Skip to main content

Symbiotic Staking Module

Symbiotic shared security models allow operators to borrow security from vaults operating on Layer 1 (L1). Kalypso Operators must indicate their intent on L1 about receiving delegation and must communicate with L1 vault operators to receive the delegation.

L1 operators then delegate the supported tokens to the Kalypso Operator. The delegation data is transmitted securely via transmitter enclaves, which have their own incentive ecosystem for doing so. Once relayed successfully, the Layer 2 (L2) contracts and the matching engine enclave instantly update the staking information within themselves and start assigning jobs based on the minimum delegation criteria.

Workflow Diagram

While it may look complicated, the operators only have to indicate the intent to participate in the network.


Diagram Explanation

  • Kalypso Operator: The operator seeking to borrow security from L1 vaults.
  • L1 Network: The primary layer where vaults operate and delegate security.
  • L1 Vault Operators: Entities on L1 that manage vaults and delegate tokens to operators.
  • Transmitter Enclaves: Secure components responsible for transmitting delegation data, incentivized to ensure data integrity and security.
  • L2 Contracts & Matching Engine: Layer 2 smart contracts and the matching engine enclave that handle staking updates and job assignments.
  • Job Assignment: The process of allocating jobs based on the updated staking information and minimum delegation criteria.

Process Flow:

  1. Indicate Intent: The Kalypso Operator signals their intention on the L1 Network to receive delegation.
  2. Communicate with Vault Operators: The operator communicates with L1 Vault Operators to initiate the delegation process.
  3. Delegate Tokens: L1 Vault Operators delegate the supported tokens to the Kalypso Operator.
  4. Transmit Delegation Data: The operator sends the delegation data to Transmitter Enclaves.
  5. Securely Relay Data: Transmitter Enclaves securely relay the delegation data to the L2 Contracts & Matching Engine.
  6. Update Staking Info: Upon successful data relay, the L2 Contracts & Matching Engine update the staking information.
  7. Job Assignment: Jobs are assigned based on the updated staking information and the minimum delegation criteria.

This model ensures a secure and efficient delegation process, leveraging both L1 and L2 infrastructures to facilitate job assignments based on delegated security.

note

(Don't worry) Kalypso Operator don't need to do all of these. They just need to indicate intent to receive delegation on L1 and L2