Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Stealth Liquidation

A mechanism for liquidating undercollateralized positions in private DeFi protocols without exposing the borrower's identity or specific transaction details.
Chainscore © 2026
definition
DEFINITION

What is Stealth Liquidation?

A stealth liquidation is the forced closure of an undercollateralized loan position in a decentralized finance (DeFi) protocol, executed automatically without a public on-chain transaction to trigger it.

In traditional DeFi lending protocols like Aave or Compound, a liquidation is a public event triggered when a user's health factor falls below 1, often due to collateral value dropping or borrowed asset value rising. This event is typically initiated by a liquidator who calls a public function, pays off part of the debt, and receives the collateral at a discount, with the entire process visible on-chain. Stealth liquidation subverts this model by using a keeper network or oracle to monitor positions off-chain and execute the liquidation via a private transaction, such as a Flashbots bundle or a direct submission to a validator, making the triggering action invisible in the public mempool.

The primary mechanism enabling stealth liquidation is transaction privacy. By bypassing the public mempool, the liquidation transaction is not broadcast for general visibility and thus cannot be front-run by other bots. This allows the protocol's designated keeper or a privileged actor to capture the full liquidation incentive (the discounted collateral) without competition. This approach is often integrated directly into a protocol's design, where a permissioned keeper or oracle network (like Chainlink Automation) is whitelisted to call the liquidation function, ensuring only they can initiate the process when predefined off-chain conditions are met.

Stealth liquidations present significant trade-offs. For users, they can be beneficial by preventing liquidation cascades and reducing gas auctions that drive up network fees during volatile markets. For the protocol, they can ensure more reliable and timely liquidations, protecting solvency. However, they also centralize a critical protocol function, removing the decentralized, permissionless competition of public liquidators. This creates a potential single point of failure and raises questions about MEV (Maximal Extractable Value) capture, as the liquidation profits are no longer openly contestable, potentially leading to a less efficient and more opaque market for this essential DeFi service.

how-it-works
MECHANISM

How Stealth Liquidation Works

An explanation of the automated, low-impact process for managing undercollateralized positions in DeFi lending protocols.

Stealth liquidation is a risk management mechanism in decentralized finance (DeFi) lending protocols that automatically closes an undercollateralized borrower's position in small, incremental portions to minimize market impact and avoid triggering a cascade of liquidations. Unlike traditional full liquidation events that sell a borrower's entire collateral at once—which can cause sharp price drops—stealth liquidations execute as a series of smaller, often automated, trades. This process is typically managed by specialized bots or keepers that monitor positions in real-time against the protocol's liquidation threshold.

The mechanism activates when a user's health factor falls below a critical level, usually 1.0, indicating their collateral value is insufficient to cover their debt. Instead of a single large auction, the protocol allows liquidators to repay a small, fixed portion of the outstanding debt—such as 50% of the liquidation bonus—in exchange for a proportional amount of the borrower's collateral. This incremental approach allows the remaining position to potentially recover if market prices move favorably, while simultaneously protecting the protocol's solvency by continuously reducing risk exposure.

Key advantages of this system include reduced slippage and lower price volatility for the underlying asset, as large, disruptive sell-offs are avoided. For the borrower, it can mean a partial recovery of their position instead of a total loss. Protocols like Aave and Compound employ variations of this model, where parameters like the liquidation close factor dictate the maximum percentage of debt that can be liquidated in a single transaction. This design represents a significant evolution from earlier, more brittle liquidation systems, contributing to overall DeFi market stability.

key-features
MECHANISM

Key Features & Characteristics

Stealth liquidation is a risk management mechanism in DeFi lending protocols that automatically sells a borrower's collateral to repay their debt when their health factor falls below a critical threshold, without requiring a public auction.

01

Automated, Non-Auction Process

Unlike traditional auction-based liquidations, stealth liquidations are executed automatically by keepers or liquidators who directly repay the borrower's debt in exchange for a portion of their collateral at a discount. This process occurs in a single transaction, bypassing public bidding wars. The key components are:

  • Liquidation Incentive: A discount (e.g., 5-15%) on the collateral's value, paid to the liquidator.
  • Health Factor: A numerical representation of a position's safety; liquidation triggers when it drops below 1.0.
  • Close Factor: The maximum percentage of a position's debt that can be liquidated in a single transaction.
02

Minimizes Market Impact

A core design goal is to reduce slippage and price volatility caused by large, predictable liquidation events. By allowing many liquidators to compete to fill small portions of an underwater position, the selling pressure is distributed. This contrasts with batch auction systems that can create predictable, large sell-offs, making the protocol and its users vulnerable to market manipulation and liquidation cascades.

03

Keeper Network Dependency

The system relies on a decentralized network of keepers (bots or individuals) who monitor the blockchain for undercollateralized positions. They compete to be the first to submit a profitable liquidation transaction, earning the liquidation bonus. This creates a latency race, where keepers invest in infrastructure for low-latency transaction submission. Protocols like Aave and Compound use this model.

04

Liquidation Threshold & Bonus

Two critical parameters govern the process:

  • Liquidation Threshold: The loan-to-value (LTV) ratio at which a position becomes eligible for liquidation (e.g., 80% for ETH). It is set lower than the maximum LTV for borrowing.
  • Liquidation Bonus (Penalty): The discount offered to liquidators, simultaneously acting as a penalty for the borrower. For example, a 10% bonus means the liquidator repays $100 of debt to receive $110 worth of collateral. This bonus covers the liquidator's gas costs and risk.
05

Protocol Design Variations

While the core mechanism is consistent, implementations vary:

  • Fixed Discount Models: Use a static liquidation bonus (e.g., Compound).
  • Dynamic Models: Adjust the bonus based on market conditions or the size of the shortfall.
  • Isolated vs. Cross-Collateral: Some protocols liquidate only the specific asset that triggered the event, while others may use the borrower's entire portfolio.
  • Gas Optimization: Advanced systems bundle liquidations or use flash loans to improve capital efficiency for keepers.
06

Risks & Criticisms

The model introduces specific risks:

  • Keeper Centralization: The latency race can lead to infrastructure centralization among a few professional keepers.
  • Gas Auction Wars: Keepers may engage in Priority Gas Auctions (PGAs), bidding up transaction fees, which can erode profits and congest the network.
  • Liquidation Fairness: Small, unsophisticated borrowers may have less time to react compared to auction systems with longer time delays.
  • Oracle Dependency: Entirely reliant on the accuracy and liveness of price oracles; a stale or manipulated price can trigger unnecessary liquidations.
privacy-components
STEALTH LIQUIDATION

Core Privacy Components

Stealth liquidation is a privacy-preserving mechanism that executes the forced closure of an undercollateralized position without revealing the target address or the liquidation event on-chain until after the fact. This prevents front-running and predatory behavior.

01

The Front-Running Problem

In traditional DeFi, public mempools broadcast pending transactions. When a position becomes eligible for liquidation, searchers can see this and front-run the liquidation transaction. This leads to:

  • MEV extraction at the borrower's expense.
  • Gas price wars that congest the network.
  • A toxic environment discouraging protocol use.
02

Mechanism: Private Order Flow

Stealth liquidation systems rely on private transaction relays or encrypted mempools. The liquidation trigger is sent directly to a trusted operator or a network of searchers via a private channel. Key steps include:

  • Off-chain matching: The liquidation opportunity is matched with a solver confidentially.
  • Commit-Reveal schemes: A transaction is submitted with its details hidden, only revealed after block inclusion.
  • Direct RPC endpoints: Bypassing the public mempool entirely.
03

Role of Trusted Execution Environments (TEEs)

Some implementations use TEEs (like Intel SGX) to create a secure, verifiable black box for processing liquidation logic. The TEE:

  • Receives the private state (e.g., unhealthy positions).
  • Computes the liquidation logic confidentially.
  • Signs and broadcasts the transaction directly to a validator. This ensures the liquidation is non-front-runnable and the computation is tamper-proof, though it introduces hardware trust assumptions.
05

Benefits for Protocol Health

Beyond user privacy, stealth liquidation enhances overall protocol resilience:

  • Predictable Liquidation Costs: Removes volatile gas auctions, making keeper economics stable.
  • Improved Borrower Experience: Reduces the 'liquidation penalty' exacerbated by front-running.
  • Systemic Stability: Ensures liquidations execute reliably, protecting the protocol's solvency during volatility.
  • Fairer Access: Levels the playing field for liquidation keepers.
06

Related Concept: Encrypted Mempools

A broader infrastructure for transaction privacy, of which stealth liquidation is a key use case. Projects like Shutter Network use threshold cryptography to encrypt transactions until they are included in a block. This prevents MEV extraction not just for liquidations, but for all trades and actions, representing a fundamental shift towards a private mempool future.

ecosystem-usage
STEALTH LIQUIDATION

Protocols & Ecosystem Usage

Stealth liquidation is a risk management mechanism used in DeFi lending protocols to discreetly close undercollateralized positions to minimize market impact and protect protocol solvency.

01

Core Mechanism

A stealth liquidation occurs when a lending protocol automatically sells a borrower's collateral to repay their debt after their health factor falls below a critical threshold (e.g., 1.0). Unlike traditional liquidations, it aims to execute via off-chain order flow or private mempools to prevent front-running and reduce price slippage. The process is triggered by keepers or liquidator bots who are incentivized by a liquidation bonus.

02

Key Advantages

The primary benefit is reduced market impact. By hiding the intent to liquidate, protocols avoid signaling large sell orders to the public mempool, which prevents:

  • Front-running by arbitrage bots.
  • Excessive price slippage that erodes collateral value.
  • Cascading liquidations that can lead to market instability. This protects both the protocol's solvency and remaining users from the negative externalities of public liquidations.
03

Implementation Examples

Protocols implement stealth features through specific infrastructure:

  • Aave V3: Uses Flashbot's SUAVE or similar MEV-relay services for private transaction bundling.
  • Compound Finance: Leverages keeper networks that submit transactions directly to validators.
  • Morpho Blue: Native integration with private RPC endpoints and order flow auctions to obscure intent. The goal is to route the liquidation transaction through a channel not visible on the public peer-to-peer network.
04

Liquidator Role & Incentives

Liquidators are essential actors who monitor positions and execute stealth liquidations. They are economically motivated by a liquidation bonus (or liquidation penalty), a discount at which they can purchase the collateral. For example, a 5% bonus means they repay 100% of the debt to seize collateral worth 105% of that debt. Their profitability depends on gas costs, bonus size, and their ability to execute transactions before competitors.

05

Health Factor & Liquidation Threshold

Liquidation is governed by two critical risk parameters:

  • Health Factor (HF): HF = (Collateral Value * Liquidation Threshold) / Total Borrowed. A position becomes liquidatable when HF < 1.
  • Liquidation Threshold: The maximum percentage of an asset's value that can be borrowed against (e.g., 80% for ETH).
  • Liquidation Bonus: The incentive paid to the liquidator, added as a discount on the collateral (e.g., 5-15%). These parameters are set by protocol governance and vary by asset risk.
06

Risks & Criticisms

While reducing MEV, stealth liquidations introduce other considerations:

  • Centralization Risk: Reliance on a few private relay services or keeper networks.
  • Opaque Execution: Lack of transparency can make it difficult to audit liquidation fairness.
  • Gas Auction Wars: Liquidators may still compete via priority gas auctions within private systems.
  • Regulatory Scrutiny: Private transactions may attract attention regarding market fairness and transparency regulations.
MECHANISM COMPARISON

Stealth vs. Traditional Liquidation

A technical comparison of liquidation mechanisms based on execution method, market impact, and user experience.

Feature / MetricStealth LiquidationTraditional Liquidation

Primary Execution Method

Batch auctions via MEV searchers

Immediate on-chain execution

Price Impact on User

Minimal (executed at best discovered price)

High (subject to slippage on public DEX)

Liquidation Trigger Visibility

Hidden until execution (submitted as a private transaction)

Publicly visible in mempool

Susceptibility to Frontrunning

Very Low (via encrypted mempools)

Very High

Liquidation Incentive Structure

Fixed fee paid to protocol + searcher bid

Liquidation bonus (e.g., 5-10%) to liquidator

Typical Time to Liquidation

< 1 sec (post-discovery)

Seconds to minutes

Capital Efficiency for Liquidators

High (capital only committed upon winning bid)

Low (capital must be pre-committed and ready)

Common Protocol Examples

EigenLayer, MarginFi

MakerDAO, Aave, Compound

security-considerations
GLOSSARY TERM

Security & Trust Considerations

A stealth liquidation is a liquidation event in a lending protocol where a borrower's collateral is sold off automatically and without prior public warning, triggered when their health factor falls below a predefined threshold.

01

The Liquidation Trigger

A stealth liquidation is initiated when a borrower's health factor (or collateralization ratio) drops below 1.0 (or a protocol-specific safe threshold like 1.1). This is typically caused by:

  • A sharp drop in the value of the collateral asset.
  • A significant increase in the value of the borrowed asset.
  • Accrued, unpaid interest on the loan. The process is automated by smart contract logic, removing the need for manual intervention and ensuring the protocol remains solvent.
02

The 'Stealth' Mechanism

The 'stealth' aspect refers to the transaction's execution path, designed to minimize market impact and protect the liquidator's profit. Instead of a public DEX swap, liquidators often use:

  • Flash loans to atomically borrow, repay the debt, claim the collateral, and sell it.
  • Private mempools (like Flashbots) to submit the transaction bundle directly to validators, bypassing the public mempool.
  • MEV (Maximal Extractable Value) strategies to capture the liquidation bonus efficiently. This prevents front-running and reduces slippage, but can centralize liquidation profits among sophisticated bots.
03

Risks for the Borrower

For borrowers, stealth liquidations pose significant financial risks with little recourse:

  • Total Loss of Collateral: The borrower loses the seized collateral, minus a liquidation bonus paid to the liquidator.
  • No Warning: The event can occur suddenly during market volatility, as there is no grace period or alert.
  • Remaining Debt: If the collateral sale doesn't cover the full debt (e.g., due to bad debt), the protocol may pursue the shortfall through other means, depending on its design.
  • Network Congestion: During high volatility, gas price spikes can prevent borrowers from depositing more collateral or repaying debt in time to save their position.
04

Systemic Protocol Risk

While protecting the protocol, stealth liquidations can contribute to systemic risk:

  • Cascading Liquidations: A large, stealthy liquidation can cause significant price impact on the collateral asset, potentially triggering a cascade of further liquidations in a death spiral.
  • Bad Debt Accumulation: If liquidators are unwilling to participate (e.g., due to low profitability or high gas costs), underwater positions may go unliquidated, creating bad debt that threatens the protocol's treasury and native token.
  • Oracle Manipulation: Sophisticated attacks may attempt to manipulate price oracles to trigger unjustified liquidations for profit.
05

Mitigation & Best Practices

Protocols and users employ several strategies to mitigate risks:

  • For Protocols: Using robust, decentralized price oracles (like Chainlink), implementing circuit breakers or auction-based liquidation mechanisms, and maintaining conservative loan-to-value (LTV) ratios.
  • For Borrowers: Maintaining a high health factor well above 1.0, using debt monitoring tools and alerts, avoiding maximum leverage, and diversifying collateral types to reduce correlation risk.
06

Related Concepts

Understanding stealth liquidation requires familiarity with these core DeFi mechanisms:

  • Health Factor: A numerical representation of a loan's safety, calculated as (Collateral Value * LTV) / Debt Value.
  • Liquidation Bonus: The incentive (typically 5-15%) paid to liquidators from the seized collateral.
  • MEV (Maximal Extractable Value): The profit extractable from reordering, including, or censoring transactions within blocks. Liquidations are a primary source of MEV.
  • Flash Loan: An uncollateralized loan that must be borrowed and repaid within a single transaction block, enabling complex arbitrage and liquidation strategies.
STEALTH LIQUIDATION

Common Misconceptions

Stealth liquidations are a critical risk in DeFi lending protocols, often misunderstood as a sudden, unpredictable event. This section clarifies the mechanics and common fallacies surrounding this automated process.

A stealth liquidation is the automated, often near-instantaneous, forced closure of an undercollateralized loan position by a lending protocol's smart contracts, typically triggered when a user's health factor falls below 1. It works through a permissionless system where keepers or liquidators monitor on-chain prices and execute liquidation functions to repay a portion of the borrower's debt in exchange for seizing their collateral, often at a liquidation penalty discount. The term 'stealth' refers to the speed and lack of explicit warning from the protocol itself, not a hidden or malicious action. The process is governed entirely by transparent, immutable code based on oracle-reported prices.

STEALTH LIQUIDATION

Technical Deep Dive

Stealth liquidation is a risk management mechanism in DeFi lending protocols designed to protect borrowers from immediate, large-scale collateral loss by gradually liquidating undercollateralized positions.

A stealth liquidation is a risk mitigation process where a DeFi lending protocol gradually sells the collateral of an undercollateralized position in small batches, rather than in a single, market-moving transaction. It works by continuously monitoring a user's health factor or collateralization ratio. When this metric falls below the liquidation threshold, a specialized keeper bot or the protocol itself executes a series of small, discreet trades over time. This mechanism aims to minimize slippage, reduce the impact on the asset's market price, and give the borrower more time to add collateral or repay debt before their entire position is closed. Protocols like Aave and Compound have implemented variations of this concept to improve market stability during periods of high volatility.

STEALTH LIQUIDATION

Frequently Asked Questions

Stealth liquidation is a critical risk management mechanism in DeFi lending protocols. These questions address its mechanics, risks, and how it differs from traditional liquidation events.

A stealth liquidation is a type of forced position closure in DeFi lending where a borrower's collateral is liquidated in small, incremental portions without triggering a public on-chain liquidation event or alert. Unlike a full liquidation, it occurs when a borrower's health factor or collateralization ratio dips slightly below the safe threshold, allowing a liquidator to repay a minimal amount of debt and claim a corresponding sliver of collateral at a discount, often through automated bots monitoring mempools. This process can repeat many times, silently eroding a position until it is fully closed or the borrower adds more collateral.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team