Restaking in presents unique opportunities and challenges. This article explores the risks involved in restaking, such as smart contract vulnerabilities, operator issues, and protocol flaws, and offers practical strategies to mitigate these risks. Whether you're an experienced investor or a newcomer, this guide provides essential insights for secure and profitable restaking. Equip yourself with the knowledge needed to navigate this complex landscape confidently.
In April, EigenLayer restaking entered Stage 3 on the mainnet with an assortment of Actively Validated Services (AVS) becoming live and ready to be delegated. This marked the beginning of active restaking portfolio construction & management and refreshed the importance of restaking risk evaluation.
We at P2P.org take risk considerations carefully and are delighted to share our thoughts. This blog post aims to inform restakers of risks and risk mitigation measures. We will outline:
We exclude LRTs and risks specific to liquid restaking. However, a reader can use the provided information to explore the risks of underlying LRT restaking portfolios.
We assume that a reader has an essential awareness of Ethereum, delegated proof of stake (DPoS) staking, and Eigenlayer restaking. For those who are not sure about that, we recommend checking out these resources:
In classic DPoS (Delegated Proof of Stake), a token holder who wants to stake chooses a staking service provider (SSP) who will operate nodes and perform protocol duties on the staker's behalf for some fee. This form of staker-SSP relationship is called a delegation. Delegations provide economic security to the protocol, require locking the funds, and are incentivized by reward earnings. A delegator is supposed to do their research on validators and decide who is the best in terms of yield & credibility.
Conceptually, the restaking process is similar to mere staking but introduces an additional layer of complexity. In addition to choosing an Operator, a delegator must now consider a set of protocols (AVSs).
We assume a case when a delegator has already settled with Ethereum - they run nodes themselves or stake via Ethereum staking service provider (SSP) or liquid staking protocol (LSP) and has yet to opt in restaking offered by Eigenlayer.
In Eigenlayer, a delegator (also referred to as a restaker) must choose a Strategy. The Strategy comprises an Operator and the set of AVSs supported by this Operator.
Operators are obliged to perform duties prescribed by AVS protocols. If they don't, they might be penalized, and the penalty is usually either slashing (burning a fraction of a stake) or jailing (de-registering, banning from operations).
Slashing events may occur due to Operator misbehavior, failure, or protocol flaws, which are sometimes induced by specific market conditions (e.g., high load due to market volatility) and massive technical collapses. Even though slashing is not currently enabled in Eigenlayer, it eventually will be, and it's about the right time to start thinking about it if you didn't before.
Since a restaking choice is narrowed down to choosing a single Operator (per the same capital), the choice of the Operator is critical, as in case of severe operator-related issues, there is a chance of being penalized on all AVS simultaneously—risks become correlated to some extent. The infrastructure automation, monitoring, and support of AVSs will likely be handled by dedicated DevOps engineers, who may share a common architecture and resources.
For example, the whole cluster of different AVS nodes may go down because they were hosted on the same cloud provider, which went offline in disaster cases.
Besides slashing risks, one could also think of Eigenlayer smart contract risks and operational risks.
All these risks can be loosely classified by fundamental sources:
Let’s look into these categories in the next section.
EigenLayer consists of a complex set of smart contracts. Here are the most important ones:
Although we won't delve into their details in this chapter (how they function is well described in this article), it still merits mentioning mechanics related to slashing and draining risks.
EigenLayer restakes shares, not the underlying assets (ETH, LSTs) directly. Shares only exist in EigenLayer contracts for accounting and are subject to slashing. They are not tokens and are not transferrable. That highlights the possible foundation for developing slashing cancelation mechanisms. In the previous version of Eigenlayer, the slashing of real assets could happen via asset locks during the withdrawal process.
The most significant risk in EigenLayer in the existing version (and potentially in the following versions) is the upgrade governance. Nine out of 13 community EOAs (P2P.org is one of the signers) can ruin the system if they coordinate or get hacked. Any malware code can be pushed to the mainnet smart contracts and drain the funds through them.
We will continue tracking the development and determine if additional jeopardizing features appear with new version releases.
Under hardware, we understand the physical properties of infrastructure—location, CPU, bandwidth, power stability, etc. Operators can use various cloud providers and configure nodes that don't fully meet the requirements or face capacity problems over time. It won’t be clear until the protocol issues a penalty, and then it might be too late for a delegator as they lose funds.
Hardware issues usually lead to higher downtime risks (meaning losing rewards), but sometimes also to slashing.
As an abstract example, bad connectivity may lead to delays in the perceived state of the network; therefore, a node will attest to wrong data that does not fit the consensus.
Software may include nodes’ clients, various plugins, and automatization and management solutions deployed by an Operator. Software problems can come from AVS developers and an Operator; sometimes, the node client might come from external developers, and an Operator may choose to use it. Bad, unaudited code and the absence of timely client updates may cause unexpected operational behavior and lead to downtime and slashing.
Technical issues related to hardware and software are not perfectly independent. Problems with one may reveal issues with another.
Consider an Operator who runs two nodes. The second one is a backup node in case the first one goes down. It is managed automatically. Imagine if the system wrongly decides that there’s a need to turn on the secondary node while the main one operates, maybe because of losing the connection to the primary node or for other reasons. This will then lead to double signing and, hence, slashing.
In this example, a minor hardware (connectivity) problem highlighted suboptimal software configuration, which resulted in a catastrophe. Thus, it is also reasonable to evaluate hardware and software as a whole system from the design perspective.
Poor security procedures, such as weak passwords, access management, and key management, put node operations at risk. This won’t necessarily lead to the total loss of the delegation funds unless the delegation is made in a custodial way. Still, it may expose a protocol to dishonesty/griefing attack vectors, resulting in slashing.
Generally, dishonesty is driven by two major factors: profit extraction and griefing. Dishonesty is intentional. For this to happen, there should be a condition satisfied:
Value from the attack > Cost of the attack
The cost of the attack can be decomposed into a) financial cost and b) reputation cost.
Reputation cost is hard to denote in exact numbers but easy to grasp. If an Operator is caught doing dishonest actions, eventually, they will lose credibility and, consequently, delegations and future earnings. AVS operations do not limit the reputation damage and will spread across all Operator businesses. One can roughly say that reputation cost is the net present value of all future profits that an Operator can earn. The higher the TVL (as a proxy of profit), the higher the chance that the Operator will be honest. It merits mentioning that it is not essential that Operators are the only participants in the attack. They can be just members of the attack group and, in the end, bribed (or even hacked) by another party.
Financial costs will vary across AVSs depending on the protocol design. An abstract example would be network congestion or spamming to disable other Operators to take over a protocol for a short period. This may include fees, infrastructure, bribes to other Operators, etc. To determine the cost, one should inspect all possible attack vectors on AVSs, which is sometimes difficult.
The value from the attack will also depend on the AVS type and ecosystem around it — value locked, trading activity, etc.
Protocol logic resembles the set of rules, policies, and processes that govern the operations and, in particular, ensure that Operators are properly incentivized to perform duties well. Rules include consensus, slashing conditions, reward schemes, etc. Improper protocol logic design may cause unintended violations of slashing conditions.
Imagine an oracle that delivers an aggregated exchange rate for some asset pair. Let it be a median price. Oracles gather data from external providers like Coingecko or CMC, each has their own version of truth.
Let this oracle protocol pursue accuracy of the data, it should be gathered timely. So if some Operator posts the price that diverges from the resulting median too much, then they get slashed. For example, this might happen when an operator is lagging and delivers an “old price”, which is inaccurate, or the Operator might want to influence the result value to attack DeFi protocols. These are Operator side issues that should be disincentivized.
But what if there’s a problem with the external source? The Operator performs their duties well but gets slashed anyway because their truth source differs from others. This is exactly the case of bad protocol rules’ design. No bad intention, no bad performance, still slashed.
The example above may generally be applied to occasions when slashing cannot be organized purely based on on-chain data. However, such slashing conditions can be potentially mediated through $EIGEN token staking. Learn more in our blog post.
There is a chance of AVS having code flaws, which may then expose it to security vulnerabilities and operations breaks. The consequences can vary depending on the attack goal, making operators attest to malicious state transition (i.e., enabling double spending), Oracle price misreporting, etc.
Even if everything is good with Operators and AVS, the infrastructure landscape itself can still present slashing risks. For instance, imagine something like the supermajority of Geth clients in Ethereum*. This particular case is a protocol-level risk, but it comes from the existing infrastructure landscape and sometimes can be managed by an Operator.
Depending on the protocol design, sometimes large stake centralization poses risks for the whole network. If operators possessing large amounts of stake go offline or experience bugs, they can affect the whole network and cause mass slashing events. The probability of such a risk is higher when some Operator has a critical amount of delegations requiring just this Operator to fail to initiate the issue.
LRTs appeared to be an important market player and have attracted large amounts of ETH since the launch of Eigenlayer. Some AVSs softly deal with them to ensure the initial amounts of security delivered. At the same time, the limit on LST restaking has been removed recently; therefore, an additional inflow of LST restaking can be expected.
Therefore, there can be situations when liquid restaking and staking protocols provide most of the AVS stake.
In normal market conditions, it doesn't pose any significant risk, but in the case of LRT and LST depegging, the security of AVS might evaporate, exposing it to attacks and instability.
Security provisions are supposed to be rewarded, and restaking is no exception. There will be a large variety of AVSs; some may pay in the native tokens, some may pay out in tokens of integrated protocols (i.e., roll-ups), and tokens can even be issued in the non-Ethereum ecosystem (i.e., in Ethos). Once a restaker is rewarded, they must decide what to do with rewards - sell or stake again, if AVS accepts this token for staking, or swap to ETH and (re)stake ETH (or LST). Additional actions can be taken to accomplish that, such as reward withdrawal, bridging, swapping, etc. Apparently, restaking on multiple (imagine 10+ or even 20+) AVS will result in a resource-consuming reward management process.
From a practical perspective, restakers can encounter the following:
In the most basic cases, rewards are paid in ETH and occur at predefined Ethereum addresses. There is no need to make any withdrawals or trade tokens. It's almost the same as Ethereum staking itself.
In a complicated dual staking case, rewards are paid in the AVS token on the external blockchain. AVS has a dual staking model, and rewards should be claimed. Then, they might be compounded or sold, bridged, and dispersed across different trading venues.
There can be so many actions and various data to track that the number of points of failure and reporting nuances is pretty high. Compared to mere ETH staking, restaking requires additional time and resources in rewards management; otherwise, stakers may miss rewards, not meet tax liabilities, and fail to realize the yield.
Regarding reward management procedures, restakers should consider market conditions for reward tokens. In particular, it is important to track the available liquidity on trading venues and choose an optimal execution strategy to preserve yield.
Eigenlayer restaking increases the duration of ETH withdrawals as there’s the time of undbonding from AVSs. Therefore, additional opportunity costs can arise due to the inability to move ETH.
Currently, Eigenlayer unbonding period equals 7 days, but the period can change in the future.
A delegator should check whether the AVS and owning the AVS token or even restaking itself doesn’t violate legislation of the country of their residence.
Mass slashing events caused by improper protocol functioning theoretically do not harm a restaker. Eigenlayer has a special committee that is expected to revert the consequences. Also, the protocols are examined and audited for such possibilities during the onboarding procedures. Therefore, without regulatory complications, a protocol risk is expected to be minimized to reward handling.
Nevertheless, it’s better to be aware of all kinds of scenarios, even if they can be managed post-factum. The odds are small, but can something go wrong? Keep that in mind while constructing a portfolio and checking for risks we outlined previously.
To minimize Operator risk (which seems to be the largest source of risks so far), delegating to Operators with a solid track record and large TVL, public recognition, or personal assurance is important. Before choosing between different Operators, it is worth building a checklist highlighting TVL in other networks, acknowledgment from Eigenlayer and AVSs’ foundations, availability of SOC certificates, and previous cases of dishonest & unprofessional behavior that led to the loss of funds.
As we saw above, the variety of yield extraction paths is huge, so a delegator should carefully examine it and construct business/monitoring/reporting processes themselves or outsource it to a specialized third party. Doing it properly will help maximize yield and avoid unnecessary tax and legal pressure. Data services become crucial in this regard.
Besides helping operational functions, data services can be applied to operator and protocol risk evaluation. The qualitative approach determines the surface of possible slashing risks but cannot tell the probabilities of outcomes.
Practically, almost always, there will be no available data or method to predict slashing risks with verifiable accuracy. Most slashing events have an extremely low probability, making it almost impossible to figure out the exact exposure. Historically, there have been few slashing events in matured networks, all having diverse origins.
Nevertheless, we still want to have something that might indicate the issue.
Generally, we expect gathering data about AVS operators’ performance to be possible. It can still be used to rank Operators and spot signs of infrastructure disturbances, which then can be used as a proxy for downtimes & slashing risks. For example, if an Operator frequently (and recently) experiences spikes in attestation miss rates in some abstract protocol, they may face harsher problems in the future unless the problem is fixed. These algorithms and models based on performance data are yet to be developed, and their sensitivity must be fine-tuned.
About Lambda
Historically, P2P.org extensively uses data services for internal needs (i.e., business analysis & planning) and external reporting (clients & research). Now, we aim to build a new data product to cover new data domains introduced by restaking.
Lambda is a data product from P2P.org that originally stems from the staking data API for P2P clients. Lambda will offer pre-built real-time API endpoints for EigenLayer ecosystem builders, including:
- Operator performance metrics to monitor duties and slashing events for Beacon Chain, AVS, and Cosmos chains.
- Rewards and APRs to monitor profits from direct staking for each pair delegator-operator. It also includes rewards per re-staked ETH to measure the profit of re-staking.
- DeFi (DEX, Lend-borrow) reserves to manage liquidity for LRT.
The platform will also provide a customization engine for real-time APIs, allowing builders to integrate new endpoints without additional latency or loss in data quality. The Lambda team works with several AVS projects to explore integration methods.
Stay tuned for updates!
In this blog post, we discussed risks that restakers might face when they choose the strategy and shared high-level recommendations around risk mitigation. There are still many open questions: slashing conditions and amounts are not stated for most of the AVSs, and Eigenlayer slashing logic has not been released yet. The restaking market is young, and protocols are not battle-tested. No slashing phase will give some time to work through unknowns.
P2P.org aims to actively contribute to risk evaluation discussion and continue working on risk assessment methodologies from qualitative and quantitative perspectives. As an operator in Ethereum and AVSs, we aim to navigate our clients and partners in the Eigenlayer ecosystem.
P2P Validator is a world-leading non-custodial staking provider, securing over $7 billion from over 10,000 delegators/nominators across 40+ high-class networks.
Do not hesitate to ask questions in our Telegram chat or contact our team directly on X or LinkedIn. We are always open to communication.
Web: https://p2p.org
Twitter: @p2pvalidator
Telegram: https://t.me/P2Pstaking
<p></p><p><strong>Introduction</strong></p><p>Today (4th July 2024) marks a significant milestone for Web3 as <a href="https://twitter.com/lagrangedev?ref=p2p.org" rel="noreferrer">Lagrange</a> Labs launches its Prover Network on the <a href="https://twitter.com/eigenlayer?ref=p2p.org" rel="noreferrer">EigenLayer</a> mainnet.<br><br>At P2P.org, <strong>we are thrilled to participate in this development, collaborating with top-tier institutional operators to bring the first decentralized zero-knowledge (ZK) prover network into production.</strong> <br><br>This launch represents a transformative step forward in adopting and implementing ZK technology, which promises to revolutionize how we approach scalability, privacy, and security in the blockchain space.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">Watch the video! Well-explained what the Zk (zero knowledge) technology is. 👌<br><br>We’re betting strongly on ZK proofs. Stay tuned to the upcoming launches of ZK networks.<br><br>Do you want to know what’s launching next?<br><br>⏩ Subscribe to the newsletter: <a href="https://t.co/QRWqmu2Rku?ref=p2p.org">https://t.co/QRWqmu2Rku</a> <a href="https://t.co/YhzTDULlzE?ref=p2p.org">https://t.co/YhzTDULlzE</a></p>— P2P.org (@P2Pvalidator) <a href="https://twitter.com/P2Pvalidator/status/1773629855860466007?ref_src=twsrc%5Etfw&ref=p2p.org">March 29, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p><br><br><strong>Our Role and Commitment</strong></p><p>As an operator within Lagrange's Prover Network, P2P.org is committed to contributing our expertise and infrastructure to ensure the network's success.<br><br>We are honored to join forces with esteemed partners such as Coinbase, Kraken's Staked, OKX, Ankr, Nethermind, and many more. Our collaboration underscores the collective effort to bring ZK technology to the forefront of the blockchain industry.</p><p>We have always been dedicated to supporting innovative technologies and enhancing the performance and reliability of decentralized networks. The launch of Lagrange's Prover Network aligns perfectly with our mission to advance blockchain technology and foster a more secure, scalable, and decentralized future.</p><p><strong>Lagrange's Prover Network 101</strong></p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Lagrange’s Prover Network is the first production-ready decentralized ZK prover network designed to deliver high-liveness guarantees and cost-effective solutions </strong></b>for users and provers alike. </div></div><p></p><p>By leveraging EigenLayer's low-cost-of-capital environment and restaked ETH, the network ensures that users pay less for high availability while operators are incentivized to maintain optimal performance.</p><p>The Prover Network also introduces a novel architecture that enables a hyper-parallel ZK coprocessor. This allows <strong>developers to execute intensive off-chain computations and bring the results back on-chain with verifiable ZK proofs.</strong> This innovative approach significantly enhances the scalability and efficiency of ZK proofs, making them more accessible to developers and applications.<br><br>If you'd like to know more detailed information on Lagrange's ZK Prover, please read <a href="https://www.lagrange.dev/blog/lagrange-deploys-first-production-ready-zk-prover-network-powered-by-coinbase-kraken-and-okx?ref=p2p.org" rel="noreferrer">Lagrange's blog</a>.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.lagrange.dev/blog/lagrange-deploys-first-production-ready-zk-prover-network-powered-by-coinbase-kraken-and-okx?ref=p2p.org"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Lagrange: Lagrange Deploys First Production-Ready ZK Prover Network Powered by Coinbase, Kraken and OKX</div><div class="kg-bookmark-description"></div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://cdn.prod.website-files.com/6626eae60883543ea2814ed0/663aa051201b1281c91efeff_32.png" alt></div></div><div class="kg-bookmark-thumbnail"><img src="https://cdn.prod.website-files.com/6626eae60883543ea2814ed0/6628fa04f7855cecec18d64e_R.webp" alt></div></a></figure><p></p><p><strong>Our Continued Support for Lagrange</strong></p><p>In our previous blog post, <a href="https://p2p.org/economy/know-your-avs/" rel="noreferrer">Know Your AVS</a>, we highlighted the potential of advanced verification systems and our enthusiasm for partnering with trailblazers like Lagrange. Today, as we celebrate the launch of their Prover Network, we reaffirm our commitment to supporting Lagrange's vision and contributing to the broader adoption of ZK technology.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://p2p.org/economy/know-your-avs/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Know Your AVS!</div><div class="kg-bookmark-description">Restaking with P2P.org: Know Your AVS The latest development in the EigenLayer protocol has culminated with the launch of the EigenLayer Stage 2 mainnet. This phase marks the introduction of Operators, who assume responsibility for performing validation tasks for Actively Validated Services (AVS) built on the EigenLayer protocol. This</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://p2p.org/economy/content/images/2020/09/favicon.ico" alt><span class="kg-bookmark-author">P2P.org Blog: Insights, Guides, and News</span><span class="kg-bookmark-publisher">Kamil Jakub Natil</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://p2p.org/economy/content/images/2024/04/Know-Your-AVS.jpg" alt></div></a></figure><p></p><p><strong>Looking Ahead</strong></p><p>The launch of Lagrange's Prover Network on EigenLayer is just the beginning. P2P.org will continue to play an active role in the network, helping to scale its operations and ensure its robustness. We are excited about the opportunities for this collaboration and look forward to further innovations that will emerge from the Prover Network.</p><p>To stay updated on our progress and the latest developments within the Lagrange Prover Network, follow us on <a href="https://twitter.com/P2Pvalidator?ref=p2p.org" rel="noreferrer">social media</a> and <a href="https://t.me/P2Pstaking?ref=p2p.org" rel="noreferrer">join our community discussions</a>. Together, we can drive the future of decentralized technology and unlock the full potential of zero-knowledge proofs.</p><p><strong>Conclusion</strong></p><p>The successful deployment of Lagrange's Prover Network marks a pivotal moment in the evolution of blockchain technology. At P2P.org, we are proud to be part of this historic launch and work alongside industry leaders to mainstream ZK technology. It's our commitment to advance the decentralized ecosystem and build a more secure, scalable, and efficient blockchain infrastructure for all.</p><h2 id="contact-us">Contact Us:</h2><p><em>Do not hesitate to ask questions in our </em><a href="https://t.me/P2Pstaking?ref=p2p.org"><em>Telegram chat</em></a><em> <br>We are always open for communication.</em><br><br>We encourage you to check our website and start our staking journey together!</p><div class="kg-card kg-button-card kg-align-center"><a href="https://p2p.org/ethereum?ref=p2p.org" class="kg-btn kg-btn-accent">Stake with us!</a></div><hr><p><strong>Web:</strong> <a href="https://p2p.org/?ref=p2p.org">https://p2p.org</a><br><strong>Blog:</strong> <a href="https://p2p.org/economy/">https://p2p.org/economy</a><br><strong>Twitter:</strong> <a href="https://twitter.com/p2pvalidator?ref=p2p.org">@p2pvalidator</a><br><strong>Telegram:</strong> <a href="https://t.me/P2Pstaking?ref=p2p.org">https://t.me/P2Pstaking</a></p><h1 id="about-p2p-validator"><br><strong>About P2P Validator</strong></h1><p><a href="https://p2p.org/?ref=p2p.org">P2P Validator</a> is a world-leading non-custodial staking provider, securing over $7 billion from over 10,000 delegators/nominators across 40+ high-class networks.</p><p>Do not hesitate to ask questions in our <a href="https://t.me/P2Pstaking?ref=p2p.org">Telegram</a> chat or contact our team directly on X or LinkedIn. We are always open to communication.</p>
from p2p validator
<h3 id></h3><p>As one of the leading staking providers in the market, we frequently receive feedback from our clients about the need for a more comprehensive staking portfolio dashboard. They expressed the necessity for a tool that effectively tracks and monitors their staking metrics. That’s why we are excited to announce the launch of the Ethereum Staking Dashboard, a tool crafted to enhance how you track and analyse your Ethereum staking.</p><p>This innovative dashboard is designed to provide users with a detailed view of crucial staking metrics for the entire portfolio, demonstrating P2P’s commitment to advancing blockchain technology through strategic innovation.</p><p>Our team has worked hard to create a product that not only offers an exceptional user experience but also provides a broad set of features tailored for Ethereum stakers. <br><br></p><p><strong>Uncover the benefits that make our dashboard exceptional:</strong></p><ol><li>Support of Any Delegator Address:<ul><li>Ability to track data for the entire Ethereum community.</li></ul></li><li>Support of Multiple Addresses:<ul><li>Ability to create your personal account and track several deposit addresses</li></ul></li><li>Detailed Rewards Data:<ul><li>Fetch detailed rewards data for the tax office or any other purposes.</li></ul></li><li>Ability to View Public Staking Data:<ul><li>View and share public staking data for any address.</li></ul></li><li>Track All Figures in Tokens and USD:<ul><li>Monitor your staking figures in both tokens and USD for better financial oversight.</li></ul></li><li>Daily Rewards Statistics by Different Reward Types:<ul><li>Access detailed daily rewards statistics, categorised by reward types.</li></ul></li><li>Comprehensive Performance Metrics:<ul><li>Compare your portfolio's performance against the network with key metrics such as extracted rewards, participation rate, attestation correctness, missed blocks, % of MEV blocks, and others.</li></ul></li><li>Detailed MEV Rewards Statistics:<ul><li>Gain insights into detailed MEV rewards data.</li></ul></li><li>Detailed Lifetime Data for Any Validator:<ul><li>Track the performance history and detailed lifetime data for any validator.</li></ul></li></ol><p><strong>Ethereum Staking Dashboard: Open Insights for All</strong></p><p>Ethereum Staking Portfolio Dashboard is open to all, providing comprehensive staking insights in a user-friendly manner. </p><p><strong>Try it yourself: </strong><a href="https://app.p2p.org/dashboard?ref=p2p.org"><u>https://app.p2p.org/dashboard</u></a></p><p></p><p><strong>The Future of Staking Analytics: Expanding Horizons</strong></p><p>We're committed to expanding our platform to include data from a diverse range of cutting-edge blockchain networks, ensuring that our users have access to the most comprehensive and up-to-date staking insights. In the coming months, keep an eye out for the integration of data from EigenLayer, Solana, Polkadot, and Cosmos Hub.</p><p></p><p><strong>Unleash the Potential of Staking Data with Staking Data API</strong><br><br></p><p>Ready to take your staking applications and research to the next level? With our Staking Data API, you can fetch all of the staking data from a wide range of leading networks, including Ethereum, Polkadot, Solana, Cosmos Hub, Polygon, Sui, Kusama, Vara, and Moonbeam. </p><p>Visit our <a href="https://p2p.org/products/staking-data-api?ref=p2p.org"><u>Staking Data API</u></a> to explore the endless possibilities and unlock the full potential of staking data.</p>
from p2p validator