
Essence
Adversarial liquidations represent the systemic failure point where a protocol’s solvency mechanism becomes a profit-driven race condition among external agents. The core function of a liquidation engine in decentralized finance is to maintain the health of a lending or derivatives protocol by closing undercollateralized positions. When a borrower’s collateral value falls below a predetermined threshold, the protocol allows external actors ⎊ liquidators ⎊ to repay the debt and seize the collateral at a discount.
The “adversarial” element arises from the fact that these liquidators are not benevolent actors; they are profit-maximizing entities competing against each other to claim the available premium. This competition, especially in high-volatility environments, transforms a necessary risk management process into a source of market instability and arbitrage.
Adversarial liquidations occur when profit-maximizing liquidators compete to seize undercollateralized collateral, turning a necessary risk management function into a source of market instability.
The system relies on liquidators to maintain solvency, yet their strategic behavior introduces new risks. The competition for liquidation opportunities often leads to front-running, where liquidators bid up gas prices to ensure their transaction is processed first. This behavior exacerbates market slippage for the underlying asset, creating a negative feedback loop where a small price drop triggers liquidations, which in turn causes more price drops, leading to a liquidation cascade.
The result is a system where a protocol’s design choices directly create an adversarial game, forcing users to compete against automated bots for survival during periods of stress.

Origin
The concept of liquidations in traditional finance is straightforward, typically managed by a broker or exchange, often with less transparency regarding the precise timing and execution logic. The origin of adversarial liquidations in crypto, however, is deeply rooted in the core design principles of decentralized protocols. Early decentralized lending platforms, like MakerDAO and Compound, introduced a novel mechanism where liquidations were permissionless.
Unlike traditional systems, anyone could participate in the liquidation process by submitting a transaction on-chain. This open access was initially seen as a feature, ensuring that liquidations would always occur efficiently because a profit incentive would attract enough participants to keep the system solvent.
The adversarial nature emerged rapidly as market participants recognized the opportunity for automated arbitrage. The public nature of blockchain transactions, where pending transactions sit in a memory pool (mempool) before being confirmed, created a race condition. Liquidators developed automated bots to scan the mempool for pending liquidation transactions and then submit their own transaction with a higher gas fee to front-run the original liquidator.
This practice, a form of Maximal Extractable Value (MEV), quickly evolved from simple front-running to sophisticated strategies where liquidators use flash loans to fund the liquidation without needing upfront capital, significantly increasing the scale and speed of these operations. The transition from human-driven liquidations to automated bot liquidations marks the point where the system became truly adversarial.

Theory
The theoretical framework for adversarial liquidations draws heavily from game theory and market microstructure analysis. The core mechanism is a multi-player game where borrowers, liquidators, and validators (or sequencers in a roll-up) interact. The primary source of the adversarial dynamic is the liquidation bonus ⎊ the discount offered to the liquidator for successfully closing the position.
This bonus creates a strong incentive for liquidators to compete aggressively, especially when a large position is nearing liquidation.
The theoretical challenge lies in designing a system where liquidations occur efficiently without creating excessive negative externalities. The competition among liquidators leads to a liquidation price cascade, where the market price of the collateral asset drops rapidly due to forced selling. This drop triggers further liquidations, creating a feedback loop that exacerbates market volatility.
The core game theory problem is one of coordination: liquidators are incentivized to act selfishly, even though a coordinated, slower liquidation process would be better for overall market stability.

Oracle Latency and Price Feed Risk
A critical technical component of adversarial liquidations is the oracle price feed. The liquidation trigger relies on the oracle to report the current market price of the collateral asset. If the oracle updates slowly, or if a liquidator can manipulate the price feed, it creates a significant window for exploitation.
This latency risk is particularly pronounced in decentralized exchanges where liquidators can exploit the time delay between a price change on an external exchange and the oracle’s update to the protocol. This exploitation, often executed via flash loans, allows a liquidator to manipulate the price on a DEX, trigger a liquidation on a lending protocol, and profit from the price difference, all within a single transaction block.
The following table illustrates the strategic considerations for a liquidator based on different protocol designs and market conditions:
| Factor | Protocol Design Consideration | Liquidator Strategy Implications |
|---|---|---|
| Oracle Latency | Frequency of price updates (e.g. every block vs. every hour) | High latency creates larger arbitrage windows for front-running. |
| Liquidation Bonus (%) | The percentage discount offered to the liquidator. | Higher bonuses incentivize more aggressive competition and higher gas bids. |
| Slippage Tolerance | Protocol’s acceptance of price changes during liquidation execution. | Lower tolerance protects borrowers but can cause liquidations to fail during high volatility. |
| Transaction Fees (Gas) | Cost to execute the liquidation transaction. | High fees reduce the liquidator’s profit margin, potentially leading to failed liquidations. |

Approach
Current approaches to adversarial liquidations involve a complex interplay between automated liquidator bots and protocol-level defenses. The typical liquidator bot operates by constantly monitoring the state of a lending protocol, specifically tracking the collateralization ratio of every position. When a position approaches the liquidation threshold, the bot calculates the potential profit, accounting for the liquidation bonus and current gas prices.
The bot then initiates a transaction to repay the loan and seize the collateral.
To maximize efficiency and profit, liquidators employ advanced strategies that leverage the architecture of decentralized exchanges. The most common approach involves a flash loan-funded liquidation. A liquidator borrows a large amount of capital (a flash loan) without collateral from a DEX, uses that capital to repay the borrower’s debt on the lending protocol, claims the collateral, sells the collateral on the open market, and repays the flash loan, all within a single atomic transaction.
This method eliminates the need for the liquidator to hold significant capital, democratizing the liquidation process but also intensifying the competition and potential for systemic risk.

Protocol Defenses against Adversarial Behavior
Protocols have developed several defenses to mitigate the negative externalities of adversarial liquidations. The goal is to reduce the profit motive for front-running and improve overall market stability. One approach involves implementing a Dutch auction mechanism for liquidations.
Instead of a fixed liquidation bonus, the bonus starts high and decreases over time. Liquidators are incentivized to wait for a lower bonus, reducing the gas war and providing a more stable liquidation process.
Another approach involves soft liquidations, where the protocol takes over the management of the undercollateralized position. Instead of selling all the collateral at once, the protocol slowly sells small portions of the collateral over time to maintain the collateralization ratio, thereby reducing slippage and mitigating the impact on the market. This approach effectively removes the adversarial liquidator from the equation by internalizing the liquidation process within the protocol itself.

Evolution
The evolution of adversarial liquidations tracks closely with the development of MEV extraction techniques. In the early days of DeFi, liquidations were relatively simple transactions, often won by the liquidator with the highest gas bid. As protocols matured, liquidators began to form specialized groups and even “liquidation cartels” to coordinate their efforts.
These cartels share information about pending liquidations and strategically bid on transactions to maximize collective profit, often bypassing standard mempool competition by directly communicating with block proposers or sequencers.
This evolution led to the rise of MEV-aware liquidators, which utilize sophisticated algorithms to analyze market conditions and predict potential liquidations before they occur. These algorithms calculate the optimal time to execute a liquidation, taking into account expected gas prices, slippage, and potential competition from other liquidators. The competition has become so intense that a significant portion of a protocol’s revenue is now generated from liquidations, making the system dependent on this adversarial behavior.
The shift from simple bots to sophisticated MEV strategies and liquidation cartels demonstrates the professionalization of adversarial liquidations.
The introduction of Layer 2 solutions and rollups has added another layer of complexity. While Layer 2s offer lower transaction fees, which can reduce the cost of liquidations, they also introduce new forms of MEV. Liquidations on rollups often depend on the specific sequencer mechanism, which can be centralized or decentralized.
A centralized sequencer can be exploited by liquidators to guarantee transaction inclusion, creating a different type of adversarial environment where the sequencer and liquidator may collude to maximize profit. This shift means that the adversarial nature of liquidations is no longer confined to the L1 mempool but extends to the specific architecture of the Layer 2 solution itself.

Horizon
Looking forward, the future of adversarial liquidations points toward two distinct trajectories. The first trajectory involves a continued arms race between liquidators and protocols. Protocols will continue to refine mechanisms like Dutch auctions and soft liquidations to mitigate the negative effects of adversarial behavior.
Liquidators, in turn, will develop more sophisticated MEV strategies to exploit any remaining inefficiencies in these new mechanisms. This trajectory suggests a continuous cycle of innovation and exploitation, where protocols attempt to design systems that are resilient to adversarial behavior, but liquidators constantly find new ways to extract value.
The second trajectory, which offers a more fundamental solution, involves a shift toward liquidation-free protocol designs. These protocols aim to eliminate the need for liquidations entirely by restructuring risk management. One example is the use of perpetual options, where a borrower’s position is automatically managed by the protocol without relying on external liquidators.
Another example involves protocols where collateral is managed by a decentralized autonomous organization (DAO) or a specific keeper network, removing the profit motive from the process. This shift in design philosophy suggests a move away from external, adversarial liquidators toward internal, protocol-managed risk management.
Future solutions aim to either mitigate adversarial behavior through advanced auction mechanisms or eliminate liquidations entirely by restructuring risk management within the protocol itself.
The ultimate challenge on the horizon is balancing capital efficiency with system resilience. Adversarial liquidations, while creating instability, also ensure that protocols remain solvent by providing a clear incentive for external actors to intervene. Removing this incentive without a robust alternative could introduce new forms of risk, such as systemic undercollateralization during periods of high volatility.
The key question remains whether protocols can design a system that is both capital efficient and fully resilient to adversarial behavior without sacrificing decentralization.

Glossary

Adversarial Mev Competition

Adversarial Simulation Techniques

Liquidations Mechanism

Adversarial Exploitation

Liquidations and Risk

Adversarial Function

Adversarial Trading Algorithms

Adversarial Strategy Cost

Derivative Protocol






