Omar Espejel
    • Create new note
    • Create a note from template
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Write
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
      • Invitee
      • No invitee
    • Publish Note

      Publish Note

      Everyone on the web can find and read all notes of this public team.
      Once published, notes can be searched and viewed by anyone online.
      See published notes
      Please check the box to agree to the Community Guidelines.
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Engagement control
    • Transfer ownership
    • Delete this note
    • Save as template
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Sharing URL Create Help
Create Create new note Create a note from template
Menu
Options
Versions and GitHub Sync Engagement control Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Write
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
Invitee
No invitee
Publish Note

Publish Note

Everyone on the web can find and read all notes of this public team.
Once published, notes can be searched and viewed by anyone online.
See published notes
Please check the box to agree to the Community Guidelines.
Engagement control
Commenting
Permission
Disabled Forbidden Owners Signed-in users Everyone
Enable
Permission
  • Forbidden
  • Owners
  • Signed-in users
  • Everyone
Suggest edit
Permission
Disabled Forbidden Owners Signed-in users Everyone
Enable
Permission
  • Forbidden
  • Owners
  • Signed-in users
Emoji Reply
Enable
Import from Dropbox Google Drive Gist Clipboard
   owned this note    owned this note      
Published Linked with GitHub
1
Subscribed
  • Any changes
    Be notified of any changes
  • Mention me
    Be notified of mention me
  • Unsubscribe
Subscribe
# Fortify or Falter: A Comprehensive Restaking Risk Assessment **Author's Note** This analysis was written by Omar Espejel ([@espejelomar](https://x.com/espejelomar)), Lead Axolotl for Restake.Watch and Senior Technical Ecosystem for Starknet Foundation. It represents an open discussion with the ecosystem, and we continue to work with teams to refine these metrics as they provide feedback. Any mistakes are mine alone and not a reflection of others' contributions. *This is a living document. If you spot inaccuracies or have suggestions for improvement, please reach out. The restaking ecosystem evolves rapidly, and community input remains essential for robust risk assessment.* ## Introduction Our goal is to see if **restaking** truly *fortifies* security or if it risks causing the ecosystem to *falter* under the weight of new complexities. We’ll investigate: - **Governance Bribery & Centralization**: Can the protocol’s governance be subverted? - **Exposure Concentration**: Does a single operator or AVS hold disproportionate sway? - **Contagion (Systemic) Risk**: Could one AVS failure cascade elsewhere? - **Slashing & Technical Risks**: How likely are slash events or contract bugs, and how severe are they? We use mathematics where helpful, real-world examples (like EigenLayer’s multisig and controversies), and a **compare-and-contrast** with **Symbiotic**, another leading restaking platform. Where data is missing, we acknowledge rather than guess. For each risk category, we provide concrete metrics, real-world examples, and comparative analysis between different platforms. Where data is limited, we acknowledge gaps rather than speculate. The following diagram illustrates the different risks identified in this blog post and their urgency level. ![risk-metrics](https://hackmd.io/_uploads/rytxuZaqke.png) Below is a reference table of the critical risk metrics we'll explore throughout this analysis. Each metric helps quantify a specific vulnerability in the restaking ecosystem. | **#** | **Metric** | **Urgency** | **Formula / Description** | **Data Availability** | |-------|------------|-------------|--------------------------|----------------------| | **1** | **Governance Bribery Potential (GBP)** | Critical | $$\text{Bribery Cost} \approx P \times T$$ where $P$ = price per governance token, $T$ = tokens required for quorum (e.g. 51%). | **Partial** – Some multisig info is public (e.g. EigenLayer's 8-of-12). Token float & turnout data can be elusive. | | **2** | **Exposure Concentration Index (ECI)** | High | **Herfindahl–Hirschman Index (HHI)** = $\sum (s_i^2)$, where $s_i$ = fraction of total stake per operator. | **Perfect** – On-chain data available in [restake.watch](https://restake.watch/). | | **3** | **Contagion Factor (CF)** | Critical | $$\text{CF} = \sum \bigl[\text{Prob}(\text{Slash}_i) \times (\text{Affected Restake}_i \,/\, \text{Total Restake})\bigr]$$ Reflects cascading slashing across services. | **Perfect** – Overlap data for operators and AVSs across services is soon to be visible in [restake.watch](https://restake.watch/). | | **4** | **Whitelisting Concentration Index (WCI)** | High | $$\displaystyle WCI = \frac{\sum_{i \in \text{Whitelisted AVSs}} \text{StakedCapital}_i}{\sum_{j \in \text{All AVSs}} \text{StakedCapital}_j}$$ Measures capital locked in permissioned AVSs. | **Partial** – Must parse which AVSs have operator whitelists vs. open participation. Not enterily clear from AVSs docs. | | **5** | **Slashing Risk Probability** | Critical | $$\displaystyle P_\text{slash} = 1 - \bigl(1 - p_0\bigr)\prod_{i=1}^n \bigl(1 - p_i\bigr)$$ Combines base-chain slash risk ($p_0$) with each AVS ($p_i$). | **Partial** – Slashing conditions are not yet clear for AVSs and information is off-chain. | | **6** | **Withdrawal & Unbonding Risk** | High | *Qualitative measure*: how long it takes to exit or unbond, plus liquidity depth. No strict formula. | **Unknown** yet | | **7** | **Liquidity Coverage Ratio (LCR)** | Medium | $$\displaystyle \text{LCR} = \frac{\text{Liquid Assets}}{\text{Short-Term Outflows} + \text{Slash Potential}}$$ Inspired by traditional finance to ensure coverage. | **Unknown** yet | | **8** | **Operator Performance Index (OPI)** | Medium | $$\displaystyle \text{OPI} = w_u \times \text{Uptime} + w_s \times (1 - \text{SlashRate}) + w_r \times \text{Reputation}$$ Aggregates operator reliability, slash history, and reputation into one score. | **Partial** – Operator-level performance data is partially public (on-chain logs). Some aspects, like "reputation," can be subjective or off-chain. | | **9** | **Cross-Asset Price & Volatile Asset Risk (CAPVAR)** | High | **Multi-asset Value at Risk** with correlation: $$\sigma^2_{\text{portfolio}} = \sum_{i,j} w_i w_j \,\mathrm{Cov}(r_i, r_j)$$ Captures how volatile collateral (ETH, LSTs, or other tokens) can undermine security if prices swing or correlate in a crash. | **Perfect** – On-chain holdings can be partially tracked, but real-time correlation data is tricky. Illiquid or obscure tokens, plus rapidly changing volatility, make accurate CAPVAR hard. | ## 1. Governance Risk: Bribery Potential & Centralized Control Governance is a double-edged sword. Decentralized governance can adapt fluidly; centralized or manipulable governance can open the door to bribery or collusion. ### Metric – Governance Bribery Potential (GBP) A basic way to estimate how cheaply one can capture governance is: $$ \text{Bribery Cost} \approx P \times T, $$ where \(P\) is the governance token’s price, and \(T\) is the token threshold for majority/quorum. If it’s **cheap** to amass that threshold, governance bribery risk is **high**. - **Token Governance Example**: If 51% of 100M tokens are needed and the token price is \$1, the cost is \$51M. But in practice, it could be lower if many tokens are dormant or held by easily bribed parties. - **Multisig Governance Example**: Early **EigenLayer** used an **8-of-12** multisig for major decisions ([source](https://www.blog.eigenlayer.xyz/stage-1-testnet-announcement/)). While safer than a single admin key, it remains a small circle that could be bribed or compromised. #### Case: EigenLayer 8-of-12 Multisig EigenLayer’s initial model let eight signers effectively control contract upgrades, new module approvals, etc. This scenario is *pragmatic* for early development but raises *centralization* alarms. Meanwhile, **Symbiotic** (the competitor) sidesteps centralized protocol governance altogether by making its core contracts **immutable** ([source](https://www.paradigm.xyz/2024/06/symbiotic)). No single admin key can arbitrarily change them. #### Transparency & Airdrop Bribery Controversy In 2024, multiple projects building on EigenLayer “airdropped” tokens directly to certain **EigenLayer** team wallets, possibly aiming to curry favor ([source](https://www.chaincatcher.com/en/article/2138757)). Critics saw it as extortion or bribery. While not an on-chain exploit, it illustrated how *off-chain* incentives can undermine governance integrity. #### Mitigations - **Decentralized Governance**: EigenLayer plans to transition from the multisig to a more community-driven **EigenDAO** using the EIGEN token. - **Immutable Protocols**: Symbiotic’s approach leaves no single upgrade key at the base layer, removing a major bribe vector. Vault-level governance can still be bribed, but the “core” is off-limits. - **Full Disclosure**: Clear reporting of who receives what tokens or fees can deter backroom deals. **Summary**: **Governance** is a top-tier vulnerability if power is too concentrated or easily bought. EigenLayer’s early multisig underscores the risk, while Symbiotic’s immutability drastically reduces protocol-level bribery potential. Over time, ensuring robust, open governance is crucial for restaking to *fortify* rather than *falter*. ## 2. Exposure Concentration Risk: Operators & Assets A second major challenge is **excessive concentration** — if too much stake or too many AVSs rely on a single operator or asset, that single point of failure can wreak havoc if it falls. ### Metric – Exposure Concentration Index (ECI) We often measure concentration using the **Herfindahl–Hirschman Index (HHI)**: $$ \mathrm{HHI} = \sum_{i=1}^{N} s_i^2, $$ where \(s_i\) = fraction of total stake or security contributed by the \(i\)-th operator (or module). Higher HHI = higher concentration risk. - **Operator Concentration**: In **EigenLayer**, each restaker must delegate their entire restaked balance to exactly *one operator* ([source](https://governance.ether.fi/t/eigenlayer-vs-symbiotic-risk-analysis/2246#p-3753-deposits-and-stake-delegation-2)). If Operator A becomes popular (e.g., by offering high uptime), it can quickly accumulate a large fraction of the system’s stake. - **Service Concentration**: Similarly, if 60% of restakers pile into one high-yield AVS, a hack or bug there can cause enormous damage in one stroke. #### Real-World Data As of February 19, 2025, [restake.watch](https://restake.watch/) shows P2P controlling ~18.6% of EigenLayer’s restaked ETH, while other large staking providers follow close behind. Early analyses from Chaos Labs also warn that EigenLayer’s single-operator delegation may reinforce big-operator dominance ([source](https://governance.ether.fi/t/eigenlayer-vs-symbiotic-risk-analysis/2246#p-3753-risk-considerations-5)). #### Symbiotic’s Architecture Symbiotic segments restaking into **vaults**, each with multiple operators. Rather than forcing a restaker to choose one operator, a vault can split tasks among several. This inherently reduces the chance of a single operator controlling everything in that vault. #### Mitigations - **Caps & Permissioning**: EigenLayer set initial caps on certain tokens (like stETH) to limit dominance. Symbiotic’s vault owners can likewise cap operator shares or require multiple operators. - **User-Level Diversification**: Although EigenLayer doesn’t let a *single* deposit be split among operators, a staker can run multiple validator accounts to distribute risk. Symbiotic vaults often allow multi-operator setups by default. - **Monitoring**: Tools like [restake.watch](https://restake.watch/) track operator shares. A high HHI or a top-3 operator set controlling a majority signals centralization. **Summary**: **Exposure concentration** can unravel security if one big operator or module fails. EigenLayer’s one-operator model can accelerate concentration, while Symbiotic’s multi-operator vault design fosters distribution. Both rely on caps and vigilant community monitoring. ## 3. Contagion Risk: Cascading Failures Across Services One of the most *intriguing* yet *perilous* aspects of restaking is **contagion** — tying multiple AVSs to a common collateral pool. The following diagram summarizes the architecture and contagion risk fo Symbiotic and EigenLayer. ![contagion](https://hackmd.io/_uploads/Bkrcd-p5Je.png) ### How Contagion Emerges - **Cross-Service Slashing**: If an operator is slashed in one AVS, that *same stake* might be lost or compromised for the others they serve. - **Mass Exit**: An exploit in a single AVS can spark a panic. Restakers in *other* AVSs might withdraw en masse, fearing similar vulnerabilities. - **Shared Infrastructure**: Some protocols share “resolvers” or oracles. A compromise in that shared component might ripple across services. ### Metric – Overlap Coefficient (OC) To quantify how many stakers/operators overlap between AVSs \(j\) and \(k\): $$ \text{Overlap}(j,k) = \frac{\sum_{i \in I_{jk}} \text{stake}(i)}{\min(T_j,\; T_k)}, $$ where \(I_{jk}\) = the set of stakers in *both* AVS \(j\) and AVS \(k\). A high overlap suggests a potential for contagion. #### Symbiotic vs. EigenLayer - **Symbiotic**: Uses vault-level isolation. A slash in Vault X typically doesn’t affect stake in Vault Y ([source](https://blocksec.com/blog/eigenlayer-competitor-symbiotic)). This “compartmentalization” helps prevent chain reactions. - **EigenLayer**: Maintains a unified restaked pool. Slashing in one AVS lowers the staker’s overall stake, which in turn reduces their collateral for all other AVSs. If a heavily slashed operator can no longer meet the minimum for other AVSs, it might unravel multiple services. #### Hypothetical Cascade Imagine two major EigenLayer AVSs: a data-availability sidechain (Service A) and a DeFi oracle (Service B). An attack on Service A slashes 30% from 50 operators. Their stake is suddenly reduced, leading to shortfalls in Service B. B experiences outages or misreports, compounding the meltdown. #### Mitigations - **Encouraging Specialization**: Some operators might only serve a few AVSs to reduce correlated slash risk. - **Insurance Funds**: Protocols or third parties might insure honest operators who get slashed in an AVS bug, preventing systemic meltdown. - **Phased Onboarding & Limits**: EigenLayer’s early whitelisting effectively restricted the scope of any single slash event. Full permissionless operation must be accompanied by robust overlap monitoring. **Summary**: **Contagion risk** is unique to restaking, as multiple services share the same collateral. Symbiotic’s modular vaults are designed to fence off slash events. EigenLayer relies on partial slash caps and good operator management. Without careful planning, a single meltdown might cascade through the entire ecosystem. ## 4. Whitelisting Concentration Index (WCI) ### Metric – WCI Some AVSs enforce **whitelisting**, admitting only approved operators. If too many AVSs do this — and rely on the *same* small operator set — centralization risk grows. We define: $$ WCI = \frac{\sum_{i \in \text{Whitelisted AVSs}} \text{StakedCapital}_i}{\sum_{j \in \text{All AVSs}} \text{StakedCapital}_j}. $$ - **StakedCapital<sub>i</sub>** = total stake used to secure AVS \(i\). - “All AVSs” = every Actively Validated Service in the protocol. - “Whitelisted AVSs” = those requiring official governance approval or a team-based process to admit operators. A **high WCI** indicates heavy reliance on permissioned services, while a **low WCI** implies restakers are more distributed among open, permissionless AVSs. **Urgency**: High — Over-permissioning can lead to a handful of operators controlling a large share of restaked assets. **Data Availability**: Partial — The restake ecosystem is early; some whitelists are documented in forums or developer docs. Dashboards like [restake.watch](https://restake.watch/) are starting to track which AVSs are open vs. whitelisted. #### EigenLayer: Elevated WCI Early On Early EigenLayer AVSs typically whitelisted known professional validators (large staking firms, well-known node operators), driving up WCI. This ensures quality but fosters centralization if the same few operators are used across multiple whitelisted AVSs. Over time, EigenLayer aims for more permissionless operator registration, which *should* lower WCI. #### Symbiotic: Lower WCI via Vaults Symbiotic’s design decentralizes operator selection across many vaults. There is no single protocol-level “global whitelist.” Each vault or network can set its own rules — some are open, others whitelisted. Consequently, overall WCI at the protocol level is lower, though a large vault can still be permissioned. #### Implications & Mitigations - **Centralization**: If WCI remains high, a small group of whitelisted operators might effectively control restaking. - **Adaptive Whitelists**: AVSs can revise or expand their lists, or adopt performance-based metrics rather than manual approvals. - **User & Community Pressure**: Public dashboards showing a high WCI can motivate AVSs to open up. **Summary**: **Whitelisting** can protect against subpar operators early on, but over-reliance can undermine the decentralization that PoS is built on. EigenLayer started with a high WCI, while Symbiotic’s more fragmented approach keeps it relatively low at the protocol level. ## 5. Slashing & Technical Risks Slashing conditions and contract vulnerabilities undergird everything else. Even well-designed governance or operator distribution can fail if the code is flawed or the slashing rules are too harsh. ### Slashing Risk Probability & Impact Each AVS adds an additional slash risk on top of Ethereum’s base slash risk \((p_0)\). If each AVS has a slash probability \((p_i)\), the overall slash probability can be approximated as: $$ P_{\text{slash}} = 1 - \bigl(1 - p_{0}\bigr) \times \prod_{i=1}^{n} \bigl(1 - p_{i}\bigr). $$ Even if each \(p_i\) is small, multiple services can collectively raise the chance of an event. Worse, a severe slash in one AVS might remove an operator’s entire stake, effectively zeroing them out for all others. EigenLayer tries to cap the maximum slash, though if a restaker joins many AVSs, those slashes might add up unless carefully coordinated ([source](https://blocksec.com/blog/eigenlayer-competitor-symbiotic)). ### Smart Contract Vulnerabilities Both **EigenLayer** and **Symbiotic** rely on *complex* on-chain logic. A bug in the core contracts or bridging logic can lead to catastrophic fund losses. - **EigenLayer**: Maintains a “pause multisig” to freeze the system in emergencies ([source](https://www.blog.eigenlayer.xyz/stage-1-testnet-announcement/)). This is a centralizing measure but may protect user funds if exploited code is discovered. - **Symbiotic**: The base protocol is **immutable**, so no direct upgrade if a flaw surfaces. Vaults can be upgradable or fixed, depending on how each vault is designed. ### Case Study: No Major Incidents Yet As of this writing, neither protocol has suffered a large-scale slash or major contract exploit in production. The relative newness and partial whitelisting may have contained risk. But as more open AVSs appear, or more operators join, the risk surface expands. ### Mitigations - **Clear Slash Conditions**: So restakers fully understand the scenarios leading to partial or full slash. - **Audits & Bug Bounties**: Both EigenLayer and Symbiotic have had external audits; ongoing bounties can incentivize finding vulnerabilities early. - **Insurance**: Protocol-level or third-party providers (e.g., Nexus Mutual) might cover restaking, though offerings remain limited. - **Incremental Adoption**: Operators and stakers might avoid joining every AVS blindly, focusing on proven modules until trust is built. **Summary**: Slashing and technical risks are fundamental. No catastrophic events have occurred so far, but as restaking grows, so does the attack surface. Robust contract security and prudent slash frameworks are *essential* for maintaining confidence. ## 6. Withdrawal & Unbonding Risk When users un-stake from a restaking protocol, **withdrawal times**, **liquidity**, and **user behaviors** all shape *withdrawal & unbonding risk*. While EigenLayer enforces a **fixed 7-day withdrawal delay**, Symbiotic leaves it to each vault's design, and Karak uses a slightly longer universal window (9 days). This lock-in window guards against slashing evasion (i.e., stakers cannot immediately flee upon misbehavior) but also introduces potential *bottlenecks* and *liquidity strains* in a crisis. ### Withdrawal Times * **EigenLayer**: A staker wishing to exit must wait exactly **7 days**, during which funds remain slashable. Users cannot bypass this delay, ensuring EigenLayer can penalize misconduct before the stake fully exits. * **Symbiotic**: No protocol-wide queue exists. Instead, *each vault* sets its own unbonding period (which may be zero, a few days, or longer). This *flexibility* can mean faster exits but depends entirely on the vault's rules. * **Karak**: Adopts a **9-day queue**, combining a 7-day unbonding period with an added 2-day "final check" window. The extra step gives Karak governance a last chance to apply slashes if needed. ### Liquidity Concerns * **Market Liquidity**: Restaked assets—often ETH or LSTs—generally enjoy deep markets. However, during mass withdrawal events, the influx of sellers can temporarily push LSTs below their peg or reduce available trading depth. * **Queue Dynamics**: In EigenLayer, the 7-day wait is uniform: large exits can create a backlog that only materializes once funds are actually released. Symbiotic's per-vault approach segments liquidity, so one vault's exodus does not necessarily freeze withdrawals in another. * **Downstream Queues**: Some restakers receive LSTs (e.g., stETH) upon exit. If many choose to redeem those LSTs at once, they may face additional waiting times in the **underlying** protocol (like Lido), compounding delays. ### User Behavior in Stress Events * **Mass Exits**: In 2024, a controversial EigenLayer airdrop led to 12,000+ withdrawal requests in just 3 days, illustrating that *users do leave en masse* on negative news. The 7-day delay spread out actual exits, but confidence eroded quickly. * **Price Impacts**: A wave of withdrawals can trigger sell pressure on restaked tokens, amplifying price discounts. If these tokens trade below their intrinsic value, worried stakers might exit faster, creating self-reinforcing sell-offs. * **Comparisons**: Symbiotic and Karak have not yet experienced a large-scale exodus event, though similar "flight to safety" dynamics are expected if serious risks surface. ### Mitigations & Outlook 1. **Clear Unbonding Windows** – Protocols like EigenLayer standardize a 7-day wait, striking a balance between security and usability. Symbiotic's vault-specific rules offer flexibility but shift more due-diligence onto users. 2. **Liquidity Monitoring** – Tools such as restake.watch will track real-time exit queues and liquidity depth, helping stakers gauge market conditions before initiating a withdrawal. 3. **Potential Bottlenecks** – Even if protocol queues process withdrawals quickly, underlying LST redemption or Ethereum's beacon chain churn may still limit effective liquidity. ## 7. Liquidity Coverage Ratio (LCR) Borrowing a concept from banking, LCR in restaking measures an operator's ability to withstand stress (slashing events or rapid withdrawals) with available liquidity. We can define an operator's LCR as: $$\text{LCR}_{op} = \frac{\text{High-Quality Liquid Assets}}{\text{Potential Short-Term Liability}},$$ where "liquid assets" might be the operator's own reserves or insurance funds, and "liability" is the maximum slash or payout obligation over a short horizon. An LCR ≥ 1 (or 100%) means the operator could fully cover worst-case slashing losses with liquid capital on hand. In practice, operators improve LCR by holding extra ETH or stablecoins as a buffer, or via insurance guarantees [(source)](http://re7.capital). One common methodology is scenario analysis: assume a simultaneous market drop (e.g. ETH price plunges X%) and a max slash event (e.g. slash slashable stake). The operator's LCR is computed in that scenario – if it falls below 100%, the operator is deemed high-risk. This kind of analysis was discussed in governance forums, with suggestions that operators maintain "performance bonds" or insurance funds to cover slash losses [(source)](http://re7.capital). ### Collateral Diversification Impact A notable development is the diversification of collateral in restaking protocols, which directly impacts LCR. EigenLayer initially only accepted ETH/LSTs, but by late 2024 announced support for any ERC-20 (including stablecoins) [(source)](http://gauntlet.xyz). Symbiotic from day one allowed "flexible collateral", and Karak launched with "multi-asset restaking" [(Source)](http://gauntlet.xyz). The introduction of stablecoins (e.g. USDC) as restaking collateral is a game-changer for LCR. Stablecoins have deep liquidity and low volatility; if operators hold a portion of stake in a stablecoin, their high-quality liquid assets rise and liability volatility falls. Gauntlet's research confirms that adding stablecoin collateral "directly reduces portfolio volatility and improves network security" [(Source)](http://gauntlet.xyz) – effectively boosting LCR. On the flip side, operators face an opportunity cost: holding stable assets can mean lower yield, so many operators still prefer volatile LSTs for higher returns [(Source)](http://gauntlet.xyz). This tension is actively discussed in governance: protocols are weighing incentives (or requirements) for operators to hold some stablecoins to shore up their LCR. ### Market Downturn Resilience The tail end of 2024 saw increased crypto volatility, providing a live test for LCR models. Restaking analysts observed that "restaking frequently locks assets in illiquid forms, making it harder to exit positions during market volatility" [(source)](http://beincrypto.com). In practical terms, if the market crashed and many restakers tried to withdraw, operators would need enough liquid funds to facilitate exits or cover penalties. Symbiotic's design of independent vaults partly mitigates a liquidity crunch by allowing partial withdrawals (so stakers aren't forced to fully exit all at once) [(Source)](http://governance.ether.fi). EigenLayer, in contrast, initially required a full exit to change operators, meaning large sudden withdrawals could stress an operator's liquidity. This has led to calls for better transparency of operator reserves. Some large EigenLayer operators (e.g. professional validators like P2P.org) have even publicized their revenue-sharing or insurance programs to reassure restakers [(source)](http://re7.capital). In summary, if an operator's LCR is too low, both users and protocols are now quick to flag it as a red flag in risk reports [(source)](http://beincrypto.com). ## 8. Operator Performance Index (OPI) **Definition & Formulation:** The OPI quantifies a restaking operator's reliability by combining metrics like uptime, slashing history, and reputation into a single score. In practice, OPI can be modeled as a weighted composite. For example, one simple formulation is: $$\text{OPI} = w_u \cdot U + w_s \cdot (1 - S) + w_r \cdot R,$$ where $U$ is the operator's uptime ratio, $S$ is a normalized slashing rate (or fraction of stake slashed), and $R$ represents reputation or experience factors. Higher uptime and a clean slashing record yield a higher OPI. Recent efforts in the Ethereum staking community (e.g. Rated's RAVER benchmark) mirror this approach by scoring validators based on deterministic on-chain performance ([see here](http://liquidcollective.io)). * **With EigenLayer activating slashing**, performance data is finally becoming available. Community discussions emphasize that once slashing is live, *"that will be a massive factor in evaluating which operators are the most reliable"* ([here](http://avaprotocol.org)). In other words, an operator's OPI will heavily penalize any slashing events. Node operators are expected to maintain **99%+ uptime**, timely updates, and no slash incidents – effectively targeting an "OPI = 100" perfect score as some advertised on EigenLayer's forums ([see here](http://forum.eigenlayer.xyz)). * **Symbiotic launched a built-in reputation system**: vault owners can select operators based on performance, and operator rewards are explicitly tied to *"performance metrics (e.g., number of tasks completed, liveness, validator distribution)"* ([source](http://docs.symbiotic.fi)). This indicates Symbiotic's OPI is not just theoretical – it directly impacts earnings. **Karak** similarly stresses operator track record and safety. Although public data is limited, Karak's ethos is to favor proven operators and even offer insurance or guarantees to reduce expected loss ([see here](http://re7.capital)), which effectively boosts their OPI by instilling confidence. **Oval**, an emerging restaking solution (notably oriented around oracle MEV capture), places a twist on performance: here reliability in executing complex tasks (like timely liquidation transactions) is key. While Oval is new, we can expect its operator scoring to also factor in success rate of MEV captures alongside traditional uptime. Across all platforms, the trend is clear: **OPI is evolving into a formalized metric**. Industry panels have called for operators to be *"rewarded based on their performance metrics and uptime, reliability, and all those things, which builds up reputation over time"* ([here](http://avaprotocol.org)). Restake.watch is aiming to track OPI accross platforms. ## 9. Cross-Asset Price & Volatile Asset Risk (CAPVAR) CAPVAR represents the risk introduced by fluctuations in the prices of assets used in restaking – notably ETH, Liquid Staking Tokens (LSTs), and other volatile tokens. In essence, it's a cross-asset Value-at-Risk measure: how much an operator's stake (or a restaking system's security) could drop due to market volatility across multiple assets. A simple model for CAPVAR is to compute the variance of the collateral portfolio: $$\sigma^2_{\text{portfolio}} = \sum_{i,j} w_i w_j \text{Cov}(r_i, r_j),$$ where $w_i$ are the weights of assets in the stake and $\text{Cov}(r_i, r_j)$ are return covariances. High covariance (i.e. assets crashing together) or large weight in a very volatile asset will increase CAPVAR. ### Impact on Operator Stability Fluctuations in ETH and LST prices, for example, directly affect operator stability. Since restaked ETH/LST is the collateral that operators put at risk, a sharp price drop in these assets means the absolute value of stake securing each service shrinks (this without taking into account the new strategies added by EigenLayer such as EIGEN, PEPE, Renzo and others). Gauntlet's research formalized this: "a network's economic security is tied to the market value and liquidity profile of its collateral asset(s)" [(source)](http://gauntlet.xyz). If the variance of collateral returns increases (more CAPVAR), the threshold at which an attacker could corrupt the network lowers – making the system less secure [(source)](http://gauntlet.xyz). The big trend reducing CAPVAR is the inclusion of stablecoins and non-ETH assets in restaking. By mixing stablecoins (near zero volatility) with ETH (high volatility), an operator's overall stake volatility decreases. Gauntlet argues that a dual-staking model can "substantially improve risk-adjusted return for node operators while lowering volatility in security" [(source)](http://gauntlet.xyz). Some operators began voluntarily dual-staking with 80% staked ETH and 20% stablecoin to stabilize stake value, especially after Q1 2025 market volatility. With many assets in play, correlation risk becomes crucial. In stress scenarios, multiple assets can tumble together: ETH price falls, LSTs trade at a discount (e.g., stETH/ETH < 1), stablecoins potentially lose peg, more volatile assets like EIGEN and Renzo will further decrease in price. This worst-case correlation means CAPVAR can spike unexpectedly. Restaked assets can become "locked or less liquid…particularly in volatile market conditions" [(source)](http://blog.pancakeswap.finance). One emerging facet of CAPVAR is governance token volatility. Tokens like EIGEN can be more volatile than ETH, and if used as collateral, introduce feedback risk where price drops could make operators under-collateralized. Cross-chain restaking spreads risk to other ecosystems. Using volatile L1 tokens from another chain as Ethereum restaking collateral ties that chain's market fate to Ethereum's security. ### Summary Standardized risk metrics mean CAPVAR in [restake.watch](https://restake.watch/) might soon be reported similar to stress test results: "EigenLayer 30-day 95% CAPVAR = X ETH" indicating a 5% chance the collateral pool drops by X ETH in value, allowing comparison across platforms. CAPVAR encapsulates the inherent market risk in restaking. Fluctuations in ETH and other assets directly influence operator and network stability. Research shows that lowering volatility through asset diversification increases robustness [(source)](http://gauntlet.xyz), while exposure to volatile or correlated assets heightens destabilization risk. ## Conclusion Restaking represents a promising innovation that can strengthen blockchain security by allowing new services to leverage established networks like Ethereum. When implemented thoughtfully, it creates mutual benefits: emerging protocols gain robust security from day one, while stakers receive additional yield on their assets. However, our analysis identifies several key risk areas that must be addressed to prevent potential system-wide failures: 1. **Governance Vulnerability** Centralized control (like EigenLayer's early 8-of-12 multisig) creates bribery vectors, while Symbiotic's immutable core removes protocol-level capture risk. For restaking to remain robust, transparent and decentralized governance is essential. 2. **Stake Concentration** Excessive dependence on a few operators creates dangerous single points of failure. EigenLayer's single-operator delegation model can accelerate concentration, while Symbiotic's multi-operator vault design inherently distributes risk. Regular monitoring of concentration metrics is crucial. 3. **Contagion Prevention** The interconnected nature of restaking means failures can cascade across services. Symbiotic's vault-level isolation provides stronger compartmentalization, while EigenLayer's unified stake pool requires careful slash caps and monitoring. 4. **Technical Safeguards** Each additional service increases slash probability, and smart contract vulnerabilities could jeopardize large amounts of capital. Rigorous auditing, gradual scaling, and partial slash mechanisms are essential defenses. 5. **Asset Diversification** Including stablecoins and multiple asset types in restaking improves resilience against market volatility, enhancing the Liquidity Coverage Ratio and overall system stability. So far, the ecosystem has avoided catastrophic failures, and platforms are implementing various safeguards. Community tools like restake.watch and analyses from independent researchers are fostering greater transparency and awareness of these risks. As competition increases with new entrants like Karak and Oval, we may see further innovations in risk management and protocol design. Ultimately, restaking's success depends on thoughtful governance, technical rigor, and broad operator participation. With proper risk management, restaking can fortify blockchain security rather than causing it to falter. --- **Acknowledgments** This analysis would not have been possible without Eric Siu's unwavering mentorship, friendship, and guidance. His insights and support have been instrumental in shaping both this work and my professional journey. Thanks to community members in the EigenLayer forum for valuable feedback. This work was supported by the **Ethereum Foundation Ecosystem Support Program (ESP)**. Special appreciation to Lido and Obol Collective members who openly shared insights. *This is a living document. If you spot inaccuracies or have suggestions for improvement, please reach out. The restaking ecosystem evolves rapidly, and community input remains essential for robust risk assessment.* # Appendices ## Appendix A: Restaking Platform Feature Comparison This comparison highlights key architectural differences between EigenLayer and Symbiotic that impact their risk profiles: ![platform-comparison](https://hackmd.io/_uploads/r1di_WTqkx.png) Each design choice directly influences risk metrics discussed in the main analysis. ## Appendix B: Restaking Risk Heat Map This heat map compares EigenLayer and Symbiotic across seven key risk metrics: ![risk-heatmap](https://hackmd.io/_uploads/H11n_ZT9yg.png) Risk ratings are based on architectural design, on-chain data, technical documentation, and research on staking systems. Symbiotic generally shows lower risk due to its vault-based isolation design and immutable core, while EigenLayer has elevated risk in centralization and contagion areas.

Import from clipboard

Advanced permission required

Your current role can only read. Ask the system administrator to acquire write and comment permission.

This team is disabled

Sorry, this team is disabled. You can't edit this note.

This note is locked

Sorry, only owner can edit this note.

Reach the limit

Sorry, you've reached the max length this note can be.
Please reduce the content or divide it to more notes, thank you!

Import from Gist

Import from Snippet

or

Export to Snippet

Are you sure?

Do you really want to delete this note?
All users will lose their connection.

Create a note from template

Create a note from template

Oops...
This template is not available.
Upgrade
All
  • All
  • Team
No template found.

Create custom template

Upgrade

Delete template

Do you really want to delete this template?
Turn this template into a regular note and keep its content, versions, and comments.

This page need refresh

You have an incompatible client version.
Refresh to update.
New version available!
See releases notes here
Refresh to enjoy new features.
Your user state has changed.
Refresh to load new user state.

Sign in

Forgot password

or

By clicking below, you agree to our terms of service.

Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
Wallet ( )
Connect another wallet

New to HackMD? Sign up

Help

  • English
  • 中文
  • Français
  • Deutsch
  • 日本語
  • Español
  • Català
  • Ελληνικά
  • Português
  • italiano
  • Türkçe
  • Русский
  • Nederlands
  • hrvatski jezik
  • język polski
  • Українська
  • हिन्दी
  • svenska
  • Esperanto
  • dansk

Documents

Help & Tutorial

How to use Book mode

How to use Slide mode

API Docs

Edit in VSCode

Install browser extension

Get in Touch

Feedback

Discord

Send us email

Resources

Releases

Pricing

Blog

Policy

Terms

Privacy

Cheatsheet

Syntax Example Reference
# Header Header 基本排版
- Unordered List
  • Unordered List
1. Ordered List
  1. Ordered List
- [ ] Todo List
  • Todo List
> Blockquote
Blockquote
**Bold font** Bold font
*Italics font* Italics font
~~Strikethrough~~ Strikethrough
19^th^ 19th
H~2~O H2O
++Inserted text++ Inserted text
==Marked text== Marked text
[link text](https:// "title") Link
![image alt](https:// "title") Image
`Code` Code 在筆記中貼入程式碼
```javascript
var i = 0;
```
var i = 0;
:smile: :smile: Emoji list
{%youtube youtube_id %} Externals
$L^aT_eX$ LaTeX
:::info
This is a alert area.
:::

This is a alert area.

Versions and GitHub Sync
Upgrade to Prime Plan

  • Edit version name
  • Delete

revision author avatar     named on  

More Less

No updates to save
Compare
    Choose a version
    No search result
    Version not found
Sign in to link this note to GitHub
Learn more
This note is not linked with GitHub
 

Feedback

Submission failed, please try again

Thanks for your support.

On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

Please give us some advice and help us improve HackMD.

 

Thanks for your feedback

Remove version name

Do you want to remove this version name and description?

Transfer ownership

Transfer to
    Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

      Link with GitHub

      Please authorize HackMD on GitHub
      • Please sign in to GitHub and install the HackMD app on your GitHub repo.
      • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
      Learn more  Sign in to GitHub

      Push the note to GitHub Push to GitHub Pull a file from GitHub

        Authorize again
       

      Choose which file to push to

      Select repo
      Refresh Authorize more repos
      Select branch
      Select file
      Select branch
      Choose version(s) to push
      • Save a new version and push
      • Choose from existing versions
      Include title and tags
      Available push count

      Upgrade

      Pull from GitHub

       
      File from GitHub
      File from HackMD

      GitHub Link Settings

      File linked

      Linked by
      File path
      Last synced branch
      Available push count

      Upgrade

      Danger Zone

      Unlink
      You will no longer receive notification when GitHub file changes after unlink.

      Syncing

      Push failed

      Push successfully