Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
liquid-staking-and-the-restaking-revolution
Blog

Why Shared Security Models Inevitably Lead to Rent Extraction

An analysis of the economic forces within shared security markets like EigenLayer, predicting centralization into dominant liquidity hubs and operator cartels that extract value from both Actively Validated Services and restakers.

introduction
THE RENT EXTRACTION

The Security Marketplace Illusion

Shared security models, from restaking to modular chains, inevitably centralize and monetize trust, creating extractive middlemen.

Security is not a commodity. Protocols like EigenLayer and Babylon sell security as a fungible resource, but validator trust and slashing conditions are inherently non-fungible and application-specific.

The marketplace centralizes risk. Aggregating thousands of Actively Validated Services (AVSs) onto a single set of operators creates systemic, correlated failure points, contradicting decentralization goals.

Economic models extract value. The restaking yield is rent paid by AVSs for diluted, non-dedicated security, a worse product than a dedicated validator set.

Evidence: The slashing risk for an AVS like EigenDA is negligible versus its staked ETH value, creating a massive subsidy from the Ethereum validator set.

thesis-statement
THE RENT EXTRACTION

The Inevitable Centralization Thesis

Shared security models, from staking pools to rollup sequencers, create economic gravity that inevitably pulls value and control to centralized hubs.

Economic gravity centralizes staking. Delegated Proof-of-Stake (DPoS) and liquid staking derivatives (LSDs) like Lido and Rocket Pool create a winner-take-most market. Capital efficiency demands delegation to the largest, most reliable operators, creating systemic risk and fee extraction layers.

Sequencer markets follow the same pattern. Optimistic and ZK-rollups initially decentralize execution, but their shared sequencer sets (e.g., Espresso, Astria) will consolidate. High-throughput, low-latency block building is a commoditized service where scale and MEV capture determine the winner.

The endpoint is a regulated utility. The final form of a shared security provider is a licensed financial infrastructure business. Entities like Figment or Coinbase Cloud will dominate by offering compliance, insurance, and enterprise SLAs, extracting rent for 'security-as-a-service'.

Evidence: Lido's >30% Ethereum stake. This dominance creates a protocol risk threshold that new stakers cannot compete with on cost, forcing further centralization. The economic design of shared security guarantees this outcome.

market-context
THE INCENTIVE MISMATCH

The Current State: Early Cartel Formation

Shared security models, from Lido to EigenLayer, structurally incentivize a small group of operators to capture and extract value from the networks they secure.

Shared security creates oligopolies. Protocols like Lido (stETH) and EigenLayer (restaking) concentrate economic power in a few node operators to achieve credible neutrality. This concentration is a feature, not a bug, for initial adoption but establishes a cartel that controls pricing and access.

Rent extraction is the logical endpoint. The capital efficiency of pooled security creates a winner-take-most market. Operators like Figment and Kiln, who dominate both Lido and EigenLayer, can dictate fees and protocol inclusion, turning a public good into a private toll booth.

The data proves centralization. Over 32% of all staked ETH is controlled by Lido, and its top 5 node operators command a majority of that stake. This voting bloc can influence governance across DeFi, from Aave to Uniswap, creating systemic risk.

The counter-argument of slashing fails. Slashing mechanisms punish individual operator misbehavior but do not deter cartel collusion. A dominant group can collectively raise fees or censor transactions without triggering a slashing penalty, extracting rent passively.

THE RENT EXTRACTION MATRIX

The Concentration Metrics: TVL & Operator Share

Quantifying the economic centralization and rent extraction potential in leading shared security models.

Metric / MechanismEthereum (L1)Cosmos (Consumer Chains)Polygon CDK (Shared Sequencer)Solana (Single Sequencer)

Validator/Operator Count

~1,000,000 (stakers)

~180 (per chain, avg.)

1 (planned, initially)

~2,000 (delegated to ~30)

Top 5 Operator/Validator Share of TVL/Stake

~33%

60% (typical)

100% (initial phase)

33%

Protocol Revenue Capture by Operators

~15% (priority fees + MEV)

90% (gas fees + MEV)

100% (sequencer fees + MEV)

50% (priority fees + MEV)

Exit Cost for User (Slashing Risk)

None (unstake & withdraw)

High (IBC transfer, unbonding)

Very High (Bridge withdrawal delay)

None (liquid stake tokens)

Economic Security (TVL) / Throughput (TPS)

$112B / ~15 TPS

$50M (avg chain) / ~1k TPS

N/A (new) / ~10k TPS (claimed)

$5B / ~2k TPS

Rent Extraction Vector

MEV, Priority Fees

High Gas Fees, MEV, Governance

Sequencer Censorship, MEV, Fee Skimming

MEV, Compute Unit Priority Fees

User Sovereignty Over Execution

Native Interop for Value Escape

deep-dive
THE INCENTIVE MISMATCH

The Mechanics of the Squeeze

Shared security models create a structural incentive for the security provider to extract value from the applications built on top of it.

The provider becomes a monopolist. A shared security provider, like a major L1 or an EigenLayer AVS, controls a critical resource. This creates a classic platform dynamic where the provider can dictate terms and raise prices after applications achieve lock-in.

Revenue capture is asymmetric. The security provider's revenue is a direct tax on the economic activity of the applications, like rollup sequencer fees on Arbitrum or Optimism. The provider's incentive is to maximize this tax, not the application's success.

Applications face commoditization. On a shared security layer, applications compete on an identical cost basis. This erodes differentiation and forces competition on thin margins, while the security provider's margin remains protected.

Evidence: The Celestia vs. Ethereum DA fee war demonstrates this. Rollups using Celestia pay ~$0.01 per MB for data availability, creating direct cost pressure on Ethereum's ~$100+ per MB blob fees, proving the extractive potential of the incumbent.

counter-argument
THE MISPLACED FAITH

The Optimist's Rebuttal (And Why It Fails)

The argument for shared security as a public good ignores its inherent economic incentives for rent extraction.

Security is a commodity that providers will bundle with proprietary services to create lock-in. The Cosmos Hub's Interchain Security model demonstrates this, where the ATOM token's value accrual is tied to selling its security to consumer chains, creating a clear revenue stream for the hub at the expense of sovereign economics.

Economic gravity centralizes validation power. A dominant provider like EigenLayer attracts the most stake, creating a re-staking monopoly that dictates pricing and slashing terms. Competing providers cannot offer cheaper security without a comparable stake pool, leading to an oligopoly.

The 'public good' fails because the provider's profit motive directly conflicts with the rollup's need for cheap, neutral security. This is identical to the AWS cloud model, where initial discounts evolve into inescapable, high-margin infrastructure bills as migration costs become prohibitive.

Evidence: In Cosmos, the Neutron chain pays ~$1M annually in ATOM inflation to the hub's validators for security. This is pure rent extraction, as Neutron's own token holders derive no governance rights or fee revenue from this mandatory payment.

risk-analysis
THE RENT-SEEKING ARCHITECTURE

Systemic Risks of Concentrated Security

Shared security models like restaking and modular data layers centralize trust, creating single points of failure and economic capture.

01

The EigenLayer Dilemma

Restaking transforms Ethereum's $100B+ staked ETH into a systemic risk vector. Every new Actively Validated Service (AVS) creates a new slashing condition, increasing validator complexity and failure correlation. The model incentivizes validators to chase the highest yield across AVSs, not the security of the base chain.

$20B+
TVL at Risk
100+
AVS Slashing Vectors
02

Data Availability Cartels

Modular chains rely on a handful of Data Availability (DA) layers like Celestia and EigenDA. This creates a commoditized security market where DA providers compete on price, not robustness. The result is a race to the bottom on data guarantees, with rollups bearing the systemic risk of data withholding attacks for marginal fee savings.

~$0.50
Per MB DA Cost
3-5
Dominant Providers
03

Sequencer Extortion

Rollups using centralized sequencers (e.g., most OP Stack chains) or shared sequencer sets (like Espresso, Astria) create a rent-extracting chokepoint. They control transaction ordering, enabling Maximal Extractable Value (MEV) capture and censorship. Decentralization roadmaps are perpetually delayed as revenue from these privileges accrues.

>90%
Rollups w/ Centralized Seq.
$200M+
Annual MEV Potential
04

The Interchain Security Mirage

Cosmos's Interchain Security (ICS) and similar models promise to secure small chains with a large validator set (e.g., from Cosmos Hub). In practice, validators are rational actors; they secure low-TVL consumer chains only if subsidies exceed risk. This leads to security mercenaries who abandon chains the moment incentives dry up.

<1%
Hub Stake Delegated
High Churn
Consumer Chain Attrition
05

LST Monopolies & Liquidity Traps

Liquid Staking Tokens (LSTs) like Lido's stETH create voting power concentration. The dominant LST protocol's governance can influence the underlying chain (e.g., Ethereum consensus). Furthermore, restaking protocols like EigenLayer preferentially accept major LSTs, creating a feedback loop that entrenches the largest players and stifles competition.

>30%
Lido's ETH Staking Share
Feedback Loop
LST -> Restaking -> Power
06

Solution: Aggressive Specialization

The antidote to rent extraction is sovereign, app-specific security. Monolithic chains like Solana and app-specific rollups with dedicated validator sets (e.g., dYdX Chain) internalize security costs and incentives. They avoid the complexity and misaligned incentives of shared security models, trading marginal cost efficiency for existential safety.

Zero
External Slashing Risk
Aligned Incentives
Validators = Users
future-outlook
THE INCENTIVE MISMATCH

The Endgame: Regulated Utilities & Fragmented Niches

Shared security models centralize economic power, creating rent-seeking utilities that force application developers into fragmented, specialized chains.

Security as a rent-extracting service is the endgame for monolithic L1s and shared sequencers. The provider controls the core economic engine, forcing applications to pay recurring fees for a bundled product they cannot customize or fork.

Application-specific chains fragment as a direct response to this rent extraction. Projects like dYdX and Aevo migrate from L2s to their own stacks to capture MEV, control upgrades, and own their user relationships.

The L2/L3 narrative accelerates fragmentation. Arbitrum Orbit, OP Stack, and Polygon CDK are franchise models that monetize security while offloading execution complexity, creating a landscape of interoperable but isolated fiefdoms.

Evidence: Ethereum's dominance as a settlement layer proves the model. L2s pay ~1,000 ETH daily in sequencing fees and bridge costs to Ethereum validators, a pure rent for security that application chains now seek to avoid.

takeaways
THE RENT-SEEKING TRAP

TL;DR for Protocol Architects

Shared security models, from Cosmos to EigenLayer, create centralized economic chokepoints that inevitably extract value from the chains they secure.

01

The Validator Cartel Problem

Delegated security concentrates stake among a few large validators (e.g., top 10 validators control >60% of stake on major Cosmos chains). This creates a pricing cartel for block space and MEV, forcing chains to pay above-market rates for a commoditized service.\n- Economic Capture: Validators prioritize their own profits over chain health.\n- Governance Vulnerability: Cartels can censor or manipulate governance votes.

>60%
Stake Controlled
10-20%
Fee Premium
02

EigenLayer's Rehypothecation Risk

EigenLayer's restaking model creates systemic risk by allowing the same capital to secure multiple services, from Ethereum L2s to oracle networks. This leads to a tragedy of the commons where slashing one service can cascade, forcing validators to prioritize the highest-paying (often riskiest) AVSs.\n- Correlated Failure: A single exploit can trigger mass, unstoppable slashing.\n- Rent Extraction: AVSs compete for stake, driving up security costs in a zero-sum market.

$15B+
TVL at Risk
100x+
Leverage Multiplier
03

The Sovereign Rollup Escape

The endgame is sovereign rollups (e.g., Celestia, Avail) or validiums that separate execution from consensus and data availability. This eliminates the security middleman, allowing chains to pay only for raw data bandwidth while enforcing their own rules.\n- Cost Structure: Pay ~$0.001 per MB for DA vs. ~$1M+ annual validator bribes.\n- Exit Power: Sovereignty allows chains to fork the DA layer if rent extraction becomes excessive.

1000x
Cheaper DA
0%
Validator Tax
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Why Shared Security Models Lead to Rent Extraction | ChainScore Blog