Ecosystem Categories

This taxonomy organizes the vault ecosystem by primary function. Categories describe what protocols do; many protocols span categories.

Infrastructure

Infrastructure protocols provide frameworks enabling vault creation and operation.

Vault Platforms

General-purpose platforms offer configurable frameworks supporting multiple strategy types and integration options. These handle share accounting, fee collection, permission enforcement, and protocol integrations. (Examples: Enzyme, Aera, and others)

Protocol-Native Vaults

Some protocols embed vault functionality directly into their core product. Tight integration with underlying functionality but typically limited to strategies related to the host protocol. (Examples: Drift, Meteora)

Cross-Chain Infrastructure

Messaging and aggregation protocols enable vaults to operate across chain boundaries. Evaluate finality assumptions, message verification, custody points during transit, and outage behavior. (Examples: Superform, LayerZero)


Management and Curation

Firms operating strategies using vault infrastructure. They specialize in strategy design, market selection, and risk management. See Glossary for curator vs. manager distinction. (Examples: Gauntlet, Steakhouse Financial)


Lending and Yield

Protocols providing deployment destinations where vault capital earns returns.

Lending Protocols

Facilitate borrowing and lending. Returns depend on borrowing demand and utilization. (Examples: Morpho, Kamino)

Yield Aggregators

Automate allocation across multiple yield sources. (Examples: Yearn, Beefy)

Staking and Restaking

Returns from network security participation. Restaking uses already-staked assets to secure additional networks. Evaluate slashing conditions and maximum exposure, operator selection criteria, and cross-network slashing dependencies. (Examples: Symbiotic)


Asset Tokenization

Protocols bringing traditionally offchain assets Onchain.

Treasury Securities

Tokenized exposure to sovereign debt yields. (Examples: Ondo, OpenEden)

Tokenization Platforms

Infrastructure for bringing various asset types Onchain. (Examples: Centrifuge, Securitize)

Private Credit

Onchain lending to institutional borrowers. Higher yields but with credit risk, counterparty risk, and reduced liquidity. (Examples: Maple, Clearpool)


Tooling

Operational support across other categories.

Security Monitoring

Threat detection and alerting. (Examples: Hypernative, Guardrail)

Key Management

Cryptographic key generation, storage, and use. (Examples: Safe, Fireblocks, Squads)

Access Control

Policy enforcement and permission management. (Examples: Zodiac Roles Modifier)


Category Boundaries

Some protocols defy clean categorization:

Vertical integration: A protocol may be infrastructure for some users and a managed product for others.

Hybrid models: A single protocol may provide infrastructure, operate strategies, and access its own markets.

When evaluating, identify which layer(s) a protocol actually occupies regardless of how it describes itself.