[crypto] Vitalik says AI-driven exploits could reshape crypto security₿ Crypto

Vitalik Buterin: AI-Driven Exploits Require Formal Verification

As AI models automate bug discovery, Ethereum's co-founder advocates for mathematically proven 'secure cores' to protect blockchain code.

May 19, 2026, 11:02 AM1,395 words13 sources
Vitalik Buterin: AI-Driven Exploits Require Formal Verification

Photo: Pexels / panumas nikhomkhai

The intersection of artificial intelligence and blockchain technology is ushering in a new era of cybersecurity, where the speed of automated exploitation may soon outpace traditional human-led defense mechanisms. Ethereum co-founder Vitalik Buterin has recently highlighted that increasingly powerful AI models could dramatically alter the landscape of crypto security by making it significantly easier to discover and weaponize vulnerabilities in complex software systems ambcrypto.com. As advanced AI models demonstrate the ability to autonomously identify hundreds of software flaws in a single test, the industry is facing a pivotal shift toward mathematically verified code—a process known as formal verification—to protect the decentralized infrastructure that secures billions in digital assets decrypt.co.

The Rise of AI-Assisted Cyberattacks

The threat landscape for cryptocurrency networks is evolving as AI models gain the capability to scan code for bugs at a scale and speed previously impossible for human auditors. Vitalik Buterin argues that bugs in crypto infrastructure are becoming "even more scary" when paired with AI systems that can automate the discovery of vulnerabilities ambcrypto.com. This concern is not merely theoretical; recent tests have shown that advanced AI models can identify and exploit software flaws at levels far beyond previous public versions decrypt.co.

For instance, Anthropic’s Claude Mythos model reportedly identified 271 vulnerabilities in Mozilla Firefox during internal testing decrypt.co. Furthermore, researchers at the U.K. AI Security Institute have observed that OpenAI’s GPT-5.5 has demonstrated advanced offensive cyber capabilities decrypt.co. These developments suggest that the window of opportunity for attackers to exploit undiscovered bugs is shrinking, placing immense pressure on developers to secure smart contracts, zero-knowledge infrastructure, and consensus protocols before they are deployed ambcrypto.com.

The consequences of such exploits are already evident in the industry. North Korean state-sponsored hackers, such as the Lazarus Group, are estimated to have stolen more than $6 billion in cryptocurrency to date decrypt.co. In a notable incident in April, attackers drained $292 million from Kelp DAO’s infrastructure after compromising internal RPCs decrypt.co. Buterin suggests that the only way to counter this rising tide of automated threats is to adopt a "secure core" model, where critical infrastructure is protected by machine-checked proofs of correctness blockonomi.com.

Formal Verification: The 'Final Form' of Software Development

To combat AI-driven threats, Buterin advocates for the widespread adoption of formal verification. Unlike traditional testing, which checks if software works under specific scenarios, formal verification involves mathematically proving that a piece of code behaves correctly under all possible conditions ambcrypto.com. Buterin has referred to AI-assisted formal verification as the potential "final form" of software development, allowing for the creation of code that is both extremely efficient and far more secure than current standards blockonomi.com crypto.news.

The benefits of this approach include:

  • End-to-End Trust: Users would not need to audit entire codebases; they would only need to verify the mathematical statements proven about the code decrypt.co.
  • Elimination of Interaction Bugs: Formal verification is particularly effective at catching "interaction bugs" that occur at the boundaries of two different sub-systems decrypt.co.
  • Optimization: It allows for the deployment of highly optimized low-level code by proving it matches a more readable reference implementation decrypt.co.

However, Buterin cautions that formal verification is not a "panacea" decrypt.co. If the critical properties of a system are left unspecified in the proofs, or if the underlying assumptions are incorrect, vulnerabilities can still exist blockonomi.com ambcrypto.com. Despite these limitations, he views it as essential for the next iteration of Ethereum, particularly for complex components like ZK-EVMs, STARKs, and quantum-resistant signatures crypto.news.

The Looming Quantum Threat: Q-Day and Bitcoin

While AI poses an immediate threat to software integrity, the long-term security of blockchain networks is also challenged by the advent of quantum computing. Analysts at Citi have warned that "Q-Day"—the point at which quantum computers can break current encryption—could arrive as early as 2030 to 2032 blockonomi.com decrypt.co.

Bitcoin is viewed as particularly vulnerable to this threat due to its structural design and conservative governance. Citi analysts estimate that between 6.7 and 7 million BTC are held in wallets with exposed public keys, making them prime targets for quantum attacks blockonomi.com decrypt.co. This includes approximately 1 million BTC attributed to Satoshi Nakamoto, currently worth an estimated $82 billion decrypt.co.

The primary risks identified for Bitcoin include:

  • Public Key Exposure: Bitcoin transactions expose the sender's public key until the transaction is confirmed, providing a window for a quantum attacker to derive the private key decrypt.co.
  • Governance Hurdles: Transitioning Bitcoin to quantum-resistant standards would likely require a hard fork and broad consensus, a process that is historically slow and difficult to coordinate decrypt.co crypto.news.
  • Harvest Now, Decrypt Later: Attackers may already be collecting encrypted data today with the intent of decrypting it once powerful quantum computers become available crypto.news crypto.news.

In contrast, Ethereum and other Proof-of-Stake (PoS) networks are considered better positioned to adapt because of their more flexible governance and history of regular protocol upgrades decrypt.co. However, PoS networks are not immune; a quantum attacker could theoretically acquire enough private keys to control 33% of staked assets, potentially disrupting network finality decrypt.co.

Testing Post-Quantum Defenses: The BNB Smart Chain Case Study

The practical challenges of migrating to post-quantum cryptography (PQC) are already being explored. BNB Smart Chain (BSC) recently completed a migration test that replaced standard ECDSA signatures with the quantum-resistant ML-DSA-44 standard blockonomi.com crypto.news. While the test proved that migration is technically feasible without changing wallet addresses or RPCs, it revealed significant performance trade-offs blockonomi.com crypto.news.

The transition to ML-DSA-44 resulted in a massive increase in data size. A single transaction signature grew from 65 bytes to approximately 2.4 KB, causing the total transaction size to jump from 110 bytes to 2.5 KB blockonomi.com u.today. This data bloat had a direct impact on network performance:

  • Throughput Reduction: Native transfer throughput (TPS) dropped by 40%, falling from 4,973 to 2,997 blockonomi.com u.today.
  • Gas Throughput: Gas throughput fell by 50%, from 392 to 196 mgasps blockonomi.com.
  • Block Size: Average block sizes increased from 110 KB to nearly 2 MB blockonomi.com u.today.
  • Propagation Delays: Larger blocks caused P99 finality to degrade from 2 slots to 11 slots in cross-region testing due to increased network propagation pressure blockonomi.com crypto.news.

Despite these hurdles, the use of pqSTARK for consensus vote aggregation showed promise, delivering a 43:1 compression ratio that kept validator overhead manageable blockonomi.com crypto.news. The findings suggest that while security can be achieved, it will require significant advancements in data-layer scaling to maintain current performance targets crypto.news.

Industry-Wide Preparation and Emerging Standards

Beyond BNB Chain, other networks are also taking steps to prepare for the quantum era. Solana validator clients Anza and Firedancer have integrated early versions of Falcon, a post-quantum signature tool designed for efficiency crypto.news. Falcon-512 was selected because it offers smaller signature sizes compared to other post-quantum standards, which may help mitigate the performance issues seen in the BNB Chain tests crypto.news.

The NEAR network is also planning a testnet rollout using FIPS-204 quantum-safe signatures by the end of Q2 2026 crypto.news. NEAR researchers have highlighted that quantum attacks could lead to complex ownership disputes, as it may become difficult to distinguish between a legitimate transaction and one initiated by an attacker who has derived a private key crypto.news.

The U.S. National Institute of Standards and Technology (NIST) has urged organizations to begin migrating to post-quantum encryption standards immediately crypto.news. For the crypto industry, this involves a comprehensive review of wallets, exchanges, bridges, and custody solutions to identify where legacy algorithms are in use crypto.news. Cardano founder Charles Hoskinson has pointed to Bitcoin Improvement Proposal BIP-361 as a potential path for migrating Bitcoin users to quantum-resistant addresses, though he warned that the window for preparation may be closing faster than expected bitcoinist.com.

Conclusion: A Future Defined by Adaptability

The dual challenges of AI-driven exploits and quantum computing are forcing a fundamental rethink of blockchain security. As Vitalik Buterin suggests, the industry must move toward a model where a "secure core" of infrastructure is protected by rigorous formal verification and machine-checked proofs blockonomi.com ambcrypto.com. While the transition to post-quantum cryptography presents significant technical and performance hurdles—as evidenced by the 40% throughput drop in BNB Chain's testing—the alternative is a landscape where decentralized systems become increasingly vulnerable to automated attacks blockonomi.com decrypt.co. Ultimately, the long-term resilience of crypto networks will depend not just on their current cryptographic strength, but on their ability to coordinate and implement protocol upgrades in the face of rapidly advancing technology decrypt.co.

Related

Source Articles

This article is based on analysis of 13 source articles from our news database.

  1. 1
    Blockonomi··blockonomi.com·
  2. 2
    Crypto··crypto.news·
  3. 4
    r/CryptoCurrency··reddit.com·
  4. 5
  5. 6
    Decrypt··decrypt.co·
  6. 7
    Crypto··crypto.news·
  7. 10
    AMBCrypto··ambcrypto.com·
  8. 12
    Bitcoinist··bitcoinist.com·
  9. 13
    Crypto··crypto.news·