Skip to main content

How Does “Liquid Staking” Introduce a New Layer of Risk to PoS Security?

Liquid staking introduces a new layer of risk by creating a liquid derivative token (LST) that represents the user's staked asset. This token can be traded or used in DeFi protocols, potentially centralizing control of the underlying staked assets in the hands of a few LST protocols.

If a single liquid staking protocol controls over 51% of the staked tokens, it could theoretically collude to perform a malicious attack without having to acquire the tokens directly, creating a single point of failure and centralization risk.

Are Proof of Stake Networks Also Vulnerable to Majority Attacks?
How Does Wrapping a Token Introduce a Form of Centralization Risk?
How Does a 51% Attack Differ between PoW and PoS Systems?
What Is the Primary Difference between a PoW and a Proof-of-Stake (PoS) 51% Attack?