The past two weeks have delivered several developments shaping the evolution of decentralized finance and staking infrastructure.
While market headlines often focus on price movements, deeper signals are emerging across crypto markets: staking participation is expanding, new financial products are integrating blockchain infrastructure, and tokenized assets continue entering decentralized ecosystems.
These signals matter for anyone allocating capital into digital assets or building infrastructure around them. Validator infrastructure, network security models, and liquidity rails increasingly intersect with broader financial markets.
This edition of DeFi Dispatch highlights five developments from the past two weeks that illustrate how DeFi markets and staking ecosystems continue evolving.
1. Ethereum staking participation remains strong as validator demand grows
2. BlackRock’s proposed Ethereum ETF structure may include staking participation
3. A new staking-enabled SUI ETF highlights expansion beyond Ethereum ecosystems
4. Stablecoin liquidity continues expanding across DeFi markets
5. Tokenized real-world assets remain a fast-growing sector of on-chain finance
Together, these developments reinforce a broader trend: DeFi infrastructure is increasingly intersecting with global capital markets.
For additional background on staking infrastructure and validator participation models:
In the last edition, we explored how participation in decentralized finance is shifting toward more structured participation models and infrastructure-driven activity.
If you want additional context before diving into this week’s developments, you can read the previous DeFi Dispatch here:
Read the previous DeFi Dispatch here.
One of the most discussed developments this month is BlackRock’s Ethereum ETF proposal, which includes provisions allowing a portion of the fund’s ETH holdings to participate in staking.
According to filings and analysis, the ETF could allocate a significant portion of its ETH to staking while maintaining a liquidity buffer for redemption flows.
The design highlights an emerging intersection between traditional financial products and proof-of-stake infrastructure.
Staking participation within ETF structures introduces operational considerations such as:
• validator selection
• staking activation and exit queues
• liquidity management
• network participation mechanics
While the ETF structure itself does not directly operate validator infrastructure, these designs illustrate how staking mechanics are increasingly becoming part of broader crypto financial products.
Rewards in proof-of-stake networks remain protocol-defined and variable, depending on validator participation and network conditions.
Source: BlackRock explores staking feature for Ethereum ETF (Reuters)
Ethereum staking participation remains one of the most important signals across DeFi infrastructure.
Over the past two weeks, data from blockchain analytics platforms shows continued expansion in ETH committed to staking contracts.
The Ethereum network now secures tens of millions of ETH through validator participation.
This growth reflects several structural factors:
• improved validator tooling
• expanded staking service providers
• increased familiarity with proof-of-stake mechanics
• long-term network participation by asset holders
As staking participation grows, the validator ecosystem becomes increasingly important for maintaining network reliability and operational continuity.
Professional validator operators play a key role in ensuring networks remain aligned with protocol requirements.
Source: Ethereum Staking Metrics Dashboard (Glassnode)
Another notable development came from Canary Capital, which recently listed a spot SUI ETF that includes staking participation.
The product allows the ETF’s underlying SUI holdings to participate in staking within the network.
While Ethereum remains the largest proof-of-stake ecosystem, this product demonstrates that staking participation is increasingly appearing across multiple blockchain ecosystems.
The development reflects growing interest in:
• diversified proof-of-stake networks
• validator infrastructure across ecosystems
• blockchain-based financial products
As additional networks develop staking participation models, infrastructure providers and validators will continue playing a central role in maintaining network operations.
Source: Canary Capital launches SUI ETF with staking rewards (CoinDesk)
Stablecoins remain the primary liquidity layer across decentralized finance.
Recent data shows continued growth in stablecoin supply across multiple blockchain ecosystems.
Stablecoins now underpin a wide range of DeFi activities including:
• lending protocols
• decentralized exchanges
• collateralized borrowing
• cross-chain liquidity
For participants interacting with DeFi protocols, stablecoins often serve as the base settlement layer that enables capital to move between different applications.
The growth of stablecoin liquidity reinforces the importance of reliable blockchain infrastructure and validator participation to support transaction settlement across networks.
Source: Stablecoin Supply Report (CoinMetrics)
Tokenized real-world assets remain one of the fastest-growing sectors of decentralized finance.
Recent developments across DeFi protocols show continued experimentation with tokenized treasury instruments, credit markets, and real-world collateral.
Tokenized assets allow traditional financial instruments to be represented on blockchain networks, enabling programmable settlement and composability with DeFi protocols.
For investors and infrastructure operators alike, the growth of tokenized assets increases the importance of:
• network reliability
• validator performance
• blockchain settlement layers
As tokenization expands, proof-of-stake networks will continue serving as the infrastructure layer supporting these markets.
Source: Institutional Research on Tokenized Assets (CoinShares)
Proof-of-stake networks rely on validators to maintain consensus and validate transactions. As more assets are staked within these networks, validator infrastructure becomes critical for ensuring network stability and operational continuity.
No. Rewards are determined by the underlying protocol and network conditions. They vary depending on factors such as validator participation and network parameters, and they are not guaranteed.
Stablecoins serve as the primary liquidity layer across DeFi ecosystems. They enable trading, lending, and collateralized borrowing without requiring participants to move in and out of volatile crypto assets.
Validators participate in network consensus by verifying transactions and proposing new blocks according to protocol rules. Their participation helps secure the network and maintain transaction finality.
Several signals from the past two weeks highlight the continued evolution of DeFi infrastructure:
• staking participation continues expanding across proof-of-stake networks
• new financial products are incorporating blockchain staking mechanics
• stablecoins remain central to DeFi liquidity infrastructure
• tokenized assets are bringing traditional financial instruments on-chain
• validator infrastructure continues playing a critical role in network security
As decentralized finance continues maturing, staking infrastructure and validator participation remain fundamental components of the broader crypto ecosystem.
Want to learn more about staking infrastructure and validator services, or request a 1-to-1 discovery session with our DeFi and staking experts? Visit https://www.p2p.org/ and contact through the live chat widget.
<h2 id="validator-playbook-series"><strong>Validator Playbook Series</strong></h2><p>This article is part of <strong>Validator Playbook</strong>, a series examining validator infrastructure, operational safeguards, and governance practices relevant to institutions participating in proof-of-stake networks.</p><p>The series focuses on how validator systems are designed, operated, and evaluated by:</p><p>• digital asset custodians<br>• asset managers and crypto funds<br>• exchanges offering staking<br>• institutional treasury teams<br>• infrastructure engineers<br>• validator risk committees</p><h2 id="quick-lessons-for-custodians-funds-exchanges"><strong>Quick Lessons for Custodians, Funds & Exchanges</strong></h2><p>If your organization allocates ETH to validators or operates staking infrastructure, these principles matter:</p><ul><li><strong>Ethereum slashing is protocol-enforced and irreversible</strong></li><li><strong>Correlated slashing events, not isolated validator errors, represents the primary institutional risk</strong></li><li><strong>Downtime does not equal ethereum slashing; signing violations trigger slashing</strong></li><li><strong>Operational governance failures often cause slashing events</strong></li><li><strong>Validator architecture, signing systems, and change management materially influence slashing exposure</strong></li></ul><p>If a staking provider cannot clearly explain how their architecture reduces correlated ethereum slashing exposure, that is a risk signal worth examining.</p><p>Below we examine how <strong>slashing events</strong> work and why institutional staking teams treat it as a governance and infrastructure issue.</p><h2 id="who-this-guide-is-for"><strong>Who This Guide Is For</strong></h2><p>This guide is written for teams evaluating validator participation within institutional staking programs.</p><p>Typical readers include:</p><ul><li>digital asset custodians</li><li>crypto-native hedge funds</li><li>ETF and ETP issuers</li><li>exchanges offering ETH staking</li><li>treasury teams holding significant ETH</li><li>infrastructure engineers</li><li>staking product managers</li><li>validator risk committees</li></ul><p>Ethereum slashing is not primarily a retail concern.</p><p>For institutions operating validators or delegating stake, <strong>slashing events are a capital risk and operational governance issue</strong>.</p><p>P2P operates validator infrastructure in a <strong>non-custodial, client-controlled architecture aligned with protocol rules</strong>.</p><h2 id="what-is-ethereum-slashing"><strong>What Is Ethereum Slashing?</strong></h2><p><strong>Ethereum slashing</strong> is a protocol-level penalty mechanism built into Ethereum’s Proof-of-Stake consensus system.</p><p>Its purpose is to protect network security by penalizing validator actions that violate consensus rules.</p><p>Ethereum slashing is designed to:</p><ul><li>deter equivocation</li><li>enforce validator accountability</li><li>protect consensus finality</li><li>discourage malicious or negligent behavior</li></ul><p>When <strong>slashing events</strong> occur, the protocol automatically:</p><ol><li>Reduces a portion of the validator’s stake</li><li>Forces the validator to exit the validator set</li><li>Applies a correlation-based penalty multiplier</li></ol><p>The rules governing ethereum slashing are defined by protocol specifications:</p><p>Ethereum documentation --> <a href="https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/?ref=p2p.org#slashing">https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/#slashing</a></p><p>Ethereum consensus specifications --> <a href="https://github.com/ethereum/consensus-specs?ref=p2p.org">https://github.com/ethereum/consensus-specs</a></p><p>Because ethereum slashing is enforced by protocol rules, there is <strong>no discretionary override or appeal process</strong>.</p><p>For institutional operators, this means validator risk must be addressed through architecture and governance practices.</p><h2 id="slashing-events-vs-inactivity-penalties"><strong>Slashing Events vs Inactivity Penalties</strong></h2><p>A common misunderstanding among funds evaluating staking infrastructure is confusing inactivity penalties with ethereum slashing.</p><p>These mechanisms serve different purposes.</p><h3 id="inactivity-penalties"><strong>Inactivity Penalties</strong></h3><p>Inactivity penalties occur when validators fail to participate in consensus activity.</p><p>Typical causes include:</p><ul><li>validator downtime</li><li>missed attestations</li><li>temporary infrastructure outages</li></ul><p>Inactivity penalties accumulate gradually and are generally recoverable once the validator resumes participation.</p><p>These penalties primarily reflect <strong>availability issues</strong>.</p><h3 id="ethereum-slashing"><strong>Ethereum Slashing</strong></h3><p><strong>Slashing events</strong> occur only when validators sign messages that violate protocol consensus rules.</p><p>Examples include:</p><ul><li>proposing conflicting blocks</li><li>submitting conflicting attestations</li><li>producing vote structures that violate consensus conditions</li></ul><p>Because ethereum slashing is triggered by <strong>signing violations</strong>, it is primarily a <strong>signing integrity and governance problem</strong>.</p><p>For institutional staking teams:</p><ul><li>redundancy helps reduce downtime risk</li><li>governance and signing discipline reduce slashing exposure</li></ul><h2 id="the-three-ethereum-slashing-conditions"><strong>The Three Ethereum Slashing Conditions</strong></h2><p>Ethereum slashing can occur when a validator performs specific protocol violations.</p><h3 id="1-double-proposal-proposer-equivocation"><strong>1. Double Proposal (Proposer Equivocation)</strong></h3><p>A validator proposes two different blocks for the same slot.</p><p>Possible operational causes include:</p><ul><li>active-active validator clusters</li><li>improperly configured failover mechanisms</li><li>infrastructure recovery events causing duplicate signing</li></ul><p>Double proposals represent a common operational slashing vector.</p><h3 id="2-double-vote"><strong>2. Double Vote</strong></h3><p>A validator submits two conflicting attestations for the same target epoch.</p><p>Typical causes include:</p><ul><li>slashing protection database inconsistencies</li><li>duplicate validator instances running simultaneously</li><li>improper key reuse during migration</li></ul><h3 id="3-surround-vote"><strong>3. Surround Vote</strong></h3><p>A validator submits an attestation that surrounds another attestation submitted earlier.</p><p>This situation may occur during:</p><ul><li>validator migration events</li><li>incomplete slashing protection restoration</li><li>disaster recovery operations</li></ul><p>For custodians deploying new infrastructure or rotating validator systems, this scenario requires careful operational planning.</p><h2 id="how-ethereum-slashing-penalties-are-calculated"><strong>How Ethereum Slashing Penalties Are Calculated</strong></h2><p>Ethereum slashing penalties include several components.</p><p>When slashing occurs, the protocol applies:</p><ol><li><strong>Initial penalty</strong> reducing validator balance</li><li><strong>Forced exit</strong> from the validator set</li><li><strong>Correlation penalties</strong> depending on simultaneous violations</li></ol><p>Correlation penalties are particularly relevant for institutional validator operators.</p><p>If only one validator is slashed, penalties are relatively limited.</p><p>However, if many validators violate consensus rules within the same timeframe, the protocol increases the total penalty through correlation multipliers.</p><p>This design discourages systemic validator failures.</p><h2 id="correlated-ethereum-slashing-a-key-institutional-risk"><strong>Correlated Ethereum Slashing: A Key Institutional Risk</strong></h2><p>For institutions operating multiple validators, <strong>correlated ethereum slashing</strong> is the primary risk scenario.</p><p>Correlated slashing may occur when infrastructure environments share identical characteristics.</p><p>Examples include:</p><ul><li>homogeneous infrastructure architecture</li><li>identical client software deployment</li><li>centralized signing systems</li><li>identical failover logic across validator clusters</li></ul><p>Under these conditions, a single configuration error could propagate across many validators.</p><p>For regulated entities such as custodians or ETF issuers, correlated ethereum slashing may also create operational and reporting considerations.</p><p>Ethereum slashing therefore has both <strong>technical and governance implications</strong>.</p><h2 id="operational-scenarios-that-may-lead-to-ethereum-slashing"><strong>Operational Scenarios That May Lead to Ethereum Slashing</strong></h2><p>In practice, most ethereum slashing events arise from operational mistakes rather than malicious behavior.</p><h3 id="cloud-region-recovery-scenario"><strong>Cloud Region Recovery Scenario</strong></h3><ol><li>Primary infrastructure fails.</li><li>Backup systems activate.</li><li>Primary systems recover unexpectedly.</li><li>Duplicate signing occurs.</li></ol><p>Result: ethereum slashing triggered by double proposal.</p><h3 id="validator-migration-scenario"><strong>Validator Migration Scenario</strong></h3><ol><li>Validator infrastructure is migrated to new hardware.</li><li>Slashing protection history is incomplete.</li><li>Validators sign conflicting attestations.</li></ol><p>Result: ethereum slashing.</p><h3 id="client-software-bug-scenario"><strong>Client Software Bug Scenario</strong></h3><ol><li>All validators operate identical client software versions.</li><li>A consensus bug emerges.</li></ol><p>Result: correlated ethereum slashing across validator fleet.</p><p>Client diversity helps reduce this exposure.</p><h3 id="governance-failure-scenario"><strong>Governance Failure Scenario</strong></h3><ol><li>Infrastructure change deployed without peer review.</li><li>Configuration error propagates across validators.</li></ol><p>Result: multi-validator ethereum slashing event.</p><p>In many cases, ethereum slashing reflects governance breakdown rather than infrastructure capacity limitations.</p><h2 id="evaluating-validator-infrastructure-risk"><strong>Evaluating Validator Infrastructure Risk</strong></h2><p>Institutional teams allocating ETH to validators should evaluate several risk dimensions.</p><p>Examples include:</p><ul><li>infrastructure architecture diversity</li><li>client software distribution</li><li>validator operator concentration</li><li>governance and change management processes</li></ul><p>If an institution allocates all ETH staking to a single operator running uniform infrastructure, correlated ethereum slashing exposure may increase.</p><p>Diversification across validator operators and infrastructure environments may reduce systemic exposure.</p><h2 id="operational-safeguards-designed-to-reduce-slashing-exposure"><strong>Operational Safeguards Designed to Reduce Slashing Exposure</strong></h2><p>Professional validator operators typically implement layered operational safeguards.</p><p>These controls focus on reducing the likelihood of signing conflicts.</p><p>Examples include:</p><h3 id="slashing-protection-systems"><strong>Slashing Protection Systems</strong></h3><ul><li>persistent slashing protection databases</li><li>validated backup processes</li><li>documented migration procedures</li></ul><h3 id="remote-signing-infrastructure"><strong>Remote Signing Infrastructure</strong></h3><ul><li>isolated signing systems</li><li>message validation checks</li><li>controlled signing authority</li></ul><h3 id="deterministic-failover-architecture"><strong>Deterministic Failover Architecture</strong></h3><ul><li>clear validator failover logic</li><li>state reconciliation checks</li><li>avoidance of duplicate validator instances</li></ul><h3 id="client-diversity"><strong>Client Diversity</strong></h3><p>Validator fleets may use multiple consensus clients such as:</p><ul><li>Lighthouse</li><li>Prysm</li><li>Teku</li><li>Nimbus</li><li>Lodestar</li></ul><p>Client diversity can reduce correlated risk associated with software bugs.</p><h3 id="governance-controls"><strong>Governance Controls</strong></h3><p>Operational governance processes may include:</p><ul><li>peer-reviewed infrastructure changes</li><li>staged rollout procedures</li><li>incident response simulations</li><li>infrastructure audit logging</li></ul><p>Institutional validator operations depend heavily on governance discipline.</p><h2 id="evaluating-validator-partners"><strong>Evaluating Validator Partners</strong></h2><p>Custodians, exchanges, and funds evaluating validator providers often ask questions such as:</p><ol><li>What is your historical slashing record?</li><li>How is correlated ethereum slashing risk managed?</li><li>What validator clients are used and in what distribution?</li><li>How is slashing protection handled during migrations?</li><li>What governance controls exist around infrastructure changes?</li></ol><p>Examples of validator infrastructure operated by P2P can be explored here:</p><p>👉🏼 <a href="https://p2p.org/staking?ref=p2p.org">https://p2p.org/staking</a><br>👉🏼 <a href="https://p2p.org/products/dvt-staking?ref=p2p.org">https://p2p.org/products/dvt-staking</a></p><p>Additional educational resources:</p><p>👉🏼 <a href="https://p2p.org/economy/ethereum-staking-guide/">https://p2p.org/economy/ethereum-staking-guide/</a><br>👉🏼 <a href="https://p2p.org/economy/what-is-ethereum-proof-of-stake/">https://p2p.org/economy/what-is-ethereum-proof-of-stake/</a></p><h2 id="ethereum-slashing-and-restaking-considerations"><strong>Ethereum Slashing and Restaking Considerations</strong></h2><p>As restaking models evolve, validator operators may encounter additional layers of slashing exposure.</p><p>Institutions evaluating extended validation models should consider:</p><ul><li>cross-protocol slashing conditions</li><li>shared signing infrastructure risks</li><li>aggregated penalty modeling across systems</li></ul><p>Ethereum slashing therefore may interact with broader validation ecosystems.</p><h2 id="faq-institutional-ethereum-slashing-questions"><strong>FAQ: Institutional Ethereum Slashing Questions</strong></h2><h3 id="what-exactly-triggers-ethereum-slashing"><br><strong>What exactly triggers ethereum slashing?</strong></h3><p>Ethereum slashing occurs when a validator signs messages that violate protocol consensus rules. These violations include double proposals, double votes, and surround votes. The network automatically verifies and enforces penalties according to protocol specifications.</p><h3 id="how-severe-can-ethereum-slashing-penalties-be"><strong>How severe can ethereum slashing penalties be?</strong></h3><p>Ethereum slashing penalties include an initial balance reduction, forced validator exit, and correlation penalties that increase if multiple validators violate consensus rules simultaneously.</p><h3 id="is-ethereum-slashing-common-among-institutional-validators"><strong>Is ethereum slashing common among institutional validators?</strong></h3><p>Ethereum slashing is relatively uncommon among mature validator operators, but correlated slashing events represent low-probability, high-impact scenarios that institutional staking teams should evaluate.</p><h3 id="is-downtime-equivalent-to-ethereum-slashing"><strong>Is downtime equivalent to ethereum slashing?</strong></h3><p>No. Downtime results in inactivity penalties, while ethereum slashing occurs only when signing violations break consensus rules.</p><h2 id="key-takeaway-for-custodians-funds-exchanges"><strong>Key Takeaway for Custodians, Funds & Exchanges</strong></h2><p>For custodians, funds, exchanges, ETF issuers, and treasury teams operating validators, <strong>ethereum slashing represents a governance and infrastructure risk</strong>.</p><ol><li>Protocol rewards may be visible.</li><li>Infrastructure discipline is less visible.</li><li>Resilient validator operations depend on architecture, operational governance, and careful infrastructure design aligned with protocol requirements.</li></ol>
from p2p validator
<p>As on-chain financial infrastructure matures, one pattern is becoming increasingly clear: strong protocols succeed when paired with effective distribution.</p><p>High-quality lending infrastructure already exists. Capital-efficient designs, modular architectures, and professional-grade primitives are now well established. What continues to evolve is how these systems are delivered through fintech applications, neobanks, custodial platforms, exchanges, and wallets in a way that fits modern financial products.</p><p>This is where distribution layers play an important role.</p><p>The P2P.org Stablecoin Earn Widget is one example of this model in practice. It is live on the P2P.org frontend today, where users can access Steakhouse-curated Morpho vaults directly. The same product layer is also designed to be embedded by partners, enabling broader distribution across platforms.</p><h2 id="morpho-as-a-foundation-for-onchain-credit"><strong>Morpho as a foundation for onchain credit</strong></h2><p>Morpho is designed as a core DeFi primitive. Its architecture focuses on capital efficiency and modularity, making it well-suited as the infrastructure for lending and credit strategies that need to scale.</p><p>Rather than operating as a consumer-facing product, Morpho is intentionally built to serve as infrastructure. This allows strategy managers and platforms to compose on top of it, while benefiting from its underlying design.</p><p>In the context of the Stablecoin Earn Widget, Morpho provides the universal lending network that enables these strategies to function. Its role remains consistent: power credit markets at the protocol level, while higher layers focus on strategy design and distribution.</p><h2 id="turning-infrastructure-into-a-product-experience"><strong>Turning infrastructure into a product experience</strong></h2><p>The Stablecoin Earn Widget sits above the protocol layer. Its purpose is not to replace or abstract away the value of infrastructure, but to make it accessible through a controlled product interface.</p><p>Through this structure:</p><ul><li>End users engage with a simple earn experience</li><li>Platforms integrate a single component</li><li>Protocol complexity remains at the infrastructure layer</li></ul><p>This separation allows Morpho to remain focused on its core mission, while strategies and distribution are handled by specialized counterparts.</p><p><strong>Access and Distribution</strong></p><p>In addition to being embeddable by partners, the<a href="https://widget.p2p.org/select?ref=p2p.org"><u> Stablecoin Earn Widget</u></a> is also accessible directly through the P2P.org frontend.</p><p>This allows users to access Steakhouse-curated strategies on Morpho directly via P2P.org, while partners can integrate the same product layer into their own platforms.</p><p>This dual distribution model — direct access via P2P.org and embedded distribution via partners — highlights how protocol infrastructure, strategy curation, and product delivery can scale together.</p><figure class="kg-card kg-image-card"><img src="https://p2p.org/economy/content/images/2026/03/data-src-image-fb2f9ce0-167f-4bb9-9111-661c193b2b29.png" class="kg-image" alt="" loading="lazy" width="1042" height="1508" srcset="https://p2p.org/economy/content/images/size/w600/2026/03/data-src-image-fb2f9ce0-167f-4bb9-9111-661c193b2b29.png 600w, https://p2p.org/economy/content/images/size/w1000/2026/03/data-src-image-fb2f9ce0-167f-4bb9-9111-661c193b2b29.png 1000w, https://p2p.org/economy/content/images/2026/03/data-src-image-fb2f9ce0-167f-4bb9-9111-661c193b2b29.png 1042w" sizes="(min-width: 720px) 720px"></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://p2p.org/economy/content/images/2026/03/data-src-image-58a80d0b-d3de-47da-86db-6520f01f0d8b.png" class="kg-image" alt="" loading="lazy" width="914" height="476" srcset="https://p2p.org/economy/content/images/size/w600/2026/03/data-src-image-58a80d0b-d3de-47da-86db-6520f01f0d8b.png 600w, https://p2p.org/economy/content/images/2026/03/data-src-image-58a80d0b-d3de-47da-86db-6520f01f0d8b.png 914w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Note: NRR values shown are illustrative examples for demonstration purposes only.</span></figcaption></figure><p><br><strong>The role of curation</strong></p><p>Between infrastructure and distribution sits curation.</p><p>The strategies available through the widget are curated by Steakhouse, which designs and maintains vaults built on Morpho. Steakhouse applies a structured approach to strategy construction, ensuring that protocol primitives are assembled into coherent, professional-grade products.</p><p>Each layer in the stack has a clear responsibility:</p><ul><li>Morpho provides the lending mechanics</li><li>Steakhouse curates and manages strategies</li><li>P2P.org delivers the distribution layer and interface</li></ul><p>This clarity makes it easier for platforms to offer stablecoin earn functionality without taking on roles outside their core focus.</p><h2 id="distribution-as-an-enabler"><strong>Distribution as an enabler</strong></h2><p>Capital today increasingly sits inside wallets, fintech applications, custodial platforms, and treasury systems. Distribution layers allow protocols like Morpho to reach these environments without operating user-facing products themselves.</p><p>By embedding the Stablecoin Earn Widget, platforms can surface Morpho-based strategies within products that users already trust and use. For Morpho, this expands reach through partners. For platforms, it provides a practical way to offer earn functionality backed by established infrastructure.</p><h2 id="built-on-infrastructure-designed-to-scale"><strong>Built on infrastructure designed to scale</strong></h2><p>The Stablecoin Earn Widget is supported by P2P.org infrastructure securing over $10B across more than 40 networks. This operational foundation supports the reliable delivery of strategies built on Morpho and curated by Steakhouse.</p><p>Importantly, this model does not alter how Morpho functions. It preserves the protocol’s role as infrastructure, while improving how strategies built on it are accessed and distributed.</p><h2 id="a-shared-direction"><strong>A shared direction</strong></h2><p>This collaboration reflects a broader evolution in DeFi:</p><ul><li>Protocols specialize in primitives</li><li>Strategy managers specialize in construction and oversight</li><li>Distribution layers specialize in product delivery</li></ul><p>The Stablecoin Earn Widget illustrates how these roles can work together in production today, with Morpho providing the underlying credit infrastructure.</p><p>As on-chain credit continues to grow, this separation of responsibilities creates clearer paths for adoption across platforms and users.</p><h2 id="integrating-the-stablecoin-earn-widget"><strong>Integrating the Stablecoin Earn Widget</strong></h2><p>For platforms exploring stablecoin earn functionality, the Stablecoin Earn Widget is designed to integrate directly into existing products.</p><p>It allows teams to offer access to curated strategies without managing protocol integrations or strategy design internally. Platforms interested in exploring integration can reach out to the P2P.org team to discuss fit and timelines.</p><p>Book a 20-minute discovery call <a href="https://link.p2p.org/3325c6?ref=p2p.org" rel="noreferrer">here</a>. </p><p>Learn more about the Widget in <a href="https://docs.widget.p2p.org/ ?ref=p2p.org" rel="noreferrer">our docs.</a></p>
from p2p validator