Liquid Staking and the Control-Exposure Wedge
Discuss this preprint
Start a discussion What are Sciety discussions?Listed in
This article is not in any list yet, why not save it to one of your lists.Abstract
Proof-of-stake deters attacks by keeping validator stake exposed to slashing and depreciation losses. Liquid staking lets operators obtain voting power using pooled stake while reducing their own exposure by selling liquid staking tokens (LSTs) and shifting uncovered slashing losses onto token holders. We study the security implications of this control-exposure wedge and the protocol design problem it creates. Competitive LST pricing can partly deter attack by lowering the resale value of claims when risk rises, but it cannot fully restore deterrence because liquid staking participants do not internalize ETH-wide depreciation losses. A fee-charging protocol prefers the no-attack regime because it maximizes total stake, yet collateral requirements alone do not generally make that outcome unique. Robust security may therefore require additional tools, including permissioned participation, screening or reserve capacity.