Two headlines hit the internet within hours of each other this week, and together they map the current state of DeFi’s security theater.
StakeWise DAO executed contract calls to recover approximately $19.3 million in osETH, as well as an additional $1.7 million in osGNO, from the Balancer V2 exploit which drained between $110 million and $128 million across multiple chains.
At the moment, Stream Finance froze deposits and withdrawals after an external fund manager revealed a $93 million loss, sending its staked stablecoin, xUSD, into a deindex that bottomed between 30 and 50 cents on the dollar.
One story shows DeFi’s defense toolkit is finally working at high speed; the other exposes the fragility that remains when protocols outsource risk to opaque counterparties.
The contrast is not cosmetic. StakeWise’s partial recovery of about 15% of Balancer’s total loss comes from levers that DeFi has spent years building: emergency multisigs, contract-level recoveries, and DAO governance structures that can move capital in a matter of hours.
Stream’s collapse can be attributed to a structural bet on hybrid CeDeFi, which involved cultivating returns through an external manager without real-time risk dashboards or transparent collateral monitoring.
The $93 million disappeared off-chain, beyond the reach of any smart contract or validator coordination. What worked and what failed are important because they define the menu of tools available when the next nine-figure exploit arrives.
Balancer confirmed the incident on November 3, targeting V2 composable stable pools.
The tally of losses evolved as investigators traced pipelines through chains of custody. The protocol offered a white hat bonus of up to 20%, hoping to convert the attacker into a bug hunter with a salary.
Berachain, which runs Balancer-style pools on its native DEX, moved faster: validators executed a coordinated network shutdown, performed an emergency hard fork to isolate vulnerable contracts, and resumed operations with the exploit contained.
The maneuver consisted of pause and rollback, something that only works when a chain is young and centralized enough to coordinate validator action without governance impasses.
The StakeWise playbook provides the most compelling evidence that DeFi’s emergency architecture can withstand intense pressure.
The DAO’s multisig triggered contract calls that returned 5,041 osETH and 13,495 osGNO to protocol control.
The team committed to making pro-rata distributions based on pre-operating balances, turning a catastrophic loss into a partial haircut.
It’s not theoretical: the funds were transferred on-chain, the DAO published the plan publicly, and several media outlets corroborated the numbers. Speed matters as much as results.
Traditional financial settlements can take months of litigation and often yield only pennies on the dollar. StakeWise executed within days, using native protocol tools.
The toolbox and its limits
Three mechanisms made StakeWise recovery possible: emergency multisigs with narrow, predefined powers, contract-level recovery functions that allow governance to roll back specific transactions, and a DAO structure capable of voting and executing in a single block cycle.
Berachain added the fourth option of on-chain intervention via validator consensus. Together, these tools enabled partial and rapid recoveries.
They don’t prevent exploits, but they create a credible ex-post response that reduces the attacker’s time window and reduces payoffs.
The limits are immediately apparent in the numbers. StakeWise recovered $19.3 million of a $128 million leak, which represents about 15%. Balancer’s white hat bounty remains unclaimed at the time of publication.
Berachain’s rollback protected its own ecosystem but could not reverse transactions on the Ethereum mainnet or other affected chains.
Every lever DeFi pulled worked and users still absorbed $100 million in losses. The toolbox is not empty, but neither is it enough to stop a determined, sophisticated attacker who understands the protocols better than the listeners.
Stream Finance exposes the architectural flaw that no on-chain tool can fix. The protocol reveals that an external fund manager lost approximately $93 million, leading to an immediate freeze of deposits and withdrawals.
Stream hired Perkins Coie to investigate, but the damage had already spread. The protocol’s staked stablecoin, xUSD, deindexed sharply as price trackers and newsrooms reported intraday lows of between 50% and 70% of its face value.
The mechanisms differ from those of a smart contract exploit because no attacker has drained a pool, no validator coordination can undo the loss, and no DAO vote can recover funds held off-chain by a third-party manager.
This is the CeDeFi compromise in its rawest form. The protocols promise the composability and transparency of DeFi while producing returns through traditional fund managers who operate under entirely different risk frameworks.
When the external manager fails, whether through fraud, operational error, or market losses, the stablecoin backed by that capital loses its anchor and the protocol has no emergency lever to pull.
Users discover too late that their “decentralized” stablecoin depended on trust in an entity they have never seen, operating in a jurisdiction they cannot reach, on terms they have never examined.
Second order mathematics
The existence of multi-signature and disaster recovery features raises the bar for exploit victims, as no recovered value is any longer the default; however, it also creates moral hazard.
Protocols may underinvest in security audits, believing that governance can curb losses ex post. Regulators will take note: while DAOs can cancel transactions and freeze funds, they effectively control the network in a way that resembles fiduciary duties.
This calls for political pressure for proof of reserves dashboards, mandatory risk disclosures, and stricter licensing for anything labeled “decentralized.”
For investors, the due diligence premium has just increased. Yield products built on opaque external managers or hybrid CeDeFi structures now carry a new risk: catastrophic, irrecoverable losses that shatter stable anchors.
Real-time risk dashboards, transparent collateral monitoring, and on-chain reserve proofs stop being assets and become table stakes. Protocols that cannot or will not publish these metrics will trade at a discount, and rightly so.
The macroeconomic context accentuates the challenges. Chainalysis has accounted for more than $2.17 billion in cryptocurrency thefts as of mid-2025, already surpassing the total for all of 2024, with projections pointing to $4 billion if current trends continue.
DeFi is not the only target, but it remains the most liquid and vulnerable among them. Each exploit tests whether the ecosystem has built defenses that scale faster than the attack surface.
Who decides the outcome?
The Balancer-StakeWise-Stream sequence is not unique. This is a stress test of two competing visions for the future of DeFi.
Some are betting that emergency governance, contract-level controls, and validator coordination can create a credible defense that narrows the window for attackers and limits losses.
The other side adopts hybrid structures that trade on-chain transparency for off-chain yield, accepting counterparty risk as the price of competitive returns.
The two visions coexist today and users allocate capital between them each time they choose a protocol.
The issue is not whether exploits occur, but whether DeFi can hold its own sufficiently to remain a credible alternative to traditional finance. The StakeWise recovery proves that the tools exist. The collapse of Stream proves that they are not covering the entire attack surface.
The next $100 million exploit will fall into one of these two categories, and the outcome will depend on which architecture the protocol chooses months or years before the attacker arrives. The market will notice which one survives intact.



