Understanding Vault Risks

A comprehensive guide for vault creators on identifying, measuring, and mitigating risks in Flux Protocol vaults.

Overview

As a vault creator, you're responsible for:

  • Choosing safe risk parameters

  • Monitoring vault health

  • Managing bad debt if it occurs

  • Protecting LP capital

This guide covers all major risk vectors and mitigation strategies.


Table of Contents


Risk Types

1. Manager Default Risk

Definition: Managers' positions become underwater, leading to bad debt.

Causes:

  • Sudden price crashes (collateral value drops below debt)

  • Leverage too high (small price moves trigger liquidation)

  • Illiquid collateral (can't sell fast enough)

  • Oracle lag (prices update too slowly)

Impact: LP shares lose value (socialized losses)

Mitigation:

2. Oracle Manipulation Risk

Definition: Price feeds are manipulated, causing incorrect liquidations or allowing underwater positions.

Causes:

  • Flash loan attacks on DEX price feeds

  • Compromised oracle nodes

  • Low-liquidity markets (easy to manipulate)

  • Oracle downtime/delays

Impact:

  • False liquidations (healthy positions liquidated)

  • Missed liquidations (unhealthy positions not liquidated)

Mitigation:

  • Use trusted oracles (Chainlink, not DEX spot prices)

  • Avoid exotic/low-liquidity assets

  • Monitor oracle health

  • Conservative liquidation buffers

3. Smart Contract Risk

Definition: Bugs in vault, wrapper, or strategy contracts.

Causes:

  • Uncaught edge cases

  • Reentrancy vulnerabilities

  • Integer overflow/underflow

  • Access control issues

Impact: Loss of all vault funds

Mitigation:

  • Use audited contracts

  • Immutable strategies (no upgrade risk)

  • Start with small TVL

  • Comprehensive testing

  • Bug bounty program

4. Liquidity Risk

Definition: Unable to withdraw due to high utilization.

Causes:

  • All capital borrowed by managers

  • Managers holding positions too long

  • LP withdrawal surge (bank run)

Impact: LPs can't access capital, queued withdrawals

Mitigation:

5. Interest Rate Risk

Definition: Rates no longer competitive (for Mutable strategies).

Causes:

  • Market rates change

  • Competing vaults offer better yields

  • Vault utilization drops

Impact:

  • LPs withdraw (if rates too low)

  • Managers avoid vault (if rates too high)

Mitigation (Mutable only):

6. Collateral Composition Risk

Definition: Correlated collateral assets amplify losses.

Causes:

  • Multiple similar assets (e.g., all stablecoins)

  • All assets in same sector (e.g., all DeFi tokens)

  • Contagion risk (one fails, others follow)

Impact: Systemic failure during black swan events

Mitigation:

  • Allow diverse asset types in strategy

  • Monitor manager position composition

  • Set reasonable per-asset limits (if possible)

7. Wrapper Risk

Definition: Asset wrappers have bugs or malicious code.

Causes:

  • Unaudited custom wrappers

  • Complex wrapper logic (UniV3, etc.)

  • Incorrect oracle integration

Impact: Incorrect valuations, loss of funds

Mitigation:

  • Only use governance-whitelisted wrappers

  • Prefer simple ERC20 wrappers

  • Audit custom wrappers thoroughly

  • Test wrappers with small amounts first


Parameter Selection

Choosing Safe Parameters

Conservative Vault Example:

Why conservative?

  • Higher bond requirement (30%) = more manager skin in game

  • Large buffer (20%) = withstand significant price drops

  • Lower leverage (3.3x) = harder to become underwater

  • ADL at 90% = protect LP liquidity early

Aggressive Vault Example:

Why aggressive?

  • Lower bond (15%) = higher leverage available

  • Small buffer (5%) = tight liquidation window

  • Higher leverage (6.7x) = easier to go underwater

  • Higher rate (15%) = compensate LPs for risk

Parameter Trade-offs

Parameter
Conservative
Aggressive
Impact

minBondRatio

High (25-30%)

Low (10-15%)

Leverage, manager appeal

liquidationBuffer

Large (15-20%)

Small (5-10%)

Safety margin, liquidation frequency

adlBuffer

Large (10-15%)

Small (5%)

LP protection, ADL frequency

adlUtilizationThreshold

Low (85-90%)

High (95-98%)

LP liquidity, capital efficiency

annualRate

Low (5-8%)

High (12-20%)

LP yield, manager cost

curatorFeeRate

Low (0-5%)

High (10-20%)

Your earnings, LP net yield

Decision Framework


Monitoring & Alerts

Key Metrics to Track

1. Vault Health

Alert Thresholds:

  • Utilization > 95% → ADL consideration

  • Bad debt > 0 → Immediate investigation

  • Bad debt > 5% of TVL → Crisis mode

  • Idle liquidity < $100K → Liquidity concerns

2. Individual Manager Positions

Alert Thresholds:

  • Health < 120% → Warning (in ADL zone)

  • Health < 115% → Urgent (near liquidation)

  • Health < 110% → Critical (liquidatable)

  • Large position (>$1M) + health < 130% → Special monitoring

3. Oracle Health

Dashboard Setup

Create a monitoring dashboard with:

Real-Time Metrics:

  • TVL (total value locked)

  • Utilization %

  • Bad debt %

  • Number of active managers

  • Total interest earned (lifetime)

Historical Charts:

  • TVL over time

  • Utilization over time

  • Bad debt incidents

  • Liquidation events

  • Share price growth

Alerts:

  • Email/SMS for critical events

  • Discord/Telegram notifications

  • PagerDuty for emergencies

Example Dashboard (Grafana/Dune):


Bad Debt Management

When Bad Debt Occurs

Bad debt happens when:

Example:

Responding to Bad Debt

Immediate Actions:

  1. Assess Impact:

  2. Communicate with LPs:

  3. Root Cause Analysis:

    • Which asset crashed?

    • Was liquidation delayed?

    • Were parameters too aggressive?

    • Oracle issue?

    • Extreme market event (black swan)?

  4. Adjust Parameters (if Mutable):

Preventing Future Bad Debt

Parameter Adjustments:

  • Increase liquidation buffer

  • Increase minimum bond ratio

  • Lower adlUtilizationThreshold (ADL earlier)

  • Remove problematic assets from allowlist (if Mutable)

Operational Improvements:

  • Better oracle monitoring

  • Faster liquidation bots

  • Higher liquidator incentives

  • Proactive manager communication

Capital Injection (optional):


Oracle Security

Oracles are critical infrastructure for Flux vaults. Oracle failures can lead to:

  • Incorrect liquidations

  • Bad debt accumulation

  • Vault insolvency

Oracle Best Practices

1. Use Trusted Sources

Good:

  • Chainlink Price Feeds

  • Band Protocol

  • Pyth Network

Avoid:

  • Uniswap V2 spot prices (manipulatable)

  • Single DEX as sole source

  • Unaudited custom oracles

2. Monitor Oracle Health

3. Sanity Checks

4. Multi-Oracle Validation

Responding to Oracle Failures

Scenario 1: Oracle goes offline

Scenario 2: Oracle manipulated

Scenario 3: Flash loan attack

Oracle Governance

Adding New Asset Oracles:

Updating Existing Oracles:


Emergency Procedures

Emergency Scenarios

1. Critical Smart Contract Bug

Indicators:

  • Funds drained

  • Unexpected behavior

  • Security researcher disclosure

Immediate Actions:

2. Oracle Failure

See Oracle Security above.

3. Bank Run (Mass Withdrawals)

Indicators:

  • Utilization suddenly spikes to 100%

  • LPs unable to withdraw

  • Managers not repaying

Actions:

4. Bad Debt Spiral

Indicators:

  • Multiple manager defaults

  • Bad debt > 10% of TVL

  • Share price dropping rapidly

Actions:


Last updated