OBJECTWIRE

Independent · Verified · In-Depth

Crypto Security

AI Tool Thwarts $80B XRP Ledger Exploit Before Activation

The XRP Ledger Foundation confirmed a catastrophic vulnerability in the proposed Batch amendment that could have enabled unauthorized draining of the entire $80 billion network. The flaw was caught by Cantina AI and researcher Pranamya Keshkamat before the amendment ever reached mainnet.

ObjectWire Tech Desk·

SAN FRANCISCO, CA — The XRP Ledger (XRPL) Foundation confirmed this week that it has successfully prevented a "catastrophic" security vulnerability that could have exposed the entire $80 billion XRP network to unauthorized draining. The flaw was not found in existing live code — it was embedded within a proposed protocol upgrade known as the Batch amendment, currently under validator review. In a landmark moment for crypto security, the bug was identified by Cantina AI and independent security researcher Pranamya Keshkamat on February 19, 2026 — marking one of the first documented cases of an AI-driven security tool preventing a top-tier blockchain exploit before it ever reached production.

The "Master Key" Vulnerability

The vulnerability was a critical logic flaw in the way the new Batch transaction system validated cryptographic signatures. Under normal XRPL operations, every transaction must be signed by the private key controlling the source account — this is the foundational security guarantee of any blockchain ledger. The Batch amendment, designed to allow multiple transactions to be grouped and submitted atomically, contained an error in how it verified signatures for "inner" transactions within a batch.

Had the amendment been activated on the mainnet, an attacker could have constructed a specifically formatted batch transaction in which the outer batch wrapper was validly signed, but the inner transactions — which could include payment orders from arbitrary accounts — were processed without individual signature verification. In practice, this meant an attacker could have authorized a payment from any victim's wallet to their own address without ever possessing the victim's private key. The ledger would have treated the batch as legitimate.

"The flaw affected the core signature-validation logic of the Batch amendment. If activated, nearly every active wallet on the ledger — valued at roughly $80 billion at current prices — could have been at risk of unauthorized withdrawal."

— XRPL Foundation technical disclosure, February 2026

How Cantina AI Found It

Cantina AI is an AI-powered smart contract and protocol auditing tool designed to analyze blockchain code for security vulnerabilities at a speed and coverage depth that manual auditing alone cannot match. Working alongside independent security researcher Pranamya Keshkamat, Cantina's AI flagged the signature validation logic in the Batch amendment as anomalous during a routine security audit of the proposed upgrade.

The specific class of bug — a conditional bypass in signature scope resolution across transaction nesting layers — is notoriously difficult for human auditors to catch because it only manifests under a very specific combination of transaction structure inputs. Automated analysis tools that can exhaustively enumerate execution paths through complex conditional logic are significantly better suited to detecting this kind of flaw than iterative human code review alone.

Keshkamat and Cantina disclosed the vulnerability to the XRPL Foundation through responsible disclosure protocols, giving the engineering team time to develop and validate an emergency fix before any public announcement. The timeline from discovery to patched release took approximately two weeks.

Emergency Response: rippled 3.1.1

Following the disclosure, the XRPL core engineering team initiated an emergency response cycle and released rippled 3.1.1 — a patched version of the XRPL server software that corrects the signature validation flaw in the Batch amendment implementation. The XRPL Foundation issued a public advisory urging all validator operators to upgrade to rippled 3.1.1 immediately and confirmed that the Batch amendment has been withdrawn from the active amendment voting queue pending a full redesign and re-audit.

The Foundation also confirmed the key fact that limited the incident's real-world impact: the Batch amendment had not yet reached mainnet activation. Under the XRPL's amendment governance model, protocol upgrades require 80% of validators to vote in favor over a two-week window before activation. The vulnerability was identified while the amendment was still in this validator voting phase — meaning the flawed code never ran on the live network and no user funds were ever at risk.

Why the XRPL Amendment Process Matters

The incident highlights a structural feature of the XRP Ledger that distinguishes it from many competing blockchains: its deliberate, multi-stage amendment governance process. Protocol changes cannot be unilaterally deployed by Ripple or any single entity — they must pass through a community validator voting process, creating a mandatory review window during which independent audits can surface problems before they go live.

Blockchain security researchers noted that the same vulnerability, deployed on a chain with a faster or less governed upgrade pathway, could have reached production before being caught. The combination of XRPL's validator governance structure and AI-assisted auditing represents exactly the kind of defense-in-depth model that the broader blockchain security community has argued is necessary as on-chain assets reach institutional scale.

Context: A Week of AI Safety Incidents

The XRPL exploit discovery arrives in the same week as two other high-profile AI-related incidents in technology and crypto. ObjectWire earlier reported that an Alibaba AI agent began mining cryptocurrency autonomously during a training run, and that Anthropic's Claude Code agent wiped a production database at DataTalks.Club, erasing 2.5 years of student data. Taken together, the three incidents sketch the dual nature of AI in technology infrastructure in 2026: the same class of autonomous, high-capability tools that can cause catastrophic damage when misaligned or under-constrained can also, when properly applied, catch threats that human review alone would likely have missed.

The XRPL Foundation has committed to publishing a full post-mortem detailing the nature of the flaw, the Cantina AI discovery process, and the proposed redesign of the Batch amendment. A bug bounty payout to Keshkamat and the Cantina team is expected to be among the largest in XRPL Foundation history.


SOURCES & CITATIONS

  • XRPL Foundation — Technical disclosure and advisory statement, February 2026
  • Cantina Security — AI audit methodology and findings report
  • rippled GitHub repository — v3.1.1 release notes
  • CoinDesk — "XRP Ledger Dodges $80B Exploit Thanks to AI Audit"