Security Model

Osito Protocol's security model is built on the principle of adversarial design - assuming the worst-case scenario and building safety mechanisms to ensure protocol BERAvency under those conditions.

Adversarial Design Philosophy

Every token is assumed to be malicious until proven otherwise through objective, verifiable criteria. The protocol is designed to remain solvent even if tokens are specifically created to attack it.

Core Security Mechanisms

Worst-Case Borrowing Limits

The foundation of Osito's security is its mathematical borrowing limit formula, which simulates a worst-case scenario where all circulating tokens are dumped into the liquidity pool at once.

max_borrow = pool_BERA - (dumpable_tokens * pool_BERA/pool_tokens / 2)

By limiting borrowing to less than the minimum BERA that would remain after such an event, the protocol guarantees it can remain solvent even under extreme market conditions.

Objective Token Qualification

Tokens must meet verifiable criteria to be used as collateral:

  • Deployed by trusted factories (Panda Factory or Ramen)
  • Verifiably burned LP tokens to ensure there's a baseline of permanent liquidity

No Rehypothecation

Collateral assets are never reused or rehypothecated, allowing for much higher capital efficiency (90% utilization target) without increasing systemic risk. Each asset is used only once as collateral.

Real-Time Risk Assessment

The protocol recalculates borrowing limits in real-time with each interaction, using fresh on-chain data to ensure decisions are always based on current market conditions, not stale information.

Defense Against Common Attacks

Oracle Manipulation

Traditional Vulnerability: Price oracles can be manipulated through flash loans or other attack vectors.

Osito's Defense: No reliance on oracles. All calculations use direct on-chain data and worst-case analysis.

Governance Attacks

Traditional Vulnerability: Governance mechanisms can be captured or manipulated.

Osito's Defense: No governance tokens or subjective decision-making required for normal operations.

Flash Loan Attacks

Traditional Vulnerability: Flash loans can be used to manipulate market prices temporarily.

Osito's Defense: Worst-case scenario calculations already assume maximum negative price impact.

Infinite Mint Attacks

Traditional Vulnerability: Malicious tokens can infinitely mint to manipulate prices.

Osito's Defense: Only tokens from verified deployers (Panda & Ramen) are eligible as collateral.

Liquidation Mechanism

The liquidation system is a critical part of Osito's security model:

All-or-Nothing Liquidations

When a position becomes liquidatable (when borrowed BERA exceeds position max borrow):

  • Liquidators repay the entire debt of the position
  • Liquidators receive most of the collateral (minus a small bonus to the borrower)
  • This simple approach guarantees bad debt is fully resolved in a single transaction

Liquidation Bonus

A small portion of collateral (10%) is returned to the borrower as a liquidation bonus, providing a safety buffer for liquidators while ensuring borrowers retain some value.

Economic Incentives

The liquidation system creates strong economic incentives for liquidators to maintain protocol solvency without requiring centralized intervention.