OpenAI unveiled Daybreak, a groundbreaking cybersecurity initiative, on May 11, aimed at identifying, validating, and resolving software vulnerabilities before malicious actors can weaponize them. The firm frames this approach as building software that is "resilient by design," embedding security earlier in the development lifecycle through AI-assisted code review, threat modeling, patch validation, and dependency analysis.
For the cryptocurrency industry, where a single software failure can result in immediate and irreversible capital loss within a single block, the urgency of this shift is undeniable. Traditionally, crypto security follows a reactive model: pre-launch audits, post-deployment monitoring, incident response when funds are moved, post-mortem analyses, vulnerability patching, reimbursement negotiations, and governance debates. This model, however, has a critical flaw—bugs are only discovered after funds have already been stolen. The period between deployment and exploit is when risk peaks, yet defenses are often at their weakest.
The TRM Labs 2026 Crypto Crime Report revealed that illicit actors stole $2.87 billion across nearly 150 hacks and exploits in 2025. Of this total, infrastructure attacks—including compromised keys, wallet infrastructure, privileged access, front-end surfaces, and control planes—accounted for $2.2 billion. Code exploits, the primary focus of traditional audits, represented just $350 million, or 12.1%, of the losses.
Data from Hacken for the first quarter of 2026 underscores the limitations of audit-centric security. Web3 projects lost $482 million across 44 incidents in a single quarter alone. Notably, six of these incidents involved protocols that had undergone audits, including one that had received 18 separate audits. In one case, a $282 million theft occurred without any code exploit; instead, the attacker bypassed the contract layer entirely, compromising the operational and social infrastructure surrounding it.
CertiK's latest 'wrench-attack' report highlighted a disturbing trend: between January and April 2026, there were 34 verified physical coercion incidents globally, a 41% increase from the same period in 2025. These attacks resulted in estimated losses of approximately $101 million over four months. CertiK projects that, if this trajectory continues, 2026 could see around 130 such incidents. The primary attack vector is no longer just the code—it is the individuals holding the keys, the signers in multisig setups, and engineers with access to cloud consoles.
The combined data from these three reports paints a clear picture: the threat landscape in crypto has evolved far beyond smart contracts. In 2025, infrastructure attacks accounted for $2.2 billion in losses, vastly outpacing code exploits at $0.35 billion by a ratio of more than six to one.
What 'Resilient by Design' Means for Crypto
Applying OpenAI’s Daybreak logic to cryptocurrency demands a security posture that operates continuously throughout the entire protocol lifecycle. OpenAI’s AI-driven approach is designed to reason across entire codebases, pinpoint subtle vulnerabilities, validate that fixes address the root cause, and integrate this capability into the everyday build-and-deploy workflow as an ongoing process.
For crypto, this translates into specific operational requirements across the full technology stack where losses are now concentrated:
- AI-assisted secure code review: Conducted before and throughout deployment to catch logic errors, access-control gaps, and unsafe assumptions before they reach mainnet.
- Continuous threat modeling: Applied to protocol upgrades to assess how each architecture update—including oracle dependencies, bridge designs, or governance mechanisms—introduces new attack surfaces.
- Dependency and oracle risk analysis: Identifies when third-party dependencies or oracle integrations introduce vulnerabilities that could be exploited.