notification to our NCA within four hours? This requires pre-populated templates, a designated reporting contact, and a classification workflow that has been tested operationally. A policy document describing these things is not the same as a tested capability, and the distinction matters to a regulator under examination conditions.
3. Does our monitoring cover behavioral anomalies, not just known attack signatures? Interface integrity failures, unusual protocol interaction patterns, and coordinated signing activity are behavioral signals that do not match signature databases. DORA Article 10 explicitly requires mechanisms to detect anomalous activities. Ask specifically whether your monitoring covers behavioral detection, not just known threat signatures.
4. Can we produce an article-level DORA and MiCA compliance map with verifiable evidence on demand? Regulators require demonstrated governance, not documented process. A spreadsheet of check boxes is assertion-based compliance. DORA examinations are designed to test evidence, not accept assertions, and the difference between a compliance map and one with independently verifiable evidence is the difference between passing and failing an examination.
5. What is our composite governance risk score today, and how has it changed in the last 30 days? If no such score exists, your board is governing without a current picture of institutional risk. A risk score that moves in real time as custody architecture, contract exposure, and regulatory posture change is not a sophistication investment. It is the baseline of operational governance.
If any of these cannot be answered with verifiable evidence, your governance layer is operating on assumptions.
The Cost of Waiting
The cost of implementing continuous behavioral governance, including real-time monitoring, board-visible dashboards, and evidence-mapped compliance workflows, is predictable and manageable. The cost of not doing it is neither.
The Bybit breach took less than two minutes. The Ronin breach went undetected for six days. DORA enforcement is already active. The next high-profile incident will not announce itself in advance, and the post-mortem will ask the same question it always asks: the signals were present, so why was no governance infrastructure in place to connect them?
Institutions that navigate the next three years without regret will not necessarily be those with the most sophisticated key management infrastructure. They will be the ones that extended governance discipline to every layer of the blockchain-native attack surface: the keys, the contracts, the settlement rails, and the humans who operate all of it. That is not a technology investment. It is a leadership decision about what the institution considers provable before it is asked to prove it.
The cryptography is sound. The governance layer is not. That is the problem the industry needs to build next.
"If a regulator called tomorrow and asked us to prove our governance controls were functioning at 2am on the night it mattered, what would we hand them?"
Sources: European Banking Authority, DORA Technical Standards for ICT Risk Management, 2025 · ESMA, MiCA CASP Authorization Guidelines, 2025 · Bybit Official Incident Statement and Mandiant Post-Incident Analysis, February/March 2025 · Sky Mavis, Ronin Security Breach Postmortem, April 2022 · Chainalysis, Euler Finance Flash Loan Attack Analysis, 2023 · Euler Finance Official Post-Mortem, April 2023



Comments