Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
public-goods-funding-and-quadratic-voting
Blog

Why Economic Security is Non-Negotiable for Public Goods

A protocol's ability to fund shared infrastructure without imploding is its ultimate stress test. This analysis deconstructs how flawed economic security in public goods funding reveals terminal flaws in governance, tokenomics, and treasury design.

introduction
THE BREAKING POINT

The Ultimate Stress Test

Public goods infrastructure must withstand adversarial conditions that commercial products never face.

Economic security is the final barrier against systemic collapse. A public good like a bridge or data availability layer must be resilient when its token price crashes 90% and validators face maximum-extraction-value (MEV) attacks. This is not optional.

Commercial logic fails under stress. A for-profit L2 like Arbitrum or Optimism can subsidize security during a bear market. A credibly neutral public good like Celestia or EigenDA cannot; its cryptoeconomic model must be self-sustaining from day one.

The stress test is continuous. It is not a one-time audit. It is the perpetual game-theoretic battle between stakers seeking yield and adversaries probing for the minimum cost of attack, a dynamic modeled by tools like Gauntlet.

Evidence: The 2022 cross-chain bridge hacks, which extracted over $2 billion, were not code exploits but failures of economic security. Protocols like Across and LayerZero now architect around this, using optimistic verification and delegated fraud proofs to increase the attacker's capital cost.

thesis-statement
THE ECONOMIC REALITY

The Core Argument: Funding Reveals Flaws

The mechanisms for funding public goods expose a fundamental weakness in blockchain's economic security model.

Economic security is non-negotiable. A blockchain's value is its credible neutrality, which is secured by its token's economic weight. Public goods funding that bypasses or dilutes this token model introduces a critical attack vector, undermining the foundation of the chain itself.

Retroactive funding creates perverse incentives. Protocols like Optimism's RetroPGF reward past contributions, but this model encourages speculative building for future payouts rather than sustainable utility, misaligning builder and network incentives from day one.

Protocol-owned liquidity is a band-aid. Systems like Uniswap's fee switch or Aave's treasury attempt to self-fund, but they create central points of failure and governance capture, contradicting the decentralized ethos they aim to support.

Evidence: The Ethereum protocol treasury holds zero ETH. Its security relies entirely on staking rewards and fee burn (EIP-1559), a model that directly ties public good (network security) to economic value. Any deviation from this is a security subsidy.

ECONOMIC SECURITY ARCHETYPES

The Public Goods Funding Stress Test Matrix

Comparing the core economic security models for funding public goods, highlighting the trade-offs between capital efficiency, censorship resistance, and protocol risk.

Security Metric / FeatureRetroactive Funding (e.g., Optimism)Continuous Funding (e.g., Gitcoin Grants)Protocol-Owned Liquidity (e.g., ENS DAO)

Capital Efficiency (Funds at Work)

95%

~10-20% (per round)

100% (but locked)

Settlement Finality

~3 months (post-review)

~2 weeks (post-round)

Immediate (on-chain vote)

Censorship Resistance

High (on-chain results)

Medium (off-chain curation)

High (on-chain governance)

Oracle Risk

High (depends on committee)

Medium (depends on platform & voters)

Low (direct treasury control)

Sybil Attack Surface

Low (focused on impact)

High (1p1v quadratic funding)

Medium (token-weighted vote)

Protocol Revenue Capture

None (pure outflow)

2-5% (platform fee)

Yes (directs protocol fees)

Time to First Funding

6-12+ months

1-3 months

1-2 months (governance cycle)

deep-dive
THE COST OF FAILURE

Deconstructing the Attack Vectors

Public goods infrastructure fails when its economic security is insufficient to deter rational, profit-driven attacks.

Economic security is a binary state. A system is either secure against rational adversaries or it is not; there is no 'mostly secure'. This is defined by the cost-to-corrupt exceeding the profit-from-corruption. For a public good like a bridge or sequencer, this cost is the capital required to compromise its liveness or finality guarantees.

Staked capital is the primary deterrent. Protocols like EigenLayer and AltLayer formalize this by creating slashing conditions where malicious actors lose their stake. The security budget is not the TVL of the application, but the slashable value backing its critical functions. A low slashable value creates a trivial attack vector.

Cross-chain bridges are the canonical case study. The Wormhole and Ronin Bridge hacks exploited smart contract logic, but economic attacks target consensus. A bridge with $10M in slashable stake securing $1B in TVL presents a 100x profit incentive for a collusion attack, making it economically insecure by design.

Evidence: The 2022 Nomad Bridge hack resulted in a $190M loss. While it was a code exploit, it highlighted the systemic risk: many bridges operated with security budgets orders of magnitude smaller than the value they secured, creating a target-rich environment for adversaries.

case-study
ECONOMIC SECURITY

Case Studies in Success and Failure

Public goods in crypto live or die by their economic security model; these case studies prove it's the primary vector for success or catastrophic failure.

01

The Ethereum L1: The Security-as-Service Empire

Ethereum monetizes its $100B+ security budget by renting it to L2s and restaking protocols. Its success is a direct function of making block space a hyper-valuable, trust-minimized public good.

  • Key Benefit: Unprecedented Sybil Resistance via ~$40B in staked ETH.
  • Key Benefit: Security becomes a revenue-generating asset via MEV, gas, and restaking fees.
$100B+
Security Budget
~$40B
Staked ETH
02

The Optimism RetroPGF Failure: Paying for Nothing

Early rounds of Optimism's Retroactive Public Goods Funding were gamed by low-quality projects, proving that without a cryptoeconomic security layer, subsidy mechanisms are inherently fragile.

  • The Problem: $30M+ distributed with weak sybil resistance, leading to reputation mining.
  • The Lesson: Funding must be contingent on verifiable, on-chain utility, not off-chain narratives.
$30M+
Misallocated
Weak
Sybil Resistance
03

Cosmos Hub: The Security Vacuum

The Cosmos Hub's failure to capture meaningful value from the Inter-Blockchain Communication (IBC) ecosystem created a security vacuum. Consumer chains bypass its token, opting for EigenLayer or Celestia for security/data.

  • The Problem: ATOM has no fundamental security demand, becoming a governance token with a ~$3B market cap subsidy.
  • The Lesson: Interoperability alone does not create economic security; you must be the costliest-to-attack resource.
~$3B
Market Cap Subsidy
High
Security Leakage
04

EigenLayer: Securing the Vertically-Integrated Stack

EigenLayer successfully reframed Ethereum's security from a horizontal layer into a vertically-integrated product. It creates economic security for Actively Validated Services (AVSs) like oracles and bridges by slashing restaked ETH.

  • The Solution: $20B+ in restaked ETH provides shared security, avoiding the bootstrapping problem of new trust networks.
  • The Mechanism: Cryptoeconomic slashing aligns operator incentives with AVS liveness, making security a programmable primitive.
$20B+
Restaked ETH
Programmable
Security
05

The DAO Hack: The Original Sin of Soft Forks

The 2016 DAO hack forced Ethereum to choose between code-is-law immutability and economic reality. The contentious hard fork to recover funds set a precedent that economic security ultimately rests on social consensus.

  • The Problem: $60M (2016 value) siphoned due to a smart contract bug.
  • The Legacy: Established that >$1B systems cannot rely solely on code; they require a credible social layer for extreme events.
$60M
Exploited (2016)
Social
Final Layer
06

Gitcoin Grants: Quadratic Funding's Sybil War

Gitcoin Grants pioneered quadratic funding for public goods but has spent years in a costly arms race against sybil attackers, proving that matching funds require cryptographic proof-of-personhood.

  • The Problem: Early rounds saw >30% of matching funds sybil'd, requiring complex off-chain identity stacks (Passport).
  • The Evolution: Shows that sustainable public goods funding must integrate on-chain attestations and costly signals to be secure.
>30%
Sybil Rate (Early)
Costly
Signal Required
counter-argument
THE INCENTIVE MISMATCH

The Altruism Fallacy

Public goods infrastructure fails when it relies on goodwill instead of embedded economic security.

Altruism is not a security model. Protocol designers who outsource security to community goodwill create systemic risk. The free-rider problem ensures rational actors exploit the system without contributing, leading to predictable failure.

Economic security is non-negotiable. Sustainable public goods like Ethereum's PBS or Optimism's RetroPGF bake incentives directly into their architecture. They use cryptoeconomic mechanisms to align participant behavior with network health, replacing hope with game theory.

Compare L2 sequencers. A centralized sequencer relying on promises is a security liability. A decentralized sequencer with staked economic bonds, like those proposed by Espresso Systems or Astria, creates verifiable slashing conditions. The bond is the security.

Evidence: The bridge hack pattern. Most major bridge exploits, from Wormhole to Ronin, targeted centralized, trust-based components. Bridges with cryptoeconomic security models, like Across (using bonded relayers) or LayerZero (with decentralized oracle/relayer sets), demonstrate higher resilience by design.

takeaways
ECONOMIC SECURITY

TL;DR for Protocol Architects

Public goods fail without credible, self-sustaining economic security models. Here's how to architect them.

01

The Problem: Free-Riding Kills Sustainability

Users extract value from public goods (e.g., block space, bridges, data availability) without contributing to their security costs. This leads to a classic tragedy of the commons.

  • Result: Underfunded security budgets and systemic fragility.
  • Example: A bridge with $1B TVL secured by $10M in staked assets is a high-value target.
100:1
TVL/Security Ratio
0%
Free Rider Cost
02

The Solution: Protocol-Owned Security Sinks

Design revenue streams that directly fund and collateralize security. Think EigenLayer for restaking or Celestia's data availability fee market.

  • Mechanism: Fees are burned to increase staker yield or are locked as insurance capital.
  • Outcome: Security budget scales with usage, creating a positive feedback loop.
Scalable
Security Budget
Auto-Compounding
Staker Yield
03

The Enforcement: Slashing as a Credible Threat

Economic security is meaningless without enforceable penalties. Slashing conditions must be clear, objective, and severe enough to deter malice.

  • Requirement: Automated, verifiable fault proofs (see Arbitrum's fraud proofs).
  • Avoid: Subjective "governance slashing" which is slow and politically vulnerable.
> Stake
Slash Amount
< 1 Block
Proof Finality
04

The Metric: Cost-to-Corrupt (CtC) Ratio

Forget TVL. The only security metric that matters is Cost-to-Corrupt / Profit-from-Corruption. A system with $10B TVL but a CtC of 1.1 is one bribe away from collapse.

  • Target: CtC > 3-5x for credible defense.
  • Tool: Increase CtC via restaking (EigenLayer), insurance pools (Nexus Mutual), or layered crypto-economic security.
> 5x
Target CtC
Real-Time
Risk Dashboard
05

The Pitfall: Centralized Sequencer Risk

Many L2s and intent-based systems (UniswapX, Across) rely on a single, trusted sequencer for execution and ordering. This is a massive, un-priced centralization risk.

  • Vulnerability: Censorship, MEV extraction, and liveness failure.
  • Mitigation: Shared sequencer networks (e.g., Espresso, Astria) or decentralized validator sets with economic bonds.
1 Entity
Failure Point
$0
Slashable Bond
06

The Blueprint: Modular Security Stack

Don't reinvent the wheel. Compose security from specialized layers: EigenLayer for cryptoeconomic security, Celestia/Avail for data availability, Across/LayerZero for verified bridging.

  • Benefit: Leverages battle-tested capital and code.
  • Architecture: Your protocol's unique value is the application logic, not the base-layer security.
Composability
Security Leverage
Specialized
Risk Layers
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Why Economic Security is Non-Negotiable for Public Goods | ChainScore Blog