{"id":6433,"date":"2022-08-16T03:21:30","date_gmt":"2022-08-16T03:21:30","guid":{"rendered":"http:\/\/cryptoheretostay.com\/?p=6433"},"modified":"2022-08-16T03:21:31","modified_gmt":"2022-08-16T03:21:31","slug":"lets-stop-trying-to-be-liquidity-protocols","status":"publish","type":"post","link":"https:\/\/cryptoheretostay.com\/?p=6433","title":{"rendered":"Let\u2019s stop trying to be liquidity protocols"},"content":{"rendered":"<p> <script type=\"text\/javascript\">\r\namzn_assoc_placement = \"adunit0\";\r\namzn_assoc_tracking_id = \"totafreearti-20\";\r\namzn_assoc_ad_mode = \"search\";\r\namzn_assoc_ad_type = \"smart\";\r\namzn_assoc_marketplace = \"amazon\";\r\namzn_assoc_region = \"US\";\r\namzn_assoc_default_search_phrase = \"crypto\";\r\namzn_assoc_default_category = \"All\";\r\namzn_assoc_search_bar = \"false\";\r\namzn_assoc_title = \"\";\r\namzn_assoc_rows =\"1\";\r\n<\/script>\r\n<script src=\"\/\/z-na.amazon-adsystem.com\/widgets\/onejs?MarketPlace=US\"><\/script><br \/>\n<\/p>\n<p>After a number of large-scale exploits of bridges, a lot of oxygen is being given to the narrative that cross-chain technology is inherently flawed \u2014 that cross-chain interoperability means risk. With an estimated $2 billion lost across 13 bridge hacks this year, it\u2019s becoming increasingly difficult to ignore this argument.<\/p>\n<p>At deBridge, we think that it\u2019s not only imperative but inevitable that all cross-chain bridges completely rethink their approach to liquidity aggregation.<\/p>\n<h2>The limitations of locked liquidity<\/h2>\n<p>By locking liquidity to provide cross-chain routing (as almost every bridge does right now), bridges have placed themselves in a competition they\u2019re bound to lose. We\u2019re seeing bridges face off against established, purpose-built liquidity protocols like AAVE, Compound, and Frax, projects that will undoubtedly monetize liquidity more effectively and securely. Examples abound of bridges with hundreds of millions of dollars in TVL, with extremely low utilization of locked liquidity.<\/p>\n<p>With this design, bridge projects are forced into running unsustainable liquidity mining campaigns that fail to offer long-term capital efficiency solutions. Unless token incentives are maintained indefinitely \u2014 an unsound ambition for any project \u2014 liquidity providers will inevitably remove capital to pursue higher-yielding opportunities.<\/p>\n<p>To aggregate liquidity safely, bridges would need to acquire insurance policies to let liquidity providers have the ability to hedge risks. This is another expense that makes liquidity monetization even more difficult. That\u2019s why most existing bridges are not profitable, as costs and paid liquidity mining rewards often exceed the protocol\u2019s net profit.<\/p>\n<p>There are also architectural considerations at play here, given that a cross-chain value transfer is a request that can be settled in different ways. All existing bridges settle these orders from their own liquidity pools where liquidity is continuously locked when it\u2019s needed only at the precise moment the value transfer should be fulfilled.<\/p>\n<p>The size of the order can also differ \u2014 if it exceeds the size of the bridge\u2019s liquidity pool, then the sender will end up with wrapped tokens or an indefinitely suspended\/stuck transaction. On the other hand, if the order is too small for the liquidity pool\u2019s size, the liquidity utilization is very low and inefficient. This vicious circle further highlights that this liquidity protocol approach to bridge design is ineffective and fundamentally wrong.<\/p>\n<h2>Solving the security problem<\/h2>\n<p>As important of an issue as this is, economic unsustainability is not the only main challenge here. Even supposing bridges figured out a way to use the locked liquidity approach and stay capital-efficient, by now, it\u2019s evident that building a secure liquidity protocol is an all-consuming task. Indeed, by knowingly or unknowingly becoming liquidity protocols, bridge projects are giving themselves the immense task of safeguarding a multi-faceted attack surface.<\/p>\n<p>To start high level, one of the evident issues with a locked liquidity-style bridge is that it creates a risk-multiplier effect, where the vulnerabilities of one supported chain can spill over to compromise capital held in other ecosystems.<\/p>\n<p>Here, there\u2019s the issue of security by proxy. A bridge can have its entire liquidity base compromised if there\u2019s a potential vulnerability in the codebase of one supported blockchain\/L2. We saw this possibility earlier this year with a vulnerability discovered in Optimism, which would have allowed attackers to mint an arbitrary quantity of assets and foreseeably exchange these for tokens in other ecosystems.<\/p>\n<p lang=\"en\" dir=\"ltr\">Last week, I discovered (and reported) a critical bug (which has been fully patched) in @optimismPBC (a &#8220;layer 2 scaling solution&#8221; for Ethereum) that would have allowed an attacker to print arbitrary quantity of tokens, for which I won a $2,000,042 bounty. https:\/\/t.co\/J6KOlU8aSW<\/p>\n<p>\u2014 Jay Freeman (saurik) (@saurik) February 10, 2022<\/p>\n<p>Again, any issues with the consensus mechanism of one chain can also lead to systemic contagion, putting at risk any liquidity locked in other supported chains. In this case, the bridge simply broadcasts the exploit to other chains. This could include 51% attacks or other protocol-level failures.<\/p>\n<p>Aside from these types of inherited risks, we\u2019re increasingly seeing situations where mistakes by the bridge projects themselves have, in one way or another, causing a loss of locked liquidity. From botched protocol upgrades, poor smart contract design, or compromised infrastructure of validators, there are many scenarios where bad actors can exploit vulnerabilities in the bridge itself.<\/p>\n<p>All these risks are quickly compounded and \u2014 as we\u2019ve seen on too many occasions \u2014 are eventually born by liquidity providers when they lose the redeemability of their wrapped assets. Such a possibility should be unacceptable.<\/p>\n<p>Few are denying the vast promise of cross-chain interoperability to push Web3 adoption to new heights. But with the sheer size and frequency of bridge exploits, it has become painfully clear that the fundamental design of bridging technology needs to be reimagined from first principles. The bridge-turned-liquidity-protocol design just isn\u2019t working.<\/p>\n<p>Is there any way we can devise a fundamentally new and unique approach to bridge design, one that completely removes risks for liquidity providers, eliminates attack vectors, and at the same time preserves the highest level of capital efficiency?<\/p>\n<p>There may be exactly that in the near future. At deBridge, we are working on a new cross-chain liquidity routing that solves all these problems. Stay tuned.<\/p>\n<p>   Guest post by Alex Smirnov from deBridge Finance<\/p>\n<p>Alex Smirnov is a mathematician, researcher, developer, and blockchain enthusiast. He\u2019s the CEO and Co-Founder of deBridge, a generic messaging and cross-chain interoperability protocol, where he focuses on protocol design, product management, partnerships, and operations. Alex co-founded Phenom, a blockchain research, and development company, and he has also led a team that has won numerous hackathons and developed various blockchain solutions and dApps.<\/p>\n<p> Learn more \u2192<\/p>\n<h2>Get an Edge on the Crypto Market \ud83d\udc47<\/h2>\n<p>Become a member of CryptoSlate Edge and access our exclusive Discord community, more exclusive content and analysis.<\/p>\n<p>  <strong>On-chain analysis<\/strong><\/p>\n<p>  <strong>Price snapshots<\/strong><\/p>\n<p>  <strong>More context<\/strong><\/p>\n<p> Join now for $19\/month Explore all benefits<br \/>\n<br \/><script type=\"text\/javascript\">\r\namzn_assoc_placement = \"adunit0\";\r\namzn_assoc_tracking_id = \"totafreearti-20\";\r\namzn_assoc_ad_mode = \"search\";\r\namzn_assoc_ad_type = \"smart\";\r\namzn_assoc_marketplace = \"amazon\";\r\namzn_assoc_region = \"US\";\r\namzn_assoc_default_search_phrase = \"bitcoin\";\r\namzn_assoc_default_category = \"All\";\r\namzn_assoc_search_bar = \"false\";\r\namzn_assoc_title = \"\";\r\namzn_assoc_rows =\"1\";\r\n<\/script>\r\n<script src=\"\/\/z-na.amazon-adsystem.com\/widgets\/onejs?MarketPlace=US\"><\/script><br \/>\n<br \/><a href=\"https:\/\/cryptoslate.com\/reimagining-cross-chain-bridges-lets-stop-trying-to-be-liquidity-protocols\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After a number of large-scale exploits of bridges, a lot of oxygen is being given to the narrative that cross-chain technology is inherently flawed \u2014 that cross-chain interoperability means risk. With an estimated $2 billion lost across 13 bridge hacks this year, it\u2019s becoming increasingly difficult to ignore this argument. At deBridge, we think that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6434,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wp_rev_ctl_limit":""},"categories":[3],"tags":[],"class_list":["post-6433","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethereum-news"],"_links":{"self":[{"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=\/wp\/v2\/posts\/6433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6433"}],"version-history":[{"count":1,"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=\/wp\/v2\/posts\/6433\/revisions"}],"predecessor-version":[{"id":6435,"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=\/wp\/v2\/posts\/6433\/revisions\/6435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=\/wp\/v2\/media\/6434"}],"wp:attachment":[{"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoheretostay.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}