Symbiotic offers a flexible, asset-agnostic approach to shared security, supporting a wide range of ERC-20 tokens as collateral. This design introduces market risks tied to the volatility and liquidity of all accepted assets. Its modular and permissionless architecture allows individual Networks to implement custom slashing conditions, which requires participants to perform careful due diligence on the unique rules of each service.
The protocol operates through Vaults which are managed by Curators. The Curator acts as the strategist, defining the Vault's rules and selecting which trusted Operators, such as us, provide validation infrastructure.
Symbiotic is a protocol that creates a marketplace for shared security, connecting decentralized networks with asset providers. It allows a wide range of ERC-20 tokens, such as stablecoins and wrapped Bitcoin, to be deposited as collateral to secure these networks. In exchange for potential rewards, participants accept the specific risks and slashing conditions defined by the networks they help secure.
Unlike protocols with a single, fixed withdrawal queue, Symbiotic lets each Vault set its own epochDuration
. Your funds stay slashable until the end of the next epoch, so the real wait is the remainder of the current epoch plus one full epoch.
Because curators are free to make epochs as short as 0 seconds or as long as several days, always check the epochDuration
of the Vault before you deposit, different Vaults can have radically different exit times.
Unlike protocols with a fixed withdrawal timeline, the unbonding period for assets in Symbiotic is a customizable parameter. The duration is defined by each network and the Vault Curator. This means withdrawal times can vary significantly depending on the specific Vault you deposit into and the networks it secures.
Before committing assets, it is essential to review the specific unbonding terms of each Vault, as these can differ greatly from one another.
Symbiotic's architecture has several key features. Assets are held in smart contract Vaults and are not directly controlled by operators; however, they remain subject to slashing based on operator performance.
The protocol allows Curators to create customized Vaults with tailored parameters and slashing rules. This means risk exposure can vary significantly between Vaults, requiring careful due diligence from participants on each Curator's specific strategy and risk framework.