Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Social Restaking

Social restaking is a DeFi strategy where assets already securing one protocol are restaked into a secondary social or reputation-based protocol to earn additional rewards.
Chainscore © 2026
definition
DEFINITION

What is Social Restaking?

Social Restaking is a decentralized trust mechanism that extends the security of a base blockchain's staked assets to new protocols without requiring the physical transfer or re-locking of those assets.

Social Restaking is a decentralized trust mechanism that extends the security of a base blockchain's staked assets to new protocols without requiring the physical transfer or re-locking of those assets. It allows a staker to issue a verifiable, on-chain attestation—a social restaking credential—that signals their endorsement and economic backing of a specific application or service. This credential is a cryptographic commitment, often implemented as a non-transferable token (NFT) or a soulbound token, representing a staker's reputational stake in a secondary network.

The core innovation is the separation of physical staking (assets locked in a consensus protocol like Ethereum's Beacon Chain) from virtual staking (the delegated trust and slashing risk). A staker on a primary chain, such as Ethereum, can socially restake their ETH position to back the security of an actively validated service (AVS), like a data availability layer, oracle network, or sidechain. The AVS can then design its cryptoeconomics to penalize malicious operators by slashing the reputation or delegated value associated with the social restaking credential, creating a strong disincentive for misbehavior.

This model creates a trust network where new protocols bootstrap security by aggregating the social capital and economic weight of established validators. Key technical components include a registry for issuing and managing credentials, a delegation layer where AVS operators can be assigned staker endorsements, and a slashing mechanism defined by the AVS to penalize bad actors. Unlike liquid restaking, no liquidity-providing token (LRT) is minted; the staker's underlying assets remain untouched in their original staking contract.

The primary benefit is capital efficiency and permissionless innovation. Developers can launch secure services without requiring validators to move or split their stake, while stakers can support multiple ecosystems simultaneously, earning additional rewards for shouldering slashing risk. However, this introduces correlated slashing risk across multiple AVS and the complexity of managing reputational exposure, making operator selection and risk assessment critical for participants.

Prominent implementations include EigenLayer's Delegated Slashing model, where stakers delegate their restaking credentials to operators. Use cases are vast, ranging from securing new consensus layers and decentralized sequencers to enhancing the security of bridges and oracle networks. Social Restaking fundamentally redefines how blockchain trust is composable and exported, creating a marketplace for decentralized security.

how-it-works
MECHANISM

How Social Restaking Works

Social restaking is a novel cryptoeconomic primitive that enables a user to delegate their staked assets to an operator, who then uses that delegated capital to secure multiple **Actively Validated Services (AVSs)** simultaneously, creating a shared security layer.

At its core, social restaking is a delegation mechanism built on top of a restaking protocol like EigenLayer. A user, or restaker, deposits a liquid staking token (e.g., stETH) or native ETH into a restaking contract. Instead of directly selecting and managing individual AVSs, the restaker delegates their stake's security to a trusted third party called an operator. This operator is a node operator who runs the necessary software to validate and secure the external networks (AVSs). The restaker's delegated stake provides the economic security and slashing guarantees for all the services the operator chooses to secure.

The operator's role is central to the model. They perform the technical work of running nodes, signing attestations, and maintaining uptime for the AVSs they opt into. In return for this service, they earn rewards from those AVSs. A portion of these rewards is then shared with the restakers who delegated to them, creating a yield stream. This creates a principal-agent relationship where the restaker's economic stake backs the operator's actions. If the operator acts maliciously or goes offline, the protocol can slash the delegated stake, penalizing both the operator and the delegating restakers proportionally.

This model introduces a social layer of trust and curation. Restakers must perform due diligence on operators, assessing their technical reputation, performance history, and the risk profile of the AVSs they support. Platforms and Delegated Restaking Protocols (DRPs) often emerge to aggregate this information, curate operator sets, and simplify the delegation process for users. This social dynamic separates capital provision from technical execution, allowing for specialization and scalability within the restaking ecosystem.

The flow of value is a key outcome. AVSs pay rewards in their native tokens or ETH to operators for security. Operators take a commission and distribute the remaining rewards to their delegators. This allows restakers to earn additional yield on top of their base Ethereum staking rewards by providing security to a diversified portfolio of services, from new L2s and oracles to cross-chain bridges and co-processors, all through a single delegation action.

Social restaking's security model is non-exclusive and multiplicative. A single unit of restaked ETH can secure multiple AVSs concurrently through its delegated operator, amplifying its economic utility. However, this also creates correlated slashing risks; a failure in one AVS can lead to slashing that affects all restakers delegated to that operator, even for AVSs they did not directly choose. This interlinked risk profile makes operator selection and AVS risk assessment critical components of the social restaking process.

key-features
CORE MECHANICS

Key Features of Social Restaking

Social Restaking extends the security model of Ethereum by enabling restaked assets to secure multiple services, creating a unified economic security layer.

01

Decentralized Trust Networks

Operators form permissionless networks where they stake ETH or LSTs to provide security. Users delegate to these operators, creating a trust graph where reputation is built on-chain through performance and slashing history. This replaces centralized intermediaries with a cryptoeconomic security model.

02

Multi-Layer Security Provision

A single staked asset can simultaneously secure multiple services, known as Actively Validated Services (AVS). This includes:

  • New consensus layers (e.g., alt L1s, L2s)
  • Oracle networks
  • Cross-chain bridges
  • Keeper networks This creates a capital-efficient security marketplace where one asset earns rewards from multiple sources.
03

Operator-Delegate Model

The system separates the roles of node operation and capital provision. Operators run the node software and face slashing risk. Delegators (restakers) provide the staked capital (ETH or LSTs) to back operators, earning a share of the rewards. This allows for permissionless participation without technical expertise.

04

Slashing & Cryptoeconomic Security

Security is enforced through cryptoeconomic slashing, where malicious or faulty behavior by an operator leads to the loss of a portion of the restaked capital backing them. Each AVS defines its own slashing conditions, creating a tailored security guarantee. This makes attacks economically irrational.

05

Yield Aggregation & Reward Streams

Restakers earn a composite yield from multiple sources:

  • Base Ethereum staking rewards
  • AVS-specific rewards (paid in native tokens or ETH)
  • Potential airdrops or incentives This transforms staked ETH from a single-yield asset into a yield-generating base layer for decentralized infrastructure.
06

Interoperability & Shared Security

Social Restaking creates a shared security layer that different applications can opt into. This promotes interoperability by providing a common, economically bonded security foundation, reducing the bootstrapping problem for new networks and increasing the overall security of the ecosystem.

examples
SOCIAL RESTAKING

Examples & Use Cases

Social Restaking extends the security of Ethereum staking to other networks and applications. These examples illustrate its core mechanisms and real-world implementations.

04

Restaking for Oracle Networks

Decentralized oracle networks like eOracle (built on EigenLayer) use Social Restaking to secure price feeds and external data. Node operators stake/restake assets and provide data attestations. If they provide incorrect data, they face slashing penalties on their restaked capital. This creates a strong economic incentive for honesty, enhancing the security of DeFi protocols that rely on these oracles.

05

Liquid Restaking Tokens (LRTs)

A key use case that unlocks liquidity. Protocols like Ether.fi, Renzo, and Kelp DAO allow users to deposit ETH or LSTs to participate in Social Restaking pools. In return, users receive a Liquid Restaking Token (LRT) like eETH or ezETH. This token represents a claim on the underlying restaked assets and their accrued rewards, enabling the liquidity to be used elsewhere in DeFi (e.g., as collateral for lending).

06

Cross-Chain Validation & Interoperability

Social Restaking enables shared security models for blockchain interoperability. Projects like Lagrange use it to create restaked light clients. Operators restake assets to run light clients for multiple chains and generate cryptographic proofs of state. This allows secure cross-chain messaging and bridging without requiring each chain to bootstrap its own validator set from scratch.

ecosystem-usage
SOCIAL RESTAKING

Ecosystem & Adoption

Social Restaking is a novel cryptoeconomic primitive that extends the security and economic utility of staked ETH beyond its native consensus layer. It allows restaked assets to secure a broader ecosystem of Actively Validated Services (AVSs), creating a new market for decentralized trust.

01

Core Mechanism: EigenLayer

Social Restaking is pioneered by the EigenLayer protocol. It introduces a pooled security model where users can re-stake their native ETH or liquid staking tokens (LSTs) to opt-in to securing additional services called Actively Validated Services (AVSs). This is achieved by delegating stake to node operators who run the software for these services, with slashing as the enforcement mechanism for misbehavior.

02

Actively Validated Services (AVSs)

AVSs are the decentralized applications that consume security from the Social Restaking pool. They are middleware or infrastructure services that require their own validator set for consensus or verification. Key examples include:

  • Data Availability Layers (e.g., EigenDA)
  • Decentralized Sequencers for rollups
  • Oracle Networks
  • Bridge Guardrails
  • New Virtual Machines or Ledgers AVSs pay rewards in their native tokens to attract and compensate restakers.
03

Economic Flywheel & Adoption Drivers

The adoption of Social Restaking is driven by a powerful economic flywheel:

  • For Restakers: Earn additional yield (restaking rewards) on top of base Ethereum staking rewards.
  • For AVS Developers: Access a pre-existing, cryptoeconomically secure validator set instantly, bypassing the "bootstrapping problem" of launching a new token-based security system.
  • For the Ecosystem: Creates a liquid market for trust, where the cost of security is determined by supply (restaked ETH) and demand (AVSs).
04

Key Participants & Roles

The Social Restaking ecosystem is structured around distinct participant roles:

  • Restakers: ETH stakers who delegate their stake to node operators to secure AVSs.
  • Node Operators: Entities that run validator software for the Ethereum Beacon Chain and one or more AVSs, accepting delegated stake.
  • AVS Developers: Teams building services that require decentralized validation, leveraging the restaking pool for security.
  • Delegators: A subset of restakers who delegate their stake but do not run operator nodes themselves.
05

Risks & Considerations

Adopting Social Restaking introduces new risk vectors that participants must assess:

  • Slashing Risk: Correlated slashing across multiple AVSs can amplify losses for restakers.
  • Operator Risk: Dependence on the performance and honesty of chosen node operators.
  • Smart Contract Risk: Vulnerabilities in the restaking protocol's contracts.
  • Liquidity Risk: Potential delays in withdrawing restaked assets during an exit queue.
  • Centralization Pressure: Potential for large, professional node operators to dominate the network.
06

Ecosystem Impact & Future Trajectory

Social Restaking is positioned to fundamentally reshape the blockchain infrastructure stack. Its long-term impact includes:

  • Modularizing Security: Separating the provision of security from the development of application logic.
  • Accelerating Innovation: Lowering the barrier to launching cryptoeconomically secure protocols.
  • Enhancing Ethereum's Dominance: Anchoring new services and value to Ethereum's base security layer.
  • Creating New Markets: Fostering markets for insurance, operator reputation, and slashing risk assessment.
COMPARISON

Social Restaking vs. Traditional Restaking

A technical comparison of the core architectural and operational differences between Social Restaking and Traditional Restaking.

Feature / MechanismSocial Restaking (e.g., EigenLayer)Traditional Restaking (e.g., Native Delegation)

Core Architecture

Multi-layered, separates consensus (L1) from validation (AVS)

Monolithic, consensus and validation are unified

Staked Asset

Liquid Staking Tokens (LSTs) or native ETH

Native protocol token only

Validator Set

Dual: L1 validators + Actively Validated Services (AVSs)

Single: Native protocol validators

Slashing Scope

Modular slashing for specific AVS violations

Monolithic slashing for base-layer consensus faults

Reward Source

Fees from multiple AVSs + base consensus rewards

Base consensus rewards (inflation/fees) only

Capital Efficiency

High (capital reused across multiple services)

Low (capital locked to a single service)

Operator Specialization

Enables specialized operators for specific AVS types

Validators perform a generalized, fixed set of duties

Time to Finality for AVS

Inherits L1 finality; can be faster for specific states

Bound by the native chain's finality time

security-considerations
SOCIAL RESTAKING

Security & Risk Considerations

Social restaking introduces novel trust and security models by allowing users to delegate their staked assets to a third-party operator. This creates a distinct risk profile compared to solo staking or traditional liquid restaking.

01

Operator Slashing Risk

The primary technical risk is slashing, where a delegated operator's malicious or faulty behavior leads to a penalty on the user's staked assets. This is enforced by the underlying Ethereum consensus layer or the specific Actively Validated Service (AVS). Users must assess an operator's technical reliability, historical performance, and governance policies before delegating.

02

Custodial & Trust Assumptions

Social restaking is inherently non-custodial for the underlying staked ETH (e.g., via EigenLayer), as it uses smart contracts. However, it introduces a trusted intermediary for the validation and operation of AVSs. This creates a security dependency on the operator's key management, node infrastructure, and honest participation in decentralized networks.

03

Smart Contract & Protocol Risk

Users are exposed to the security of the restaking protocol's smart contracts (e.g., EigenLayer core contracts) and any middleware or AVS contracts the operator participates in. Vulnerabilities, bugs, or economic exploits in these contracts could lead to loss of funds, independent of the operator's actions. This is a form of systemic risk.

04

Liquidity & Withdrawal Timing

Exiting a social restaking position is not instantaneous. It involves:

  • An unstaking period (e.g., Ethereum's withdrawal queue).
  • Potential unbonding delays specific to the AVS.
  • Reliance on the operator to properly process the exit. This impacts a user's ability to react to market conditions or security events quickly, creating liquidity risk.
05

Centralization & Correlation Risk

If a large portion of restaked ETH delegates to a small set of dominant operators, it creates centralization risk. A fault or attack on a major operator could impact many AVSs simultaneously, leading to correlated slashing events. This undermines the network security and censorship resistance that restaking aims to provide.

06

Yield & Reward Dynamics

Rewards are not guaranteed and are subject to:

  • AVS demand and profitability.
  • Operator commission fees.
  • Penalties from slashing. The advertised yield is an estimate, not a promise. Users bear the economic risk of fluctuating rewards and must understand the reward distribution mechanism of each AVS.
SOCIAL RESTAKING

Common Misconceptions

Social restaking is a novel primitive that extends cryptoeconomic security, but its mechanics are often misunderstood. This section clarifies the most frequent points of confusion.

No, social restaking is fundamentally different from simple delegation. While delegation involves transferring staking rights to a validator, social restaking involves restaking the same underlying EigenLayer tokens to secure multiple Actively Validated Services (AVSs) simultaneously. It's a mechanism for security multiplication, not just a transfer of voting power. Delegation is a one-to-one relationship (user -> validator), whereas social restaking creates a many-to-many network where a single stake can back numerous services, governed by the Operator's choices and the associated slashing conditions.

SOCIAL RESTAKING

Technical Deep Dive

Social Restaking is a novel cryptoeconomic primitive that extends the security and economic utility of staked assets, like ETH, to decentralized social networks and other middleware layers. This section explores its core mechanisms, risks, and key implementations.

Social Restaking is a mechanism that allows staked assets from a base consensus layer, such as Ethereum, to be natively restaked to provide cryptoeconomic security for decentralized social (DeSo) protocols. It works by enabling Liquid Staking Tokens (LSTs) or natively staked ETH to be deposited into a restaking protocol (e.g., EigenLayer). An Operator then runs node software for a specific Actively Validated Service (AVS), like a DeSo network, and the restaked assets act as a slashable security deposit, penalizing the operator for malicious behavior (e.g., censorship, data unavailability) according to the AVS's cryptoeconomic security model.

SOCIAL RESTAKING

Frequently Asked Questions (FAQ)

Essential questions and answers about the emerging concept of Social Restaking, which extends the security and economic utility of staked assets to social applications.

Social Restaking is a mechanism that allows staked assets, typically from a Proof-of-Stake (PoS) network like Ethereum, to be used to secure and govern decentralized social applications and networks. It works by leveraging a restaking primitive, where a user's staked ETH (or other native token) is 'restaked' into a smart contract or middleware layer, such as EigenLayer, to provide cryptoeconomic security to other protocols. This creates a shared security model where social apps can bootstrap their network's security and trust without requiring users to stake a new, untested token. The staked capital acts as a slashing guarantee, meaning malicious behavior on the social network can result in the loss of the underlying staked assets, aligning incentives for honest participation.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
What is Social Restaking? | Chainscore Glossary | ChainScore Glossary