Understanding Risk

Vault risk comprises distinct categories that interact under stress. Effective evaluation requires disaggregating these components and understanding how they compound.

Risk Categories and Indicators

Smart Contract Risk

Onchain vaults are implemented as smart contracts (often alongside offchain operational components). Bugs can cause loss regardless of strategy soundness.

What to look for:

  • Audit coverage: which components, which firms, how recently

  • Formal verification of critical paths

  • Bug bounty program (size should be commensurate with TVL at risk)

  • Track record: time holding significant value, ideally through at least one market stress event

Rough heuristics (not universal standards):

  • Multiple audits from firms with track records auditing comparable TVL and complexity

  • Active bug bounty program

  • Operating history through varying market conditions

Oracle Risk

Strategies depending on price feeds inherit manipulation and failure risks.

What to look for:

  • Which oracle providers are used

  • Integrity checks: staleness thresholds, confidence intervals, reference price comparison

  • Fallback behavior when feeds fail

  • Flow-through risk from underlying protocols

Rough heuristics (strategy-dependent):

  • Multiple price sources with divergence checks

  • Staleness thresholds appropriate to strategy cadence (tighter for fast-moving collateral, looser for stable assets)

  • Documented fallback procedures

Governance and Upgrade Risk

Authorized parties can change behavior at two distinct levels (see Architecture: Two Levels of Trust).

Protocol-level governance risk:

  • Who holds the contract/program upgrade authority?

  • Can the protocol team change the code that is affecting all vaults?

  • What timelock constrains protocol upgrades?

  • What is the protocol’s governance track record?

Vault-level governance risk:

  • Who owns this specific vault?

  • What timelocks apply to vault configuration changes?

  • Can the vault owner change delegate permissions, enabled integrations, or fee settings?

  • What emergency capabilities exist at the vault level?

What to look for at each level:

  • Upgrade/configuration authority held by multi-sig with at least one independent signer

  • Timelocks on risk-increasing changes exceeding your review and exit process

  • Separation between upgrade authority and operational authority

  • Documented governance procedures

Delegate and Operational Risk

Human error and operational failures cause losses even when code is sound.

What to look for:

  • Delegate permission scope

  • Onchain thresholds (or absence thereof)

  • Key management practices

  • Incident response capability

Delegate trust concentrates here: In some architectures, delegates may operate with limited onchain constraints. A delegate with broad allocation permission may be able to concentrate exposure heavily (potentially to a single integration) unless constrained by onchain caps/policies. Trust in delegates is essential; monitoring and quick revocation capability are the mitigations.

Contagion Risk

Problems in shared infrastructure can affect multiple vaults.

What to look for:

  • Vault isolation guarantees

  • Integration isolation (per-vault enablement vs. automatic)

  • Protocol-level shared components

  • Dependency chains

Liquidity Risk

Depositors cannot exit at fair value when desired.

What to look for:

  • Withdrawal mechanism type

  • Historical withdrawal times

  • Behavior during high redemption demand

  • Underlying position liquidity

Insurance and Coverage

Some protocols offer or integrate with coverage mechanisms.

What to look for:

  • Does the protocol have coverage (via external provider or in-house insurance fund)?

  • What events are covered vs. excluded?

  • What is the coverage limit relative to TVL?

  • What is the claims process and historical payout record?

Compared to many traditional fund managers (who may carry errors-and-omissions coverage and/or fidelity bonds), vault coverage is less standardized and often narrower in scope (commonly focused on smart contract exploit coverage, when present). Coverage does not eliminate risk but may reduce loss severity for covered events.

MEV Exposure

Vault transactions can lose value to front-running, sandwich attacks, and other transaction ordering exploits.

What to look for:

  • Swap execution quality (slippage, routing)

  • Liquidation exposure in lending strategies

  • Rebalancing predictability (can strategies be front-run?)

  • Use of private mempools or MEV protection

MEV exposure affects net returns and can compound during high-volatility periods.

Tokenized assets carry legal structure risks beyond smart contract risk.

What to evaluate:

  • Bankruptcy remoteness: Is the token holder’s claim protected if the issuer fails?

  • Redemption rights: What are the contractual redemption mechanics and timelines?

  • Governing law: What jurisdiction governs disputes? Is it enforceable?

  • Regulatory status: What regulatory regime applies, and is distribution/transfer compliant in relevant jurisdictions (e.g., registration, exemptions, or restrictions)?

Stress Scenarios

These risks interact under stress:

Market crash with high redemptions: Liquidity queues extend. Oracle feeds may lag. Curator response becomes critical. Underlying protocol pauses cascade.

Exploit in integrated protocol: Smart contract losses flow through. Affected positions may be unrecoverable. Emergency response speed matters.

Compromised curator key: Malicious transactions possible within delegate authority. Revocation speed determines damage.

Monitoring Triggers

MetricReview TriggerExit Trigger
Withdrawal queue depth (if applicable)Exceeds documented range or your established baselineExceeds documented maximum or growing unboundedly
Operator/maintainer response timeDelayed response to material eventsNo response to critical events
Concentration (venue/asset/market)Approaching defined limitsExceeds risk tolerance thresholds
Governance/admin actionsAny risk-increasing change (proposal or executed action)Unexpected timelock bypass, rushed upgrade, or concerning executed change
TVL changeUnusual pattern vs peers/baselinePersistent abnormal outflows or sharp liquidity deterioration without clear explanation

These thresholds are illustrative. Appropriate triggers depend on vault architecture, your liquidity needs, and risk tolerance. Define your triggers before they are needed.