How Does Symbiotic Work?
A restaking protocol backed by Paradigm ($29M raised) that lets you restake any token (not just ETH) to secure external services. It holds $1B in deposits. Its C+ grade reflects a permissionless design where anyone can create vaults with custom slashing rules, opening the door to traps for unsuspecting depositors.
TVL
$478M
Sector
Restaking
Risk Grade
C+
Value Grade
D
Core Mechanisms
Restaking/Permissionless-Vaults
NovelModular vault architecture with configurable accounting, slashing, and delegation modules
Symbiotic vaults are composable smart contracts with three specialized modules (Accounting, Slashing, Delegation) that can be independently configured per deployment, enabling permissionless creation of restaking strategies.
Restaking/Multi-Asset
NovelPermissionless collateral acceptance beyond ETH and LSTs
Unlike EigenLayer's ETH-only model, Symbiotic accepts any ERC-20 token as restaking collateral, broadening the collateral base but introducing heterogeneous risk profiles.
Slashing/Resolver
NovelResolver-mediated slashing with configurable veto windows per vault
Resolvers monitor slashing requests from network middleware and can veto within configurable epoch windows. Each slashing request has its own deadline, adding a novel dispute layer.
Delegation/Configurable
NovelMulti-strategy delegation supporting MN-SO, SN-MO, and SN-SO isolation patterns
Vault delegation modules support multiple isolation strategies: Multi-Network Single-Operator (operator isolation), Single-Network Multi-Operator (network isolation), and Single-Network Single-Operator (maximum isolation).
Restaking/Shared-Security
Network-defined security models with customizable collateral and operator selection
Networks define their own security parameters including collateral types, operator requirements, and slashing mechanics while using Symbiotic as a neutral coordination layer.
Operator/Registration
Permissionless operator registration with network-specific opt-in
Operators register on-chain and opt into specific networks. Networks can set minimum stake requirements and custom validation logic.
Staking/Epoch
Epoch-based stake capture with delayed withdrawal windows
Stake changes take effect at epoch boundaries. Withdrawals are subject to configurable delay periods to prevent rapid unstaking before slashing events.
Governance/DAO
DAO governance with planned token launch in 2026
Protocol is currently governed by the founding team with plans for decentralized governance post-TGE. Token economics and governance mechanics remain undefined.
How the Pieces Interact
Anyone can create vaults accepting arbitrary ERC-20 tokens with custom slashing conditions. Poorly configured vaults with illiquid or volatile collateral create systemic risk if they attract significant deposits.
Operators validating multiple networks share the same staked collateral. A slashing event on one network reduces security guarantees for all other networks using the same operator, creating contagion risk.
If resolvers are compromised or collude with operators, legitimate slashing requests can be vetoed, undermining the economic security guarantees that networks depend on.
Complex delegation configurations across multiple networks create timing windows where stake is committed but slashing conditions are ambiguous, especially during epoch transitions.
Low barriers to operator entry combined with multi-network opt-in incentivize operators to over-commit to maximize yield, concentrating correlated risk in under-capitalized operators.
What Could Go Wrong
- Permissionless vault creation allows uncurated risk exposure to poorly configured slashing conditions
- Multi-network restaking creates correlated slashing risk across shared operator sets
- Pre-TGE protocol with unproven token economics and governance mechanisms
Permissionless Vault Toxic Collateral Trap
ElevatedTrigger: Adversarial actor creates permissionless vaults accepting illiquid ERC-20 tokens with custom slashing conditions, attracts $50M+ in deposits, then triggers slashing via compromised resolver collusion
- 1.Attacker creates vaults accepting volatile/illiquid ERC-20 tokens with aggressive yield marketing — Retail depositors deposit $50M+ chasing high yields without understanding custom slashing parameters
- 2.Vault is delegated to networks with harsh slashing conditions set by the attacker — Slashing conditions are opaque to depositors; resolver is controlled by or colluding with the attacker
- 3.Attacker triggers slashing conditions; resolver approves the slash instead of vetoing — Depositors' collateral is slashed and distributed according to attacker-defined parameters
- 4.Illiquid token collateral cannot be sold at fair value during the slash — Depositors face 50-100% loss as slashing + illiquidity compounds
- 5.Trust in permissionless vault model collapses — TVL flight from all Symbiotic vaults as users question slashing parameter safety
Risk Profile at a Glance
Overall: C+ (41/100)
Lower score = safer