Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Liquid Staking

A staking mechanism where users deposit tokens into a protocol to receive a tradable derivative token representing their staked position and future rewards.
Chainscore © 2026
definition
BLOCKCHAIN MECHANISM

What is Liquid Staking?

Liquid staking is a protocol mechanism that allows users to stake their cryptocurrency to secure a proof-of-stake (PoS) blockchain while receiving a liquid, tradable token representing their staked assets and accrued rewards.

Liquid staking is a financial primitive that solves the capital inefficiency inherent in traditional staking. In standard PoS systems, staked assets are locked and illiquid, unable to be used in DeFi (Decentralized Finance) or traded. Liquid staking protocols, such as Lido (for Ethereum), Marinade (for Solana), and Rocket Pool, issue a derivative token—like stETH or mSOL—in a 1:1 ratio to the staked deposit. This token, a liquid staking token (LST), accrues staking rewards automatically and can be freely transferred, traded, or used as collateral across the broader crypto ecosystem.

The core technical innovation is the creation of a fungible representation of a non-fungible staking position. The protocol manages the underlying validator operations, including node operation, slashing risk, and reward distribution, abstracting this complexity from the end user. Users delegate their assets to a pool of professional node operators or a decentralized validator set. The issued LSTs are rebasing tokens (where the token balance increases to reflect rewards) or reward-bearing tokens (where the exchange rate against the native asset increases over time), ensuring the derivative accurately tracks the value of the principal plus accrued yield.

This mechanism unlocks significant utility, transforming staked assets from idle capital into productive financial legos. Holders can use their LSTs in lending protocols to borrow against them, provide liquidity in automated market makers (AMMs), or engage in yield-strategies like staking derivatives. However, it introduces new risks, including smart contract risk within the liquid staking protocol, potential depeg risk if the LST trades below its underlying asset value, and centralization risks if a single protocol commands too large a share of the network's total stake, potentially undermining network security.

key-features
MECHANISM

Key Features of Liquid Staking

Liquid staking is a protocol mechanism that unlocks the liquidity of staked assets by issuing a derivative token, enabling participation in DeFi while securing Proof-of-Stake networks.

01

Liquid Staking Tokens (LSTs)

A Liquid Staking Token (LST) is a fungible, tradeable representation of a staked asset. When you stake a native token (e.g., ETH), the protocol mints a corresponding LST (e.g., stETH). This token accrues staking rewards automatically through a rebasing or reward-bearing mechanism, and can be used as collateral across DeFi applications like lending and liquidity pools.

02

Capital Efficiency

This is the core value proposition. Liquid staking eliminates the opportunity cost and capital lock-up associated with traditional staking. Users can simultaneously:

  • Earn staking rewards from the underlying validator.
  • Use the LST for yield farming, borrowing, or as collateral. This creates a composability multiplier, allowing capital to be deployed in multiple yield-generating strategies at once.
03

Validator Delegation & Slashing Risk

Users delegate their stake to a pool of professional node operators managed by the protocol. Key aspects include:

  • Decentralization: Protocols select and distribute stake across many operators to minimize centralization risk.
  • Slashing Insurance: Some protocols maintain a insurance fund or socialize minor slashing penalties to protect LST holders.
  • Governance: LST holders may have governance rights over the operator set and protocol parameters.
04

Secondary Market Liquidity

LSTs trade on decentralized exchanges (DEXs) and centralized exchanges, creating a liquid market for staked positions. This enables:

  • Instant exit: Users can sell their LST for the underlying asset without waiting for an unbonding period.
  • Price Discovery: The market determines the LST's price, which typically trades close to, but can deviate from, the value of the underlying staked asset plus accrued rewards (the "peg").
05

Protocol Examples & Models

Different protocols implement liquid staking with varying models:

  • Pooled Staking (Lido): A single, canonical LST (stETH) backed by a curated set of node operators.
  • Liquid Staking Derivatives (Rocket Pool): A decentralized network where node operators provide collateral to run validators, minting rETH.
  • Exchange-Based (Coinbase cbETH, Binance BETH): Centralized exchanges offer their own LSTs, often with custodial backing.
06

Risks & Considerations

While powerful, liquid staking introduces distinct risks:

  • Smart Contract Risk: LST value depends on the security of the underlying protocol's contracts.
  • Centralization Risk: Over-reliance on a single protocol's operator set threatens network security.
  • Peg Risk: LSTs can trade at a discount or premium to their underlying value, especially during market stress or high redemption demand.
  • Regulatory Uncertainty: The legal status of LSTs as securities may vary by jurisdiction.
how-it-works
MECHANISM

How Liquid Staking Works

A technical breakdown of the process that allows stakers to retain liquidity while securing a proof-of-stake blockchain.

Liquid staking is a process where a user deposits their proof-of-stake (PoS) tokens, such as ETH or SOL, into a specialized protocol or service. In return, the user receives a tradable derivative token—like Lido's stETH or Marinade's mSOL—that represents their staked assets and accrued rewards. This mechanism decouples the act of securing the network (staking) from the liquidity of the underlying capital, solving the core problem of locked, illiquid assets in traditional staking.

The protocol then pools these user deposits to meet the minimum staking threshold required by the underlying blockchain, often 32 ETH for Ethereum validators. It operates a set of validators or delegates to node operators who perform the actual consensus work. Rewards (and penalties, or slashing) generated by these validators are automatically distributed pro-rata to all derivative token holders. The derivative token's value appreciates relative to the base asset, reflecting the accumulated staking yield.

The liquidity of the derivative token is enabled by its integration into the broader DeFi ecosystem. Holders can use these liquid staking tokens (LSTs) as collateral for lending, provide liquidity in automated market makers (AMMs), or engage in other yield-generating strategies—a concept known as restaking. This creates a composable yield layer on top of the base staking rewards, significantly enhancing capital efficiency for token holders.

Key technical considerations include the custodial model (non-custodial vs. federated), the validator selection and slashing risk management strategy, and the minting/redemption mechanism for the derivative token. Protocols employ decentralized governance and oracle systems to maintain the peg between the LST and the native asset and to ensure validator performance aligns with network incentives.

examples
LIQUID STAKING

Examples & Protocols

Liquid staking is implemented by various protocols that issue derivative tokens representing staked assets, enabling participation in DeFi while securing Proof-of-Stake networks.

ecosystem-usage
LIQUID STAKING

Ecosystem Usage & Integration

Liquid staking protocols transform staked assets into liquid, tradeable tokens, unlocking capital efficiency and enabling new financial primitives across DeFi.

01

Liquid Staking Tokens (LSTs)

The core innovation of liquid staking is the issuance of a Liquid Staking Token (LST), a derivative token that represents a claim on the underlying staked assets and their accrued rewards. Key characteristics include:

  • 1:1 Peg: Each LST is typically minted 1:1 for each native token staked (e.g., stETH for ETH).
  • Yield Accrual: The value of the LST relative to the native token increases over time as staking rewards are added to the backing pool.
  • Composability: LSTs can be used as collateral for lending, liquidity provision, or as a stable asset in other DeFi protocols, enabling capital efficiency.
02

DeFi Composability & Yield Strategies

LSTs are foundational building blocks in DeFi, enabling complex yield strategies. Users can leverage their staked position by using LSTs as collateral. Common integrations include:

  • Lending Markets: Deposit LSTs (e.g., stETH) as collateral to borrow other assets, creating leveraged staking positions.
  • Automated Vaults: Protocols like Yearn Finance create optimized strategies that automatically deposit LSTs into the highest-yielding lending or liquidity pools.
  • Liquidity Pools: LST/stablecoin pairs (e.g., stETH/USDC) are common in DEX liquidity pools, allowing LST holders to earn trading fees on top of staking rewards.
03

Governance & Protocol Security

Liquid staking has a profound impact on Proof-of-Stake (PoS) network security and governance. Large liquid staking providers can become significant voting blocs. Key dynamics are:

  • Vote Delegation: LST holders often delegate their governance rights to the liquid staking provider, centralizing voting power.
  • Slashing Risk Management: Protocols must implement robust slashing insurance mechanisms to protect LST holders if their delegated validators are penalized.
  • Validator Decentralization: Leading protocols operate diverse, permissionless validator sets to mitigate centralization risks and strengthen network security.
04

Cross-Chain & Layer 2 Expansion

Liquid staking is expanding beyond its native chains via bridges and Layer 2 (L2) solutions, increasing utility and liquidity. This involves:

  • Bridged LSTs: Tokens like stETH are bridged to other chains (e.g., Arbitrum, Polygon) via canonical bridges, allowing their use in multi-chain DeFi ecosystems.
  • Native L2 Staking: Protocols are emerging that allow users to stake assets directly from an L2, minting an LST on that L2 to minimize bridging costs and latency.
  • Liquidity Fragmentation: This creates challenges with multiple representations of the same underlying asset, requiring solutions for liquidity aggregation and redemption path standardization.
05

Real-World Examples & Market Leaders

The ecosystem is led by several major protocols, each with distinct models:

  • Lido Finance: The largest protocol, using a staking pool model with a curated set of node operators. Its stETH token is the most widely integrated LST.
  • Rocket Pool: A decentralized protocol that allows anyone to run a node with a reduced collateral requirement (16 ETH), issuing rETH.
  • Coinbase Cloud (cbETH): A custodial offering from a centralized exchange, providing institutional-grade infrastructure.
  • Frax Finance (sfrxETH): Integrates with its algorithmic stablecoin ecosystem, using staking yield to help peg stability.
06

Risks & Considerations

While powerful, liquid staking introduces specific risks that users must evaluate:

  • Smart Contract Risk: LSTs and their underlying protocols are complex smart contracts vulnerable to exploits and bugs.
  • Peg Stability Risk: The price of an LST can trade at a premium or discount to its underlying asset, especially during market stress or redemption bottlenecks.
  • Centralization Risk: Concentration of staked assets with a few providers poses systemic risks to PoS networks.
  • Liquidity Risk: The ability to redeem an LST for the underlying asset may be subject to unstaking delays (e.g., Ethereum's withdrawal queue) or liquidity pool depth.
COMPARISON

Liquid Staking vs. Traditional Staking

A side-by-side analysis of the core operational and financial characteristics of liquid staking derivatives (LSDs) and direct staking.

Feature / MetricLiquid StakingTraditional Staking

Liquidity of Staked Assets

High (via Liquid Staking Token)

Locked (until unbonding period ends)

Capital Efficiency

Yield Sources

Staking rewards + DeFi strategies

Staking rewards only

Unbonding / Withdrawal Delay

Instant (via DEX/AMM)

Protocol-specific (e.g., 7-28 days)

Custodial Risk

Varies (Non-custodial to custodial)

Non-custodial (self-custody)

Protocol Slashing Risk

Borne by staker

Borne by staker

Counterparty / Smart Contract Risk

Typical Minimum Stake

None (fractional via LST)

Protocol minimum (e.g., 32 ETH)

security-considerations
LIQUID STAKING

Security & Risk Considerations

While liquid staking unlocks capital efficiency, it introduces distinct security vectors and smart contract dependencies that must be evaluated.

01

Smart Contract Risk

The primary risk is the integrity of the liquid staking protocol's smart contracts. Users delegate their assets to these contracts, which must be flawlessly coded to manage staking, slashing, and reward distribution. A single bug or exploit can lead to catastrophic loss of funds, as seen in historical incidents. This risk is mitigated through extensive audits, formal verification, and bug bounty programs.

02

Slashing Risk

Liquid staking does not eliminate the underlying Proof-of-Stake slashing penalties. If the node operator(s) validating on behalf of the protocol (e.g., through a Distributed Validator Technology (DVT) cluster or a centralized entity) acts maliciously or goes offline, the staked assets can be penalized. This slashing is typically socialized across all stakers in the pool, proportionally reducing the value of their liquid staking tokens (LSTs).

03

Centralization & Censorship Risk

Many liquid staking protocols rely on a limited set of node operators, creating centralization points. This can lead to:

  • Governance capture where a few entities control voting power.
  • Censorship risk if operators collude to exclude certain transactions.
  • Systemic risk if a major operator fails or is compromised. Protocols using permissionless operator sets or DVT aim to mitigate this.
04

Oracle & Pricing Risk

Liquid staking tokens (LSTs) like stETH or rETH rely on price oracles to maintain their peg to the underlying staked asset (e.g., 1 stETH ≈ 1 ETH + accrued rewards). If the oracle providing the exchange rate is manipulated or fails, it can cause massive arbitrage losses for decentralized finance (DeFi) protocols using the LST as collateral, potentially triggering cascading liquidations.

05

Liquidity & Depeg Risk

While 'liquid,' staking derivatives can trade at a premium or discount to their net asset value, especially during market stress or if unstaking delays are long. A sustained depeg (e.g., stETH trading below ETH) can erode confidence and cause liquidity to flee secondary markets. The depth of liquidity pools (e.g., on Curve Finance) is critical for maintaining the peg.

06

Validator Key Management

Who controls the validator signing keys is a critical security consideration. In some models, the protocol controls the keys (custodial risk), while in non-custodial models like Rocket Pool, node operators control their own keys. Theft or loss of these keys leads to slashing or loss of funds. Distributed Validator Technology (DVT) splits key responsibility across multiple nodes to enhance security.

LIQUID STAKING

Common Misconceptions

Liquid staking has become a cornerstone of DeFi, but its mechanics are often misunderstood. This section clarifies prevalent myths about security, centralization, and economic impacts.

Liquid staking is not inherently less secure; it shifts the security risk profile from slashing to smart contract and centralization risks. In solo staking, the validator operator bears the direct risk of slashing penalties for misbehavior. With liquid staking, the staking provider (like Lido or Rocket Pool) manages validator operations, so the delegator's primary risks are the provider's smart contract integrity and potential governance failures. The underlying staked assets on the consensus layer (e.g., Ethereum) remain secured by the same protocol rules. Therefore, security depends on the chosen provider's audit history, decentralization of node operators, and the robustness of its withdrawal credentials management.

LIQUID STAKING

Frequently Asked Questions

Liquid staking is a fundamental DeFi primitive that unlocks the value of staked assets. This section addresses common technical and practical questions.

Liquid staking is a mechanism that allows users to stake their cryptocurrency to secure a Proof-of-Stake (PoS) blockchain while receiving a liquid staking token (LST) in return. This token is a tradable, yield-bearing representation of the staked asset. The process works by depositing tokens (e.g., ETH) into a smart contract managed by a liquid staking protocol. The protocol pools these assets, stakes them with validators on the underlying network, and mints an equivalent amount of LSTs (e.g., stETH, rETH) to the user. The LST accrues staking rewards and can be used across DeFi for lending, collateral, or trading, providing liquidity without unbonding periods.

Key Components:

  • Staking Pool: A smart contract that aggregates user deposits.
  • Liquid Staking Token (LST): The fungible token representing the staked position.
  • Node Operators/Validators: Entities that run the actual validation software, often selected by the protocol's decentralized autonomous organization (DAO).
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
What is Liquid Staking? | Blockchain Glossary | ChainScore Glossary