Chainlink Faces Backlash for Quietly Changing Multisig Wallet Configuration

Crypto researcher Chris Blec has raised concerns about Chainlink’s recent decision to reduce the number of signatures required on its multi-signature wallet. This controversial move has ignited a heated discussion within the crypto community, highlighting potential security risks and centralization concerns.

Explanation of Multisig Requirement

Multisignature wallets serve as a crucial security measure by requiring multiple signatures to authorize a transaction. In the case of Chainlink, the 4-of-8 multisig requirement means that four out of the eight designated parties must sign off on a transaction, ensuring higher security and reducing the risk of unauthorized access or malicious behavior.

Discovery of the Change

On September 25th, a pseudonymous user drew attention to the removal of a wallet address from Chainlink’s multisig wallet without any public announcement. This move, discovered by Chris Blec, sparked immediate concerns about transparency and the potential implications for the security of user funds.

Community Concerns

Members of the crypto community quickly voiced their concerns over Chainlink’s decision to make such a significant change without proper communication. Users argued that changes to security measures should be transparent and well-documented to maintain trust within the ecosystem.

Chainlink’s explanation

Responding to the backlash, a spokesperson for Chainlink clarified that the modification was part of a standard signer rotation process. They emphasized that this procedure aims to ensure the reliable operation of Chainlink services and is a routine measure taken to enhance security.

Signer Rotation Process

The rotation of signers, as explained by Chainlink, involves updating the multisignature Gnosis Safes without altering the regular threshold configuration. The modification is completed to ensure the continued stability of Chainlink’s service and align with industry best practices for maintaining decentralization and security.

Confirmation of Threshold Configuration

To alleviate concerns about the reduced number of required signatures, Chainlink clarified that the multisig threshold remains unchanged at 4-of-9. This means that despite the signer rotation, the same level of consensus is still necessary for transaction validation, maintaining the desired security standards.

Chris Blec’s Criticism

While the spokesperson’s clarification attempted to address the situation, Chris Blec, a vocal critic of Chainlink, expressed long-standing concerns regarding the platform’s centralization risks. Blec went as far as suggesting that if Chainlink’s signers were to “go rogue,” the entire DeFi ecosystem could be decimated. Blec’s viewpoint raises questions about the potential vulnerabilities present in widely adopted projects such as Aave and MakerDAO, which rely on Chainlink’s oracles for accurate price data.

Centralization Risks for DeFi Projects

Blec’s criticism extends beyond Chainlink to encompass other mainstay DeFi projects. A centralized oracle service like Chainlink has the power to influence numerous DeFi platforms that rely on its data feed. Should Chainlink experience any centralized failures or manipulation, it could have far-reaching consequences for the DeFi ecosystem, affecting the overall trust and reliability of decentralized finance.

Chainlink, as a decentralized oracle network, connects Ethereum-based smart contracts with external data and services beyond the confines of blockchain networks. However, recent controversy surrounding the reduction of required signatures on its multisignature wallet has highlighted concerns about transparency, security, and the overall decentralization of Chainlink and its impact on the broader DeFi ecosystem. As the crypto community continues to grapple with these issues, it is crucial for platforms like Chainlink to address these concerns and ensure communication and transparency to instill trust within the community.

Explore more

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Can Human Creativity Fix the B2B Marketing Crisis?

The traditional machinery of business-to-business lead generation is currently facing a systemic collapse that no amount of software optimization or budget increases can seemingly rectify. As digital ecosystems become saturated with automated outreach and AI-generated content, the efficacy of the standard Marketing Qualified Lead model has plummeted to historic lows. Organizations that once relied on high-volume form fills and gated

CISA Adds Critical Cisco SD-WAN Flaw to Known Exploited List

The rapid evolution of software-defined networking has inadvertently expanded the attack surface for global enterprise environments, leaving critical management interfaces exposed to highly sophisticated digital adversaries. The Cybersecurity and Infrastructure Security Agency has officially added CVE-2026-20182 to its Known Exploited Vulnerabilities catalog, signaling an immediate and critical threat to core network infrastructure. This specific vulnerability impacts the Cisco Catalyst SD-WAN

Sydney Police Bust $600,000 BEC Scam and Seize Gold Bullion

The digital landscape of financial fraud has shifted dramatically in recent years, as sophisticated criminal syndicates increasingly utilize business email compromise techniques to divert substantial sums of money from unsuspecting corporate entities into private accounts. This specific methodology involves the illicit infiltration of communication channels to intercept invoices or payment requests, which are then subtly altered to redirect funds toward

OpenAI Secures Systems After Massive Supply Chain Attack

The rapid expansion of artificial intelligence infrastructure has created a massive surface area for sophisticated threat actors who are increasingly moving away from traditional perimeter attacks toward more insidious methods. Recent revelations regarding a security compromise at OpenAI have underscored this shift, demonstrating how even the most prominent players in the AI industry can be targeted through the very tools