Relayer incentives are misaligned. Protocols like Across and Stargate pay relayers for fast message delivery, creating a race-to-the-bottom on cost that sacrifices security and liveness guarantees.
Why Relayer Incentives Are the Weakest Link
An analysis of how flawed profitability models for relay operators create systemic centralization risk in cross-chain infrastructure, undermining the security of protocols like LayerZero and Axelar.
Introduction
Current cross-chain infrastructure fails because relayers are paid for speed, not for security or finality.
This creates systemic fragility. A profitable relayer operation for UniswapX on Ethereum mainnet is unsustainable for a high-throughput chain like Solana, where gas costs are volatile and message volume is low.
The result is subsidized centralization. Major relay networks like LayerZero's default setup or Wormhole's guardian set centralize around a few capital-efficient operators, creating a single point of failure the protocol pretends doesn't exist.
Evidence: The Nomad bridge exploit was a direct result of underfunded, incentivized watchdogs; a $200M hack cost less to execute than the value being secured.
Executive Summary
Current cross-chain infrastructure is built on a broken economic model where relayers, the critical operators, are systematically underpaid and over-risked.
The Free-Rider Problem
Relayers provide the liquidity and execution for protocols like Across and LayerZero, but revenue is captured upstream by applications. This creates a principal-agent problem where the entity taking the risk (relayer) is not the one earning the fees.
- Revenue Leakage: Apps bundle fees, leaving relayers with thin margins.
- Misaligned P&L: Relayer profitability is decoupled from protocol security.
- Race to the Bottom: Leads to consolidation and centralization of relay services.
Unhedgeable Inventory Risk
To facilitate fast transfers, relayers must hold inventory (capital) on destination chains, exposing them to volatile price swings and bridge-specific insolvency risk.
- Capital Intensive: Requires $10M+ in stranded liquidity per chain.
- Asymmetric Loss: Profits are linear (fees), losses are non-linear (slippage, hacks).
- No Native Hedges: No DeFi primitive exists to short the risk of a bridge failure.
The MEV Backstop Illusion
Protocols like UniswapX and CowSwap propose using MEV as a subsidy for fillers (their version of relayers). This is unstable; MEV is pro-cyclical and unpredictable.
- Revenue Volatility: MEV vanishes during bear markets or low volatility.
- Not a Guarantee: Cannot be underwritten or used for reliable operational budgeting.
- Creates New Attack Vectors: Incentivizes order flow auctions that can be gamed.
Solution: Protocol-Owned Liquidity & Staking
The only sustainable model is for the protocol to directly align relayer incentives via bonded staking and fee ownership. Think Proof-of-Stake for bridges.
- Skin in the Game: Relay rights require staking protocol tokens, slashed for malfeasance.
- Fee Sovereignty: Relayers earn a defined, protocol-guaranteed share of all fees.
- Risk Pooling: A shared security pool acts as insurance against inventory drawdowns.
The Core Flaw: Profitability is Optional
Relayer networks fail when their economic incentives do not guarantee sustainable profitability for operators.
Relayers operate at a loss. The dominant business model for protocols like Across and Stargate relies on third-party relayers subsidizing user transactions for future token rewards, creating a fundamental misalignment between cost and revenue.
Token incentives mask unsustainable unit economics. Projects use native token emissions to pay relayers, but this is a capital-intensive subsidy that collapses when the token price declines or emissions slow, as seen in the lifecycle of many Layer 2 sequencers.
Proof-of-Stake security is not profitability. A relayer can be technically honest and staked but still run unprofitably, leading to service degradation and centralization as only well-funded entities persist.
Evidence: The 2022 bear market triggered a wave of relayer shutdowns in cross-chain ecosystems, forcing protocols to consolidate relay duties onto their own subsidized infrastructure, negating the decentralized design.
Relayer Economics: A Race to the Bottom
Comparing economic models for cross-chain message relaying, highlighting the sustainability and security trade-offs.
| Economic Model | Generalized Relayer (e.g., LayerZero) | Application-Specific (e.g., Across) | Sovereign Rollup (e.g., Celestia DA) |
|---|---|---|---|
Revenue Source | User-paid gas + potential token incentives | Protocol-owned liquidity + MEV capture | Sequencer fees + native token staking |
Relayer Profit Margin | < 0.1% per tx (commoditized) | 1-5%+ via arbitrage/MEV | Fixed fee schedule, not tx-dependent |
Capital Efficiency | Low (must prefund gas on destination) | High (utilizes pooled liquidity) | N/A (settlement, not bridging) |
Security Assumption | Economic (staked relayers) | Cryptoeconomic (bonded attestors) | Cryptoeconomic (validator staking) |
Incentive to Censor | High (if bribes > bond value) | Low (protocol slashes malicious actors) | Very Low (consensus-level slashing) |
Race-to-the-Bottom Risk | Extreme (pure gas competition) | Controlled (protocol sets fee model) | None (fee market is for blockspace) |
Example Failure Mode | Relayer goes offline if unprofitable | Liquidity fragmentation across chains | Validator downtime, not liveness failure |
The Slippery Slope to Centralization
Relayer incentives, not cryptography, are the primary failure point for decentralized intent execution.
Relayer profitability dictates centralization. The economic model for executing user intents rewards capital efficiency and scale, not decentralization. This creates a natural monopoly where only a few large, well-capitalized relayers like Across and UniswapX solvers can operate profitably.
Permissionless entry is a mirage. While anyone can run a relayer, the capital requirements and MEV extraction capabilities needed to win auctions create insurmountable barriers. This results in an oligopoly that mirrors traditional finance's market-maker structure.
The validator problem repeats itself. Just as proof-of-stake networks battle with stake concentration, intent networks will consolidate around a handful of dominant relayers. The winning strategy is vertical integration of liquidity and execution, not protocol-level decentralization.
Evidence: In UniswapX, over 70% of fill volume is handled by the top 3 solver addresses. This concentration increases during volatile markets when decentralized execution is most critical.
Protocol Autopsies: Incentives in Practice
Cross-chain messaging protocols like LayerZero, Axelar, and Wormhole are only as reliable as their economic backstop; flawed relay incentives create systemic fragility.
The Oracle/Relayer Collusion Problem
Decoupling data (Oracle) from attestation (Relayer) creates a false sense of security. A single entity controlling both can forge any message, a flaw exploited in the Multichain and Wormhole Guardian designs.
- Attack Surface: Single point of failure for $2B+ in bridged assets.
- Economic Reality: Running both roles is often the only profitable strategy, centralizing power.
UniswapX & The Liveness-Security Tradeoff
Intent-based architectures like UniswapX and CowSwap outsource execution to a permissionless network of fillers (relayers). This optimizes for liveness but introduces new risks.
- Incentive Misalignment: Fillers profit from MEV, not protocol security.
- Race to Zero: Competition drives fees down, pushing relayers to cut corners on data sourcing or use cheaper, less secure chains.
Across: The Bonding Band-Aid
Across Protocol uses a bonded relayer model with a fraud-proof window, mimicking optimistic rollups. This improves security but introduces capital inefficiency and liveness delays.
- Capital Lockup: Relayers must stake $2M+ per chain, limiting participation.
- Speed Tax: ~30 minute challenge window is a UX bottleneck, ceding market share to faster, riskier alternatives like LayerZero.
The Liquidity-As-Security Mirage
Protocols like Stargate and early Synapse used liquidity pool-backed security, where relayers are slashed from LP shares. This conflates two distinct risks.
- Contagion Vector: A bridge exploit drains the liquidity pool, punishing LPs for a relayer's fault.
- Weak Deterrent: Slashing 5% of an LP position is meaningless compared to the profit from a $100M exploit.
EigenLayer & The Shared Security Fantasy
Restaking via EigenLayer is pitched as a universal security solution for relay networks. In practice, it creates systemic risk and mispriced insurance.
- Correlated Slashing: A failure in an AVS (like a relayer set) can slash stakes across hundreds of protocols.
- Yield-Driven Actors: Restakers optimize for yield, not protocol health, creating brittle, rent-seeking security.
The Verifier Dilemma: Who Watches the Watchers?
Even with fraud proofs or zero-knowledge proofs, someone must run verifier nodes. These are the ultimate relayers, and their incentives are often an afterthought.
- Free Rider Problem: Why run a costly verifier for $0 in fees? Polygon zkEVM and zkSync face this.
- Silent Consensus: If all verifiers go offline, the system appears live but is functionally dead, a silent failure.
The Rebuttal: "Staking Solves Everything"
Staking secures consensus, but it creates a fundamental misalignment with the economic incentives required for reliable cross-chain message delivery.
Staking secures consensus, not delivery. Validator slashing punishes equivocation, not operational failure. A relayer can be slashed for signing two conflicting states but faces zero penalty for simply not relaying a valid message, creating a liveness vulnerability.
Economic incentives diverge sharply. Staking yields are derived from chain security budgets. Relayer profits are derived from execution fees and MEV. Protocols like Across and LayerZero separate these roles, using independent, fee-motivated relayers because staked validators lack the economic driver for reliable, low-latency message passing.
The slashing guarantee is insufficient. Even with slashing, the cost to corrupt a subset of validators is often lower than the value of a single large cross-chain transaction. This makes bribery attacks economically rational, a flaw staking alone does not solve.
Evidence: The Wormhole hack exploited a signature verification flaw, not a staking failure. The subsequent focus has been on fraud proofs and optimistic verification, as seen in projects like Hyperlane and Succinct, proving that staking is just one layer in a broader security stack.
FAQ: Relayer Incentives Demystified
Common questions about why relayer incentives are the weakest link in cross-chain and intent-based systems.
The primary risks are liveness failure and centralized points of censorship or attack. If a relayer's incentives are misaligned or insufficient, they can simply stop processing transactions, breaking the system. This is a more common failure mode than smart contract hacks in protocols like LayerZero or Axelar.
The Path Forward: Sustainable Models
Current cross-chain infrastructure relies on economically unsustainable relayer incentives that threaten long-term security and decentralization.
Relayer subsidies are unsustainable. Protocols like Across and Stargate rely on token emissions to pay relayers, creating a permanent cost center that bleeds treasury value and misaligns incentives with actual user demand.
The fee market is broken. Relay costs are opaque and subsidized, preventing a true price discovery mechanism. This distorts competition and centralizes relay power with the best-funded entities, not the most efficient.
Proof-of-Stake for relayers fails. A model where relayers stake tokens to secure transfers, as seen in early iterations, creates capital inefficiency and centralization. The capital required to secure large volumes is prohibitive for decentralized operators.
Sustainable models require embedded economics. The solution is intent-based architectures like those pioneered by UniswapX and CowSwap, where solvers compete in an open auction. This internalizes relay costs into the trade itself, aligning incentives with execution quality.
Key Takeaways
The economic model for transaction relayers is a systemic vulnerability, creating misaligned incentives that threaten security and user experience.
The MEV-Censorship Dilemma
Relayers are rational economic actors, not altruists. When block space is scarce, they prioritize maximal extractable value (MEV) over user inclusion, leading to censorship and failed transactions. This breaks the core promise of permissionless access.
- >50% of relayers in some ecosystems are known to censor OFAC-sanctioned addresses.
- Users face unpredictable latency as their txns wait for profitable bundles.
The Subsidy Cliff Edge
Most relay networks operate on unsustainable token subsidies. When emissions dry up, relayers exit, causing network collapse and stranded users. This is a critical failure mode for many optimistic rollups and cross-chain messaging layers like LayerZero.
- Protocols face a binary choice: perpetual inflation or centralization.
- $100M+ in annual subsidies are common to maintain baseline security.
Solution: Enshrined Auctions & Credible Neutrality
The fix is protocol-level auction mechanisms that enforce credible neutrality. Projects like UniswapX, CowSwap, and Across Protocol separate ordering from execution, forcing relayers to compete on price in a transparent marketplace.
- Pay for inclusion, not for trust.
- Eliminates the need for subjective whitelists and centralized relay committees.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.