Liquid Staking and the Control-Exposure Wedge

Read the full article See related articles

Discuss this preprint

Start a discussion What are Sciety discussions?

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

Proof-of-stake deters attacks by keeping validator stake exposed to slashing and depreciation losses. Liquid staking lets operators obtain voting power using pooled stake while reducing their own exposure by selling liquid staking tokens (LSTs) and shifting uncovered slashing losses onto token holders. We study the security implications of this control-exposure wedge and the protocol design problem it creates. Competitive LST pricing can partly deter attack by lowering the resale value of claims when risk rises, but it cannot fully restore deterrence because liquid staking participants do not internalize ETH-wide depreciation losses. A fee-charging protocol prefers the no-attack regime because it maximizes total stake, yet collateral requirements alone do not generally make that outcome unique. Robust security may therefore require additional tools, including permissioned participation, screening or reserve capacity.

Article activity feed