A verifiable snapshot of which required-DVN stack secures each major LayerZero-based protocol. Dune shows the ecosystem slices; this page names the protocols.
The $290M drain on KelpDAO's rsETH traced back to a 1-of-1 DVN configuration — a single verifier could unilaterally approve cross-chain messages. This page exists because Dune's chart showed the ecosystem-wide split (47% on 1-of-1) without naming protocols. Knowing the aggregate doesn't help you if you don't know which protocols you use are on which tier.
From Duny's Dune analysis, aggregated across the entire LayerZero V2 ecosystem over the last 90 days. This is the universe; our curated list below is a hand-picked sample of well-known DeFi protocols.
Below are 19 hand-picked DeFi protocols with their current DVN configurations. This is our own curated snapshot — the distribution here is not the ecosystem distribution above, because we deliberately focused on names users recognise.
What to do with this information depends on who you are. Pick the track that fits, and act on it — awareness without action doesn't reduce risk.
EndpointV2.getConfig(oapp, receiveLib, srcEid, 2) on every chain you deploy to.UlnConfig structs to know who's securing their bridge.The ecosystem snapshot (47% / 45% / 5%) is from Duny's Dune analysis and covers all ~2,665 active LayerZero OApp contracts over 90 days. The per-protocol cards below cover only the well-known DeFi protocols we track by name. The two don't match because the ecosystem includes thousands of tiny/abandoned OApps that never moved off the 1-of-1 default, while our curated list is biased toward established names that almost always upgrade.
They're shorthand for how many required DVNs must attest before a message is delivered. "2-of-2" means 2 required DVNs are configured and both must sign. Optional DVNs (with a threshold) add defense-in-depth against liveness failures, but they don't rescue you from a compromised required DVN — if a required DVN refuses to sign, the message is blocked regardless.
This is a curated snapshot. No free, pre-indexed public dataset maps individual protocols to DVN setups today. To get live data you either (a) run Blockaid's public audit script against a free RPC, or (b) call EndpointV2.getConfig(oapp, receiveLib, srcEid, 2) on-chain and decode the UlnConfig struct. Every protocol card links directly to its page on LayerZero Scan where you can inspect the live config.
All protocol data lives in the PROTOCOLS array at the top of the <script> block. Each entry has name, category, required, optional, threshold, chains, verified, and scanUrl. Edit the array and refresh — no build step.