Key Takeaways
- Restaking Mechanism: Allows ETH stakers to reuse their staked assets across multiple protocols, enhancing security and capital efficiency.
- Autonomous Verifiable Services (AVS): Developers can build various services, including data availability layers, oracles, and sidechains, secured by restaked ETH.
- Pooled Security Model: Increases network security by leveraging Ethereum’s validator set for external services.
- Open Marketplace: Operators and restakers choose which AVSs and risk profiles to support, while AVSs compete for security and participation.
- Open Innovation: Extends Ethereum’s security to new applications and consensus protocols.
To get an overview about EigenLayer check out our massive blog post: Ultimate Guide to EigenLayer: Revolutionizing Ethereum Staking and Security
What Is EigenLayer?
EigenLayer is a protocol built on Ethereum that introduced restaking, a cryptoeconomic primitive that lets staked assets provide security to services beyond Ethereum itself. This model allows stakers to reuse staked ETH or supported restaked assets to help secure additional services, while taking on additional operator, AVS, and slashing risk.
This is realized when users choose to leverage EigenLayer smart contracts to restake their ETH to provide cryptoeconomic security to additional applications (various middleware module iterations called actively validated services) on the network.
In essence, EigenLayer generates a free market for decentralized trust via Ethereum stakers to AVS modules that make use of validation and staking services provided by operators.
Much of EigenLayer’s potential lies in its ability to aggregate and extend cryptoeconomic security through its restaking primitive, while giving AVSs access to operators and restaked assets.
To help us better understand how EigenLayer works and the points we touched on above, it's necessary to take a closer look at the protocol’s main components in greater detail:
- Operators: Upon registration on EigenLayer, operators enable ETH stakers to delegate their staked assets as either native ETH or liquid staking tokens (LSTs). Operators then opt-in to provide a vast range of services (typically validation services) to AVSs to reinforce the overall functionality and security of their independent networks. Operators are entities that register with EigenLayer, receive delegations from stakers, and run AVS infrastructure. They are similar to validators in that they perform verification work, but their role is AVS-specific rather than Ethereum block validation.
- Autonomous Verifiable Services: Through EigenLayer, developers can build AVSs — services that require active verification by operators and can use EigenLayer for registration, rewards, slashing, and cryptoeconomic security.
- Restakers: EigenLayer allows users to delegate restaked assets to an operator, who may then allocate stake to AVSs. Restakers can earn rewards, but their delegated stake can become slashable if the operator opts into slashable Operator Sets.
- AVS Consumers: On EigenLayer, AVS consumers are essentially users that make use of the various types of AVS modules (i.e., different types of services connected to the network).
- AVS Developers: EigenLayer provides developers with accessibility to Ethereum’s staked capital and decentralized validator set, making previously inconceivable consensus mechanism designs possible though the EigenLayer trust network. Developers play an important role in the long-term value proposition of the network because they are tasked with building different types of AVSs to support the larger EigenLayer protocol.
- Delegation: Restakers delegate their restaked balance to a single operator. Delegation is all-or-nothing for the available restaked balance, and the operator’s AVS choices determine the staker’s exposure to rewards and slashing risk.
Fractured Trust Networks and the Evolution of Blockchain
For the first time, Bitcoin pioneered a decentralized peer-to-peer (P2P) blockchain network that introduced unalterable trust to its network participants. However, Bitcoin was application-specific, meaning it was designed only as a store of value (i.e., digital gold) and peer-to-peer payment network. Because Bitcoin lacked programmability, it meant that any decentralized application (dApp) that sought increased utility required a new blockchain that leveraged its own trust network.
Ethereum’s Innovation in Blockchain Systems
In 2015 the Ethereum blockchain launched after 2 years of development, bringing with it the ability for developers to programmatically create their own decentralized applications atop its network via the Ethereum Virtual Machine (EVM). This allowed for fully adaptable modular application development on the Ethereum trust network that extended far-reaching pooled security for all protocols, dApps (think Compound, Aave, and others), and the like built on the network.
The development of Ethereum decoupled innovation and trust and became the impetus underlying the decentralized pseudonymous economy. Essentially, this is because dApps are deployed on the Ethereum network via a trust-fee exchange model whereby the blockchain supplies trust, while dApps are charged a fee to use the network (often through the processing of network transactions and other mechanisms).
Ethereum Layer 2s as a Paradigm for Scalability and Fee Reduction
The Ethereum Layer 2 era provisioned the usability of rollup-centric scaling architecture by outsourcing execution to a single node (i.e., a centralized sequencer) or a small set of nodes able to absorb Ethereum trust by proving computation through an EVM smart contract utilizing cryptographic guarantees (through validity proofs and zk-rollups) or cryptoeconomic guarantees (through fraud proofs and optimistic rollups).
This innovation exponentially increased the number of rollup and proving technologies in the industry and also vastly increased the number of applications that could be built on Ethereum because it dramatically improved scalability and reduced gas fees that the mainchain struggled with.
Why Middleware Services Need Shared Security
Outside the confines of Ethereum exists a wide range of service modules known as Actively Validated Services. These services can be thought of as middleware that supports the intersection between blockchains and the dApps operating on their networks.
These can include data availability (DA) layers, oracle networks, consensus protocols, bridges, sidechains, trusted execution environments (TEEs), threshold cryptography schemes, secure multi-party computation (MPC) frameworks, keeper networks, virtual machines, and others.
Because they exist outside of Ethereum, these module components are susceptible to certain limitations, mainly the fact that they cannot make use of the pooled trust network that Ethereum provides (i.e., security).
These modules typically require the processing of inputs derived from outside of the Ethereum network (they must make use of the services that middleware provides (e.g., oracles for asset pricing within a wallet) to connect themselves and the blockchain). Consequently, their processing requirements cannot be validated within the Ethereum mainchain because they don't use Ethereum for security, they just provide a service to users of the network.
Traditionally, these modules have needed their own validation networks or token-based security models, which can fragment trust and increase bootstrapping costs.
In the section below, we’ll explain the differences between the cryptoeconomic pooled security model and the approach taken traditionally when the pooled security framework is not employed.
For this to all make sense, it’s important to note that when an attacker attacks an AVS (or dApp) there is a predetermined cost depending on many factors that the attacker must consider. This means in order to corrupt an AVS or application and take control of it (or take control of its assets), the attacker must have a certain amount of capital and fulfill additional requirements in a best case attack scenario. This is called the Cost-of-Corruption (CoC).
Therefore, when the CoC is much higher than the Profit-from-Corruption (PfC), the system is considered to be robustly secure. In essence, this means that if the potential challenges the attacker must undertake are much larger than the potential reward, it is not really worth carrying out the attack in the first place.
Within the present AVS landscape, four main challenges exist that are related to the above idea, including:
- AVS bootstrapping issues: Developers who choose to develop a new AVS must bootstrap a new trust network to obtain the security guarantees they desire.
- Network value loss: Because each individualized AVS develops its own trust pool, users are required to pay fees to these pools in addition to transaction fees to Ethereum, resulting in value loss from the Ethereum network.
- Dramatically increased capital cost: Validators who stake to secure a newly launched AVS must incur significant capital costs equivalent to the opportunity cost and price risk associated with staking within a new system. This means the AVS must provide a staking return that is more than sufficient to cover this increased cost. Typically, the capital cost for providing staking services is much higher than any operating cost. Case in point, if a data availability layer hosts 5 billion in staked capital to secure its services and the annual percentage return (APR) anticipated by stakers is 10%, the AVS is required to pay at a minimum, 0.5 billion per year to make up for capital cost, a figure significantly higher than its overall operating costs.
-
Reduced trust model for dApps: Unfortunately, the existing AVS landscape exhibits numerous qualities that limit the robustness of dApp security, meaning for example, that any number of dApp dependencies could be susceptible to an attack without the dApp actually taking it head on initially. Therefore, dApp security vulnerability corruption extends largely to the required minimum costs that it would take to overcome one of its dependencies. As an example, this could mean that the costs an attacker must cover could extend simply to the amount staked within an all-important module such as an oracle, instead of having to incur extremely significant costs (the Cost-of-Corruption) to attack Ethereum.
How EigenLayer Restaking Addresses Fragmented Trust
As a solution to the four main challenges we touched on above, EigenLayer employs two main frameworks that address these issues head on: pooled security via restaking and free-market governance both of which are designed to augment Ethereum’s security to any system type, while addressing some of the inefficiencies of existing blockchain security and governance frameworks.
- Pooled security via restaking: EigenLayer provisions a newly developed mechanism for pooled security by allowing modules to be secured by restaked ETH instead of their own in-house tokens. Native restakers can point Ethereum validator withdrawal credentials to EigenLayer smart contracts called EigenPods, while liquid restakers deposit supported token strategies into EigenLayer smart contracts. Validators then download and run any additional node software that is required by these modules. After opting into an AVS’s Operator Set, operators may become subject to AVS-specific slashing conditions. Since EigenLayer’s April 2025 mainnet slashing launch, AVSs can define enforceable commitments, while operators and their delegated stakers choose whether the risk/reward profile is acceptable. This mechanism is called restaking. IIn exchange, operators and restakers may receive AVS rewards, depending on the services supported, the operator’s fee settings, and EigenLayer’s rewards framework. Rewards are not automatic or uniform across AVSs, so the expected return should be assessed alongside slashing and operator risk. When combined with EigenLayer’s live slashing framework, restaking enables AVSs to attach economic consequences to operator commitments. Slashed funds may be burned or, in redistributable Operator Sets, redirected according to the AVS design. Native ETH and EIGEN currently have redistribution limitations, so stakers should evaluate each operator and AVS carefully. As an example, if the module presents as a data availability layer, EigenLayer restakers will be granted a payment when data is stored via the module. In return, restakers are at risk of slashing conditions that are provisioned via proof-of-custody. Restaking therefore markedly expands the space that blockchain applications can share pooled security between one another. Consequently, EigenLayer extends open innovation well beyond smart contract-based dApps enabled via Ethereum to consensus protocols, virtual machines, and various types of middleware. As well, any AVS employing an on-chain slashing contract can benefit from the security guarantees of EigenLayer.
- Open free-market: As a decentralized protocol, EigenLayer provides an open market used to govern how the network’s pooled security is provided by validators and used by AVSs. EigenLayer furnishes an unbounded marketplace whereby validators are able to choose whether to opt in or out of each module built on the platform (i.e., they are able to select which AVSs they want to support). All AVSs must work hard to attract validators to support them by allocating restaked ETH to their specific module. Therefore, validators control which AVSs they decide to support by determining which ones are worthy of additional pooled security given the possibility of additional risk (slashing). More specifically, EigenLayer opt-in dynamics provide two critical benefits: 1.) the constant, conventional governance of the core blockchain is improved via a fast and effective free-market governance framework that allows for the launch of newly developed auxiliary capabilities; and 2.) opt-in validation allows new blockchain modules to manipulate diverse sets of resources between validators, ensuring more advantageous security and performance trade offs. These benefits help EigenLayer become a more efficient and equitable open marketplace where AVSs are able to rent pooled security provided by Ethereum validators.
By interconnecting these two above ideas, EigenLayer positions itself as an open permissionless marketplace where AVSs are able to rent pooled security provided via Ethereum validators.
In addition, EigenLayer solves the four main challenges that traditional AVS systems are susceptible to that we touched on above:
- AVS bootstrapping challenges: With EigenLayer, newly launched AVSs are able to bootstrap security from the larger Ethereum validator set, dramatically improving efficiency compared to traditional AVS systems.
- Network value accrual: EigenLayer provides ETH stakers with various additional revenue streams they can participate in, further consolidating the ecosystem’s network effects as a result of a robustly secure AVS ecosystem.
- More efficient capital cost: Because of the fact ETH stakers reuse their capital across numerous services (AVSs), their capital costs are gradually spread out. Specifically, the marginal cost native ETH stakers incur is barely negligible (“lower than bootstrapping a new validator set from scratch, but not zero, because restakers still face smart contract, operator, AVS, and slashing risks.)
- Trust aggregation: On EigenLayer, because of the fact that a larger pool of restaked capital exists, the trust model is vastly more robust compared to the non-pooled security model. To illustrate the difference between traditional AVS systems (those that don’t leverage pooled security) and those on EigenLayer, in a theoretical example an attacker would potentially need only 1 billion (a much lower Cost-of-Corruption) worth of staked capital to attack an AVS not employing pooled security. However, to carry out a similar attack against EigenLayer, the attacker would need a 13-fold increase in capital or 13 billion (see the diagram explaining this concept above). The result is that EigenLayer can offer stronger pooled-security assumptions than isolated security models, although the actual protection depends on the amount of allocated stake, AVS design, operator behavior, and slashing implementation.
Resources
The information provided by DAIC, including but not limited to research, analysis, data, or other content, is offered solely for informational purposes and does not constitute investment advice, financial advice, trading advice, or any other type of advice. DAIC does not recommend the purchase, sale, or holding of any cryptocurrency or other investment.


