# Value at Risk Security ⎊ Term

**Published:** 2026-02-01
**Author:** Greeks.live
**Categories:** Term

---

![This abstract visualization depicts the intricate flow of assets within a complex financial derivatives ecosystem. The different colored tubes represent distinct financial instruments and collateral streams, navigating a structural framework that symbolizes a decentralized exchange or market infrastructure](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-collateralization-visualization-of-cross-chain-derivatives-in-decentralized-finance-infrastructure.jpg)

![A digital rendering presents a cross-section of a dark, pod-like structure with a layered interior. A blue rod passes through the structure's central green gear mechanism, culminating in an upward-pointing green star](https://term.greeks.live/wp-content/uploads/2025/12/an-abstract-representation-of-smart-contract-collateral-structure-for-perpetual-futures-and-liquidity-protocol-execution.jpg)

## Essence

The conceptualization of **Value at Risk Security** involves the transformation of probabilistic financial loss into a tradeable, liquid instrument. This mechanism permits market participants to isolate and transfer the specific tail risk associated with a portfolio or asset without necessitating the liquidation of the underlying positions. By utilizing on-chain primitives, this instrument quantifies the maximum expected loss over a defined time interval at a specific confidence level ⎊ typically 95% or 99% ⎊ and encapsulates this metric within a smart contract.

The primary function of **Value at Risk Security** lies in its ability to provide a deterministic price for uncertainty. In decentralized finance, where volatility remains a constant, the capacity to hedge against extreme market movements through a standardized security enables more sophisticated capital allocation. This shifts the burden of risk from those seeking stability to those with the mathematical capacity and capital depth to absorb it.

> Risk quantification enables the separation of asset exposure from systemic volatility.

Unlike traditional insurance, which often relies on discretionary claims processes, **Value at Risk Security** operates via automated execution. When the calculated risk metrics exceed predefined thresholds, the security triggers a rebalancing or a payout, ensuring that the solvency of the interconnected protocols remains intact. This transparency is vital for maintaining trust in permissionless environments where counterparty creditworthiness cannot be assessed through conventional means.

![A high-resolution macro shot captures the intricate details of a futuristic cylindrical object, featuring interlocking segments of varying textures and colors. The focal point is a vibrant green glowing ring, flanked by dark blue and metallic gray components](https://term.greeks.live/wp-content/uploads/2025/12/decentralized-finance-collateralized-debt-position-vault-representing-layered-yield-aggregation-strategies.jpg)

![A macro view shows a multi-layered, cylindrical object composed of concentric rings in a gradient of colors including dark blue, white, teal green, and bright green. The rings are nested, creating a sense of depth and complexity within the structure](https://term.greeks.live/wp-content/uploads/2025/12/conceptualizing-decentralized-finance-derivative-tranches-collateralization-and-protocol-risk-layers-for-algorithmic-trading.jpg)

## Origin

The lineage of **Value at Risk Security** traces back to the 1994 RiskMetrics whitepaper by JP Morgan, which sought to standardize risk reporting across global trading desks.

This methodology provided a single, aggregate number that summarized the total risk of a firm. As digital asset markets matured, the limitations of static risk models became apparent, leading to the integration of these quantitative frameworks into the Ethereum Virtual Machine and other programmable blockchains. The necessity for such instruments arose during the early liquidity crises in decentralized lending protocols.

Market participants realized that liquidation engines alone were insufficient to prevent bad debt during “black swan” events. The development of **Value at Risk Security** provided a proactive layer of defense, allowing protocols to price the probability of failure into their interest rate models and collateral requirements.

> Deterministic code replaces discretionary oversight in the calculation of liquidation thresholds.

By porting the variance-covariance and [Monte Carlo](https://term.greeks.live/area/monte-carlo/) methodologies into smart contracts, developers created a new class of “risk-aware” assets. These securities do not rely on centralized reporting; instead, they ingest real-time price feeds from decentralized oracles to continuously recalculate the risk profile of the network. This evolution represents a shift from reactive risk management to an anticipatory, algorithmic architecture.

![A detailed close-up shot of a sophisticated cylindrical component featuring multiple interlocking sections. The component displays dark blue, beige, and vibrant green elements, with the green sections appearing to glow or indicate active status](https://term.greeks.live/wp-content/uploads/2025/12/layered-financial-engineering-depicting-digital-asset-collateralization-in-a-sophisticated-derivatives-framework.jpg)

![A 3D rendered cross-section of a conical object reveals its intricate internal layers. The dark blue exterior conceals concentric rings of white, beige, and green surrounding a central bright green core, representing a complex financial structure](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-collateralized-debt-position-architecture-with-nested-risk-stratification-and-yield-optimization.jpg)

## Theory

The mathematical architecture of **Value at Risk Security** is built upon the distribution of returns and the identification of the “left tail” where extreme losses reside.

The model assumes that asset returns follow a specific probability distribution ⎊ often a student-t or a jump-diffusion model ⎊ to better account for the high kurtosis observed in crypto markets. The security calculates the potential loss by integrating the [probability density function](https://term.greeks.live/area/probability-density-function/) up to the desired confidence interval.

![A high-resolution stylized rendering shows a complex, layered security mechanism featuring circular components in shades of blue and white. A prominent, glowing green keyhole with a black core is featured on the right side, suggesting an access point or validation interface](https://term.greeks.live/wp-content/uploads/2025/12/advanced-multilayer-protocol-security-model-for-decentralized-asset-custody-and-private-key-access-validation.jpg)

## Methodological Frameworks

Three primary methodologies govern the valuation of **Value at Risk Security**, each offering distinct trade-offs in computational intensity and accuracy. 

| Methodology | Mathematical Basis | Computational Cost | Tail Sensitivity |
| --- | --- | --- | --- |
| Parametric | Variance-Covariance matrix | Low | Limited |
| Historical | Past price distributions | Medium | Moderate |
| Monte Carlo | Stochastic simulations | High | High |

The Monte Carlo method is particularly favored for **Value at Risk Security** because it can simulate thousands of potential market paths, including path-dependent risks like flash loan attacks or oracle manipulation. This stochastic approach allows the security to price in the “Greeks” ⎊ Delta, Gamma, and Vega ⎊ ensuring that the instrument remains responsive to changes in both price and volatility. 

> Mathematical rigor serves as the primary defense against the cascading failures of interconnected liquidity pools.

![A visually striking render showcases a futuristic, multi-layered object with sharp, angular lines, rendered in deep blue and contrasting beige. The central part of the object opens up to reveal a complex inner structure composed of bright green and blue geometric patterns](https://term.greeks.live/wp-content/uploads/2025/12/futuristic-decentralized-derivative-protocol-structure-embodying-layered-risk-tranches-and-algorithmic-execution-logic.jpg)

## Capital Efficiency and Solvency

The theoretical goal of **Value at Risk Security** is to optimize the margin requirements for leveraged positions. By accurately predicting the probability of a liquidation event, the protocol can lower the [collateralization ratio](https://term.greeks.live/area/collateralization-ratio/) for low-risk portfolios while increasing it for those with high VaR. This creates a more fluid market where capital is directed toward its most efficient use without compromising the safety of the lender.

![A close-up view reveals a precision-engineered mechanism featuring multiple dark, tapered blades that converge around a central, light-colored cone. At the base where the blades retract, vibrant green and blue rings provide a distinct color contrast to the overall dark structure](https://term.greeks.live/wp-content/uploads/2025/12/collateralized-debt-position-liquidation-mechanism-illustrating-risk-aggregation-protocol-in-decentralized-finance.jpg)

![The image showcases a series of cylindrical segments, featuring dark blue, green, beige, and white colors, arranged sequentially. The segments precisely interlock, forming a complex and modular structure](https://term.greeks.live/wp-content/uploads/2025/12/multi-layered-defi-protocol-composability-nexus-illustrating-derivative-instruments-and-smart-contract-execution-flow.jpg)

## Approach

Current implementation of **Value at Risk Security** relies on a robust stack of decentralized infrastructure.

Oracles supply high-frequency price data, which is then processed by off-chain keepers or specialized ZK-circuits to generate the risk proofs. These proofs are submitted to the smart contract, which updates the trading price of the **Value at Risk Security** or adjusts the parameters of the associated lending pool.

- **Stochastic Modeling**: Utilizing Brownian motion and Poisson processes to simulate asset price trajectories.

- **Oracle Integration**: Fetching real-time volatility data to ensure the risk metric reflects current market conditions.

- **Automated Rebalancing**: Triggering asset swaps when the VaR threshold is breached to maintain a delta-neutral profile.

- **Liquidity Provisioning**: Incentivizing market makers to provide depth for the risk-transfer market.

Biological systems often manage risk through redundancy ⎊ having multiple pathways to achieve the same metabolic result ⎊ and **Value at Risk Security** mirrors this by utilizing multi-oracle consensus to prevent single points of failure. This redundancy ensures that the risk calculation remains accurate even if a specific data source is compromised. The operational terrain requires constant calibration.

Strategists use backtesting engines to compare the predicted VaR against actual market outcomes. If the model consistently underestimates the loss, the parameters are adjusted to increase the safety margin. This iterative process ensures that the **Value at Risk Security** evolves alongside the market it intends to protect.

![The image features stylized abstract mechanical components, primarily in dark blue and black, nestled within a dark, tube-like structure. A prominent green component curves through the center, interacting with a beige/cream piece and other structural elements](https://term.greeks.live/wp-content/uploads/2025/12/decentralized-finance-automated-market-maker-protocol-structure-and-synthetic-derivative-collateralization-flow.jpg)

![A close-up view reveals a series of nested, arched segments in varying shades of blue, green, and cream. The layers form a complex, interconnected structure, possibly part of an intricate mechanical or digital system](https://term.greeks.live/wp-content/uploads/2025/12/nested-protocol-architecture-and-risk-tranching-within-decentralized-finance-derivatives-stacking.jpg)

## Evolution

The transition from static VaR to Conditional Value at Risk (CVaR), also known as Expected Shortfall, represents a significant leap in the sophistication of **Value at Risk Security**.

While standard VaR only identifies the threshold of loss, CVaR calculates the average loss that occurs beyond that threshold. This distinction is vital in crypto finance, where “fat tails” mean that once a threshold is breached, the magnitude of the loss can be catastrophic. The psychological impact of borrowed capital often leads to irrational market behavior during periods of high stress.

When a **Value at Risk Security** indicates a rising probability of loss, it can trigger a feedback loop where automated selling leads to further price declines, which in turn increases the VaR. This reflexivity is the greatest challenge for risk architects. We have seen this play out in numerous de-pegging events where the very mechanisms designed to protect the system contributed to its temporary instability.

The evolution of these instruments now includes “circuit breakers” and “smoothing functions” that attempt to dampen these feedback loops without sacrificing the accuracy of the risk signal. The goal is to create a system that is resilient, not just reactive, acknowledging that human participants will often act in ways that defy pure mathematical logic when their solvency is threatened.

| Feature | Traditional VaR | On-Chain VaR Security |
| --- | --- | --- |
| Transparency | Opaque reporting | Real-time on-chain data |
| Settlement | T+2 or longer | Atomic execution |
| Counterparty Risk | Institutional credit | Smart contract collateral |
| Accessibility | Qualified investors | Permissionless access |

As the network matures, **Value at Risk Security** has moved from being a niche tool for hedge funds to a foundational component of decentralized treasury management. DAOs now use these securities to hedge their native token exposure, ensuring they have sufficient runway to continue operations even during prolonged bear markets.

![This abstract object features concentric dark blue layers surrounding a bright green central aperture, representing a sophisticated financial derivative product. The structure symbolizes the intricate architecture of a tokenized structured product, where each layer represents different risk tranches, collateral requirements, and embedded option components](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-financial-derivative-contract-architecture-risk-exposure-modeling-and-collateral-management.jpg)

![An abstract image displays several nested, undulating layers of varying colors, from dark blue on the outside to a vibrant green core. The forms suggest a fluid, three-dimensional structure with depth](https://term.greeks.live/wp-content/uploads/2025/12/abstract-visualization-of-nested-derivatives-protocols-and-structured-market-liquidity-layers.jpg)

## Horizon

The future of **Value at Risk Security** lies in the integration of artificial intelligence and zero-knowledge proofs. AI models can identify non-linear correlations between disparate assets that traditional linear models might miss, providing a more comprehensive view of systemic risk. Meanwhile, ZK-proofs allow institutions to prove they are managing risk according to specific VaR mandates without revealing their underlying positions or strategies. Traversing the path toward a fully automated financial system requires the development of cross-chain risk instruments. As liquidity becomes increasingly fragmented across various Layer 2 solutions and sovereign blockchains, a **Value at Risk Security** must be able to aggregate risk across multiple environments simultaneously. This will likely involve the use of generalized message-passing protocols to synchronize risk metrics in real-time. The ultimate objective is the creation of a “Global Risk Map” ⎊ a transparent, real-time visualization of the **Value at Risk Security** metrics across the entire decentralized landscape. This would allow regulators and participants to identify pockets of excessive gearing before they lead to systemic failure. By commoditizing risk and making it tradeable, we are not eliminating volatility; we are building the infrastructure to survive it.

![A detailed abstract digital sculpture displays a complex, layered object against a dark background. The structure features interlocking components in various colors, including bright blue, dark navy, cream, and vibrant green, suggesting a sophisticated mechanism](https://term.greeks.live/wp-content/uploads/2025/12/decentralized-options-protocol-architecture-visualizing-smart-contract-logic-and-collateralization-mechanisms-for-structured-products.jpg)

## Glossary

### [Conditional Value-at-Risk](https://term.greeks.live/area/conditional-value-at-risk/)

[![An abstract digital rendering showcases a segmented object with alternating dark blue, light blue, and off-white components, culminating in a bright green glowing core at the end. The object's layered structure and fluid design create a sense of advanced technological processes and data flow](https://term.greeks.live/wp-content/uploads/2025/12/real-time-automated-market-making-algorithm-execution-flow-and-layered-collateralized-debt-obligation-structuring.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/real-time-automated-market-making-algorithm-execution-flow-and-layered-collateralized-debt-obligation-structuring.jpg)

Metric ⎊ This advanced risk measure quantifies the expected loss in a portfolio given that the loss exceeds the standard Value-at-Risk threshold at a specified confidence level.

### [Proof of Stake Security](https://term.greeks.live/area/proof-of-stake-security/)

[![A close-up view captures a sophisticated mechanical universal joint connecting two shafts. The components feature a modern design with dark blue, white, and light blue elements, highlighted by a bright green band on one of the shafts](https://term.greeks.live/wp-content/uploads/2025/12/precision-smart-contract-integration-for-decentralized-derivatives-trading-protocols-and-cross-chain-interoperability.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/precision-smart-contract-integration-for-decentralized-derivatives-trading-protocols-and-cross-chain-interoperability.jpg)

Security ⎊ Proof of Stake (PoS) security refers to the mechanisms used to protect a blockchain network where validators secure the chain by staking their assets rather than expending computational power.

### [Cross Margin Efficiency](https://term.greeks.live/area/cross-margin-efficiency/)

[![A digital render depicts smooth, glossy, abstract forms intricately intertwined against a dark blue background. The forms include a prominent dark blue element with bright blue accents, a white or cream-colored band, and a bright green band, creating a complex knot](https://term.greeks.live/wp-content/uploads/2025/12/intricate-interconnection-of-smart-contracts-illustrating-systemic-risk-propagation-in-decentralized-finance.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/intricate-interconnection-of-smart-contracts-illustrating-systemic-risk-propagation-in-decentralized-finance.jpg)

Efficiency ⎊ Cross margin efficiency, within cryptocurrency derivatives, represents the optimal allocation of margin across multiple positions to minimize capital requirements and maximize potential trading capacity.

### [Bug Bounty Program](https://term.greeks.live/area/bug-bounty-program/)

[![An abstract artwork featuring multiple undulating, layered bands arranged in an elliptical shape, creating a sense of dynamic depth. The ribbons, colored deep blue, vibrant green, cream, and darker navy, twist together to form a complex pattern resembling a cross-section of a flowing vortex](https://term.greeks.live/wp-content/uploads/2025/12/abstract-visualization-of-collateralized-debt-position-dynamics-and-impermanent-loss-in-automated-market-makers.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/abstract-visualization-of-collateralized-debt-position-dynamics-and-impermanent-loss-in-automated-market-makers.jpg)

Security ⎊ A bug bounty program is a proactive security measure where organizations offer financial rewards to ethical hackers for identifying vulnerabilities in their code.

### [Sortino Ratio](https://term.greeks.live/area/sortino-ratio/)

[![A high-tech stylized padlock, featuring a deep blue body and metallic shackle, symbolizes digital asset security and collateralization processes. A glowing green ring around the primary keyhole indicates an active state, representing a verified and secure protocol for asset access](https://term.greeks.live/wp-content/uploads/2025/12/advanced-collateralization-and-cryptographic-security-protocols-in-smart-contract-options-derivatives-trading.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/advanced-collateralization-and-cryptographic-security-protocols-in-smart-contract-options-derivatives-trading.jpg)

Ratio ⎊ The Sortino Ratio calculates the excess return over a risk-free rate divided by the downside deviation.

### [Institutional Grade Defi](https://term.greeks.live/area/institutional-grade-defi/)

[![An abstract composition features dark blue, green, and cream-colored surfaces arranged in a sophisticated, nested formation. The innermost structure contains a pale sphere, with subsequent layers spiraling outward in a complex configuration](https://term.greeks.live/wp-content/uploads/2025/12/layered-tranches-and-structured-products-in-defi-risk-aggregation-underlying-asset-tokenization.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/layered-tranches-and-structured-products-in-defi-risk-aggregation-underlying-asset-tokenization.jpg)

Institution ⎊ ⎊ Institutional Grade DeFi refers to decentralized finance protocols and infrastructure specifically engineered to meet the stringent operational, security, and compliance requirements of traditional financial institutions.

### [Socialized Loss Mechanism](https://term.greeks.live/area/socialized-loss-mechanism/)

[![The abstract image displays a series of concentric, layered rings in a range of colors including dark navy blue, cream, light blue, and bright green, arranged in a spiraling formation that recedes into the background. The smooth, slightly distorted surfaces of the rings create a sense of dynamic motion and depth, suggesting a complex, structured system](https://term.greeks.live/wp-content/uploads/2025/12/layered-risk-tranches-in-decentralized-finance-derivatives-modeling-and-market-liquidity-provisioning.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/layered-risk-tranches-in-decentralized-finance-derivatives-modeling-and-market-liquidity-provisioning.jpg)

Definition ⎊ A socialized loss mechanism is a risk management protocol where losses from undercollateralized positions are distributed among profitable traders on the platform.

### [Fat Tail Distribution](https://term.greeks.live/area/fat-tail-distribution/)

[![The image features a layered, sculpted form with a tight spiral, transitioning from light blue to dark blue, culminating in a bright green protrusion. This visual metaphor illustrates the structure of a decentralized finance DeFi protocol](https://term.greeks.live/wp-content/uploads/2025/12/decentralized-finance-protocol-layering-and-tokenized-derivatives-complexity.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/decentralized-finance-protocol-layering-and-tokenized-derivatives-complexity.jpg)

Distribution ⎊ Fat tail distribution refers to a statistical property where the tails of an asset's return distribution are heavier than those found in a normal distribution.

### [Trading Volume](https://term.greeks.live/area/trading-volume/)

[![A tightly tied knot in a thick, dark blue cable is prominently featured against a dark background, with a slender, bright green cable intertwined within the structure. The image serves as a powerful metaphor for the intricate structure of financial derivatives and smart contracts within decentralized finance ecosystems](https://term.greeks.live/wp-content/uploads/2025/12/analyzing-interconnected-risk-dynamics-in-defi-structured-products-and-cross-collateralization-mechanisms.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/analyzing-interconnected-risk-dynamics-in-defi-structured-products-and-cross-collateralization-mechanisms.jpg)

Volume ⎊ Trading volume represents the total quantity of a specific financial instrument traded over a defined period, serving as a key indicator of market activity and liquidity.

### [Gas Price Volatility](https://term.greeks.live/area/gas-price-volatility/)

[![A high-resolution cutaway diagram displays the internal mechanism of a stylized object, featuring a bright green ring, metallic silver components, and smooth blue and beige internal buffers. The dark blue housing splits open to reveal the intricate system within, set against a dark, minimal background](https://term.greeks.live/wp-content/uploads/2025/12/structural-analysis-of-decentralized-options-protocol-mechanisms-and-automated-liquidity-provisioning-settlement.jpg)](https://term.greeks.live/wp-content/uploads/2025/12/structural-analysis-of-decentralized-options-protocol-mechanisms-and-automated-liquidity-provisioning-settlement.jpg)

Volatility ⎊ The statistical measure of the dispersion of gas prices over a defined period, which introduces significant uncertainty into the cost of executing on-chain derivatives.

## Discover More

### [Delta Hedge Cost Modeling](https://term.greeks.live/term/delta-hedge-cost-modeling/)
![A futuristic, multi-layered object with sharp angles and a central green sensor representing advanced algorithmic trading mechanisms. This complex structure visualizes the intricate data processing required for high-frequency trading strategies and volatility surface analysis. It symbolizes a risk-neutral pricing model for synthetic assets within decentralized finance protocols. The object embodies a sophisticated oracle system for derivatives pricing and collateral management, highlighting precision in market prediction and algorithmic execution.](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-sensor-for-futures-contract-risk-modeling-and-volatility-surface-analysis-in-decentralized-finance.jpg)

Meaning ⎊ Delta Hedge Cost Modeling quantifies the execution friction and capital drag required to maintain neutrality in volatile decentralized markets.

### [Smart Contract Execution Costs](https://term.greeks.live/term/smart-contract-execution-costs/)
![A detailed, close-up view of a precisely engineered mechanism with interlocking components in blue, green, and silver hues. This structure serves as a representation of the intricate smart contract logic governing a Decentralized Finance protocol. The layered design symbolizes Layer 2 scaling solutions and cross-chain interoperability, where different elements represent liquidity pools, collateralization mechanisms, and oracle feeds. The precise alignment signifies algorithmic execution and risk modeling required for decentralized perpetual swaps and options trading. The visual complexity illustrates the technical foundation underpinning modern digital asset financial derivatives.](https://term.greeks.live/wp-content/uploads/2025/12/blockchain-architecture-components-illustrating-layer-two-scaling-solutions-and-smart-contract-execution.jpg)

Meaning ⎊ Smart contract execution costs are dynamic network fees that fundamentally impact the profitability and risk modeling of decentralized options strategies.

### [Non Gaussian Distributions](https://term.greeks.live/term/non-gaussian-distributions/)
![A stylized, futuristic object embodying a complex financial derivative. The asymmetrical chassis represents non-linear market dynamics and volatility surface complexity in options trading. The internal triangular framework signifies a robust smart contract logic for risk management and collateralization strategies. The green wheel component symbolizes continuous liquidity flow within an automated market maker AMM environment. This design reflects the precision engineering required for creating synthetic assets and managing basis risk in decentralized finance DeFi protocols.](https://term.greeks.live/wp-content/uploads/2025/12/quantitatively-engineered-perpetual-futures-contract-framework-illustrating-liquidity-pool-and-collateral-risk-management.jpg)

Meaning ⎊ Non Gaussian Distributions characterize crypto market returns through heavy tails and skew, requiring advanced models beyond traditional methods for accurate risk management and derivative pricing.

### [Jump Diffusion Pricing Models](https://term.greeks.live/term/jump-diffusion-pricing-models/)
![A stylized depiction of a complex financial instrument, representing an algorithmic trading strategy or structured note, set against a background of market volatility. The core structure symbolizes a high-yield product or a specific options strategy, potentially involving yield-bearing assets. The layered rings suggest risk tranches within a DeFi protocol or the components of a call spread, emphasizing tiered collateral management. The precision molding signifies the meticulous design of exotic derivatives, where market movements dictate payoff structures based on strike price and implied volatility.](https://term.greeks.live/wp-content/uploads/2025/12/visualizing-exotic-options-pricing-models-and-defi-risk-tranches-for-yield-generation-strategies.jpg)

Meaning ⎊ Jump Diffusion Pricing Models integrate discrete price shocks into continuous volatility frameworks to accurately price tail risk in crypto markets.

### [Theoretical Fair Value](https://term.greeks.live/term/theoretical-fair-value/)
![A smooth, dark form cradles a glowing green sphere and a recessed blue sphere, representing the binary states of an options contract. The vibrant green sphere symbolizes the “in the money” ITM position, indicating significant intrinsic value and high potential yield. In contrast, the subdued blue sphere represents the “out of the money” OTM state, where extrinsic value dominates and the delta value approaches zero. This abstract visualization illustrates key concepts in derivatives pricing and protocol mechanics, highlighting risk management and the transition between positive and negative payoff structures at contract expiration.](https://term.greeks.live/wp-content/uploads/2025/12/dynamic-visualization-of-options-contract-state-transition-in-the-money-versus-out-the-money-derivatives-pricing.jpg)

Meaning ⎊ Theoretical Fair Value in crypto options quantifies the expected, risk-adjusted price based on volatility, time decay, and market risk.

### [Bot Liquidation Systems](https://term.greeks.live/term/bot-liquidation-systems/)
![A futuristic algorithmic trading module is visualized through a sleek, asymmetrical design, symbolizing high-frequency execution within decentralized finance. The object represents a sophisticated risk management protocol for options derivatives, where different structural elements symbolize complex financial functions like managing volatility surface shifts and optimizing Delta hedging strategies. The fluid shape illustrates the adaptability and speed required for automated liquidity provision in fast-moving markets. This component embodies the technological core of an advanced decentralized derivatives exchange.](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-volatility-surface-trading-system-component-for-decentralized-derivatives-exchange-optimization.jpg)

Meaning ⎊ Bot Liquidation Systems protect decentralized financial protocols by automatically closing undercollateralized positions to prevent bad debt.

### [Margin Call Liquidation](https://term.greeks.live/term/margin-call-liquidation/)
![A high-tech visualization of a complex financial instrument, resembling a structured note or options derivative. The symmetric design metaphorically represents a delta-neutral straddle strategy, where simultaneous call and put options are balanced on an underlying asset. The different layers symbolize various tranches or risk components. The glowing elements indicate real-time risk parity adjustments and continuous gamma hedging calculations by algorithmic trading systems. This advanced mechanism manages implied volatility exposure to optimize returns within a liquidity pool.](https://term.greeks.live/wp-content/uploads/2025/12/advanced-algorithmic-trading-visualization-of-delta-neutral-straddle-strategies-and-implied-volatility.jpg)

Meaning ⎊ Margin Call Liquidation is the automated, non-discretionary forced closure of an undercollateralized leveraged position to protect protocol solvency and prevent systemic bad debt accumulation.

### [Margin Requirement](https://term.greeks.live/term/margin-requirement/)
![A high-tech, abstract composition of sleek, interlocking components in dark blue, vibrant green, and cream hues. This complex structure visually represents the intricate architecture of a decentralized protocol stack, illustrating the seamless interoperability and composability required for a robust Layer 2 scaling solution. The interlocked forms symbolize smart contracts interacting within an Automated Market Maker AMM framework, facilitating automated liquidation and collateralization processes for complex financial derivatives like perpetual options contracts. The dynamic flow suggests efficient, high-velocity transaction throughput.](https://term.greeks.live/wp-content/uploads/2025/12/modular-dlt-architecture-for-automated-market-maker-collateralization-and-perpetual-options-contract-settlement-mechanisms.jpg)

Meaning ⎊ Margin requirement is the foundational risk buffer in derivatives systems, ensuring solvency by requiring collateral to cover potential losses and preventing counterparty default.

### [Portfolio Delta Margin](https://term.greeks.live/term/portfolio-delta-margin/)
![A detailed visualization of a complex mechanical mechanism representing a high-frequency trading engine. The interlocking blue and white components symbolize a decentralized finance governance framework and smart contract execution layers. The bright metallic green element represents an active liquidity pool or collateralized debt position, dynamically generating yield. The precision engineering highlights risk management protocols like delta hedging and impermanent loss mitigation strategies required for automated portfolio rebalancing in derivatives markets, where precise oracle feeds are crucial for execution.](https://term.greeks.live/wp-content/uploads/2025/12/complex-automated-market-maker-algorithm-visualization-for-high-frequency-trading-and-risk-management-protocols.jpg)

Meaning ⎊ Portfolio Delta Margin enables capital efficiency by aggregating directional sensitivities across a unified derivative portfolio to determine collateral.

---

## Raw Schema Data

```json
{
    "@context": "https://schema.org",
    "@type": "BreadcrumbList",
    "itemListElement": [
        {
            "@type": "ListItem",
            "position": 1,
            "name": "Home",
            "item": "https://term.greeks.live"
        },
        {
            "@type": "ListItem",
            "position": 2,
            "name": "Term",
            "item": "https://term.greeks.live/term/"
        },
        {
            "@type": "ListItem",
            "position": 3,
            "name": "Value at Risk Security",
            "item": "https://term.greeks.live/term/value-at-risk-security/"
        }
    ]
}
```

```json
{
    "@context": "https://schema.org",
    "@type": "Article",
    "mainEntityOfPage": {
        "@type": "WebPage",
        "@id": "https://term.greeks.live/term/value-at-risk-security/"
    },
    "headline": "Value at Risk Security ⎊ Term",
    "description": "Meaning ⎊ Tokenized risk instruments transform probabilistic loss into tradeable market liquidity for decentralized financial architectures. ⎊ Term",
    "url": "https://term.greeks.live/term/value-at-risk-security/",
    "author": {
        "@type": "Person",
        "name": "Greeks.live",
        "url": "https://term.greeks.live/author/greeks-live/"
    },
    "datePublished": "2026-02-01T16:50:28+00:00",
    "dateModified": "2026-02-01T16:50:44+00:00",
    "publisher": {
        "@type": "Organization",
        "name": "Greeks.live"
    },
    "articleSection": [
        "Term"
    ],
    "image": {
        "@type": "ImageObject",
        "url": "https://term.greeks.live/wp-content/uploads/2025/12/analyzing-decentralized-finance-protocol-layers-for-cross-chain-interoperability-and-risk-management-strategies.jpg",
        "caption": "The abstract image displays a close-up view of a dark blue, curved structure revealing internal layers of white and green. The high-gloss finish highlights the smooth curves and distinct separation between the different colored components. This aesthetic visualization represents the intricate workings of a sophisticated financial derivative instrument within a decentralized finance ecosystem. The layers symbolize different aspects of the protocol, from the core collateralized debt position to the overlying smart contract logic. The bright green section illustrates a specific yield stream or intrinsic value component derived from an options contract, while the surrounding layers represent extrinsic value factors like time decay and market volatility. This architecture requires robust risk management protocols and reliable oracle networks to ensure data integrity and facilitate efficient cross-chain settlement."
    },
    "keywords": [
        "Adversarial Value at Risk",
        "AI-Driven Security Auditing",
        "Algorithmic Stablecoin Stability",
        "Anti-Money Laundering Protocols",
        "Arbitrage Value",
        "Arithmetic Circuit Security",
        "Artificial Intelligence",
        "Asset Exposure",
        "Asset Intrinsic Value Subtraction",
        "Asset Value Decoupling",
        "Asset Value Floor",
        "Auto-Deleveraging",
        "Automated Execution",
        "Automated Market Maker Solvency",
        "Automated Value Transfers",
        "Bankruptcy Price",
        "Base Layer Security Tradeoffs",
        "Black Swan Events",
        "Black-Scholes Model",
        "Blockspace Demand",
        "Boolean Value",
        "Bridge Security Risk",
        "Brownian Motion",
        "Bug Bounty Program",
        "Bundle Value",
        "Burn Mechanism",
        "Byzantine Fault Tolerance",
        "Calmar Ratio",
        "Capital Efficiency",
        "Circuit Breakers",
        "Circulating Supply",
        "Cold Storage Custody",
        "Collateral Effective Value",
        "Collateral Recovery Value",
        "Collateral to Value Ratio",
        "Collateral to Value Secured",
        "Collateral Value Adjustments",
        "Collateral Value at Risk",
        "Collateral Value Attestation",
        "Collateral Value Contagion",
        "Collateral Value Decay",
        "Collateral Value Decline",
        "Collateral Value Degradation",
        "Collateral Value Discrepancy",
        "Collateral Value Drop",
        "Collateral Value Dynamics",
        "Collateral Value Erosion",
        "Collateral Value Inflation",
        "Collateral Value Prediction",
        "Collateral Value Protection",
        "Collateral Value Risk",
        "Collateral Value Synchronization",
        "Collateral Value Threshold",
        "Collateral Value Validation",
        "Collateral Value Volatility",
        "Collateralization Ratio",
        "Common Value Auctions",
        "Conditional Value at Risk (CVaR)",
        "Conditional Value Transfer",
        "Conditional Value-at-Risk",
        "Contagion Value at Risk",
        "Contingent Value",
        "Continuation Value",
        "Continuous Security Posture",
        "Cost per Unit Value",
        "Counterparty Credit Risk",
        "Counterparty Creditworthiness",
        "Cross Margin Efficiency",
        "Cross-Chain Bridge Security",
        "Cross-Chain Risk Instruments",
        "Cross-Chain Value",
        "Cross-Chain Value Routing",
        "Cross-Chain Value-at-Risk",
        "Cryptoeconomic Security Budget",
        "DAO Treasury Management",
        "De-Pegging Events",
        "Debt Face Value",
        "Debt Value",
        "Decentralized Asset Value",
        "Decentralized Autonomous Organization Treasury",
        "Decentralized Clearinghouse",
        "Decentralized Financial Architectures",
        "Decentralized Lending Security",
        "Decentralized Oracle Infrastructure Security",
        "Decentralized Oracle Security Advancements",
        "Decentralized Oracle Security Expertise",
        "Decentralized Oracle Security Models",
        "Decentralized Oracle Security Practices",
        "Decentralized Oracle Security Roadmap",
        "Decentralized Oracle Security Solutions",
        "Decentralized Oracles",
        "Decentralized Value Accrual",
        "Decentralized Value Capture",
        "Decentralized Value Creation",
        "Decentralized Value Transfer",
        "Deflationary Model",
        "Deflationary Value Accrual",
        "Delta",
        "Delta Neutrality",
        "Derivative Contract Security",
        "Derivative Security Research",
        "Derivative Value",
        "Derivative Value Accrual",
        "Derivatives Value Accrual",
        "Deterministic Execution Security",
        "Deterministic Security",
        "Deterministic Value Component",
        "Discounted Present Value",
        "Dynamic Index Value",
        "Dynamic Value at Risk",
        "Effective Collateral Value",
        "Exercised Option Value",
        "Expected Shortfall",
        "Expected Value",
        "Expected Value Modeling",
        "Expected Value of Ruin",
        "Extreme Value Theory",
        "Extreme Value Theory Application",
        "Extreme Value Theory Modeling",
        "Extrinsic Value Analysis",
        "Extrinsic Value Components",
        "Extrinsic Value Decay",
        "Fair Value of Variance",
        "Fair Value Premium",
        "Fair Value Pricing",
        "Fat Tail Distribution",
        "Fee-to-Value Accrual",
        "Finality Time Value",
        "Financial Derivatives",
        "Financial Instrument Security",
        "First-Principles Value",
        "Flash Loan Attacks",
        "Flash Loan Vulnerability",
        "Floor Value",
        "Formal Verification",
        "Fragmented Security Models",
        "Frictionless Value Transfer",
        "Fully Diluted Valuation",
        "Fundamental Analysis Security",
        "Future Value",
        "Gamma",
        "Gamma Scalping",
        "Gas Price Volatility",
        "Generalized Extreme Value",
        "Generalized Extreme Value Theory",
        "Geometric Brownian Motion",
        "Global Risk Map",
        "Global Value Flow",
        "Governance Attack Vector",
        "Governance Token Value Accrual",
        "Governance-as-a-Value-Accrual",
        "Greeks (Finance)",
        "Haircut Value",
        "Hardware Security Modules",
        "Hashrate Value",
        "High Extrinsic Value",
        "High Value Payment Systems",
        "High-Value Protocols",
        "Historical Backtesting",
        "Immediate Exercise Value",
        "Impermanent Loss Mitigation",
        "Inflationary Pressure",
        "Informational Security",
        "Initial Margin",
        "Instantaneous Value Transfer",
        "Institutional Grade DeFi",
        "Insurance Fund Solvency",
        "Interchain Value Capture",
        "Internet of Value",
        "Intrinsic Value Convergence",
        "Intrinsic Value Erosion",
        "Intrinsic Value Evaluation",
        "Intrinsic Value Extraction",
        "Intrinsic Value Extrinsic Value",
        "Intrinsic Value Realization",
        "Isolated Margin Protection",
        "Isolated Margin Security",
        "Jump Diffusion Process",
        "Know Your Customer Standards",
        "Kurtosis Analysis",
        "L2 Security Considerations",
        "L2 Sequencer Security",
        "Layer 2 Settlement Finality",
        "Leverage Ratio",
        "Liability Value",
        "Liquidation Engine",
        "Liquidation Engines",
        "Liquidation Penalty",
        "Liquidation Value at Risk",
        "Liquidity Adjusted Value",
        "Liquidity Adjusted Value at Risk",
        "Liquidity Provision Security",
        "Loan-to-Value Ratios",
        "Long-Term Value Accrual",
        "Maintenance Margin",
        "Margin Requirement",
        "Margin Requirements",
        "Mark-to-Market Value",
        "Market Capitalization",
        "Market Value",
        "Maturity Value",
        "Max Extractable Value",
        "Maximal Extractable Value Arbitrage",
        "Maximal Extractable Value Exploitation",
        "Maximal Extractable Value Liquidations",
        "Maximal Extractable Value Prediction",
        "Maximal Extractable Value Rebates",
        "Maximal Extractable Value Reduction",
        "Maximal Extractable Value Searcher",
        "Maximal Extractable Value Strategies",
        "Maximum Drawdown",
        "Maximum Extractable Value Impact",
        "Maximum Extractable Value Mitigation",
        "Maximum Extractable Value Protection",
        "Maximum Extractable Value Resistance",
        "Maximum Extractable Value Strategies",
        "Mean Reversion",
        "Median Value",
        "MEV Protection",
        "Miner Extractable Value Capture",
        "Miner Extractable Value Dynamics",
        "Miner Extractable Value Integration",
        "Miner Extractable Value Mitigation",
        "Miner Extractable Value Problem",
        "Miner Extractable Value Protection",
        "Miner Extracted Value",
        "Minimum Collateral Value",
        "Monte Carlo Simulation",
        "Monte Carlo Simulations",
        "Multi-Oracle Consensus",
        "Multi-Signature Wallet Security",
        "Native Token Value",
        "Net Asset Value",
        "Net Equity Value",
        "Net Liquidation Value",
        "Net Present Value",
        "Net Present Value Obligations",
        "Net Present Value Obligations Calculation",
        "Network Consensus",
        "Network Data Intrinsic Value",
        "Network Data Value Accrual",
        "Network Value",
        "Network Value Capture",
        "Non-Dilutive Value Accrual",
        "Non-Parametric Risk Assessment",
        "Notional Value",
        "Notional Value Exposure",
        "Notional Value Trigger",
        "Notional Value Viability",
        "On-Chain Oracles",
        "On-Chain Primitives",
        "On-Chain Value Capture",
        "On-Chain Value Extraction",
        "Open Interest",
        "Optimistic Attestation Security",
        "Optimistic Rollup Fraud Proofs",
        "Option Exercise Economic Value",
        "Option Greeks",
        "Options Contract Value",
        "Options Expiration Time Value",
        "Options Value",
        "Oracle Data Security",
        "Oracle Data Security Expertise",
        "Oracle Data Security Measures",
        "Oracle Data Security Standards",
        "Oracle Extractable Value",
        "Oracle Extractable Value Capture",
        "Oracle Manipulation",
        "Oracle Security Forums",
        "Oracle Security Frameworks",
        "Oracle Security Guidelines",
        "Oracle Security Innovation",
        "Oracle Security Innovation Pipeline",
        "Oracle Security Research",
        "Oracle Security Research Projects",
        "Oracle Security Training",
        "Oracle Security Vendors",
        "Oracle Security Vision",
        "Oracle Security Webinars",
        "Oracle Solution Security",
        "Order Book Depth",
        "Parametric VaR",
        "Peer-to-Peer Settlement",
        "Peer-to-Peer Value Transfer",
        "Permissionless Value Transfer",
        "Perpetual Futures Risk",
        "Poisson Processes",
        "Portfolio Net Present Value",
        "Portfolio Risk",
        "Portfolio Risk Value",
        "Portfolio Value",
        "Position Notional Value",
        "Present Value",
        "Principal Value",
        "Private Value Exchange",
        "Probabilistic Loss",
        "Probabilistic Value Component",
        "Probability Density Function",
        "Programmable Value Friction",
        "Proof of Stake Security",
        "Protocol Cash Flow Present Value",
        "Protocol Controlled Value",
        "Protocol Controlled Value Liquidity",
        "Protocol Governance Value Accrual",
        "Protocol Liquidity Depth",
        "Protocol Physics of Time-Value",
        "Protocol Security and Risk",
        "Protocol Security Assessments",
        "Protocol Security Initiatives",
        "Protocol Security Partners",
        "Protocol Security Resources",
        "Protocol Security Review",
        "Protocol Security Risk",
        "Protocol Security Risk Management Frameworks",
        "Protocol Value Accrual",
        "Protocol Value Capture",
        "Protocol Value Flow",
        "Protocol Value Redistribution",
        "Protocol Value-at-Risk",
        "Protocol-Owned Value",
        "Quantitative Finance",
        "Queue Position Value",
        "Re-Hypothecation Risk",
        "Real Token Value",
        "Real-Time Price Data",
        "Recursive Value Streams",
        "Redemption Value",
        "Reflexivity",
        "Regressive Security Tax",
        "Regulatory Compliance Frameworks",
        "Relative Value Trading",
        "Relay Security",
        "Rho Exposure",
        "Risk Proofs",
        "Risk Quantification",
        "Risk-Adjusted Collateral Value",
        "Risk-Adjusted USD Value",
        "Risk-Adjusted Value",
        "Risk-Adjusted Value Capture",
        "RiskMetrics",
        "Scenario-Based Value at Risk",
        "Security Basis",
        "Security Bond Slashing",
        "Security Council",
        "Security Inheritance Premium",
        "Security Level",
        "Security Levels",
        "Security Model Dependency",
        "Security Model Nuance",
        "Security Module Implementation",
        "Security Path",
        "Security Premium Interoperability",
        "Security Premium Pricing",
        "Security Ratings",
        "Security Risk Concentration",
        "Security Risk Mitigation",
        "Security Risk Premium",
        "Security Risk Quantification",
        "Security Standard",
        "Security Token Offerings",
        "Security-First Design",
        "Sequencer Maximal Extractable Value",
        "Settlement Space Value",
        "Settlement Value",
        "Settlement Value Stability",
        "Sharpe Ratio",
        "Silicon Level Security",
        "Skewness Adjustment",
        "Slashing Conditions",
        "Slippage Impact",
        "Smart Contract Audit",
        "Smart Contract Solvency",
        "Smart Contracts",
        "Smoothing Functions",
        "Socialized Loss Mechanism",
        "Solvency",
        "Sortino Ratio",
        "Sovereign Security",
        "Staking Rewards",
        "Stochastic Simulations",
        "Stochastic Volatility",
        "Store of Value",
        "Strategic Value",
        "Stressed Value-at-Risk",
        "Structured Products Value Flow",
        "Sustainable Value Accrual",
        "Sybil Resistance",
        "Syntactic Security",
        "Synthetic Risk Assets",
        "Synthetic Value Capture",
        "Systemic Conditional Value-at-Risk",
        "Systemic Failure",
        "Systemic Value",
        "Systemic Value at Risk",
        "Systemic Value Extraction",
        "Systemic Volatility",
        "Tail Risk",
        "Tail Risk Hedging",
        "Tail Value at Risk",
        "Tamper-Proof Value",
        "Technical Security",
        "Temporal Security Thresholds",
        "Terminal Value",
        "Theoretical Fair Value",
        "Theoretical Value",
        "Theoretical Value Deviation",
        "Theta Decay",
        "Theta Value",
        "Time Value Arbitrage",
        "Time Value Capital Expenditure",
        "Time Value Capture",
        "Time Value Discontinuity",
        "Time Value Erosion",
        "Time Value Execution",
        "Time Value Integrity",
        "Time Value Intrinsic Value",
        "Time Value Loss",
        "Time Value of Execution",
        "Time Value of Money Concepts",
        "Time Value of Money in DeFi",
        "Time Value of Options",
        "Time Value of Risk",
        "Time Value of Staking",
        "Time Value of Transfer",
        "Time-Value of Information",
        "Time-Value of Transaction",
        "Time-Value Risk",
        "Time-Weighted Average Price Security",
        "Token Holder Value",
        "Token Value Accrual",
        "Token Value Accrual Mechanisms",
        "Token Value Accrual Models",
        "Token Value Proposition",
        "Token Velocity",
        "Tokenized Risk Instruments",
        "Tokenized Value",
        "Tokenomic Value Accrual",
        "Tokenomics and Value Accrual Mechanisms",
        "Tokenomics Collateral Value",
        "Tokenomics Value Accrual Mechanisms",
        "Total Position Value",
        "Total Value at Risk",
        "Total Value Locked",
        "Total Value Locked Security Ratio",
        "Tradeable Liquidity",
        "Trading Volume",
        "Trend Forecasting Security",
        "TWAP Security Model",
        "Underlying Asset Value",
        "User-Centric Value Creation",
        "UTXO Model Security",
        "Validator Extractable Value",
        "Validator Incentives",
        "Validium Security",
        "Value Accrual Analysis",
        "Value Accrual Frameworks",
        "Value Accrual in DeFi",
        "Value Accrual Mechanism",
        "Value Accrual Mechanism Engineering",
        "Value Accrual Moat",
        "Value Accrual Models",
        "Value Accrual Strategies",
        "Value Accrual Transparency",
        "Value at Risk Adjusted Volatility",
        "Value at Risk Alternatives",
        "Value at Risk Analysis",
        "Value at Risk Application",
        "Value at Risk Computation",
        "Value at Risk for Gas",
        "Value at Risk for Options",
        "Value at Risk Limitations",
        "Value at Risk Margin",
        "Value at Risk Methodology",
        "Value at Risk Metric",
        "Value at Risk Models",
        "Value at Risk per Byte",
        "Value at Risk Realtime Calculation",
        "Value at Risk Security",
        "Value at Risk Simulation",
        "Value at Risk Tokenization",
        "Value at Risk VaR",
        "Value at Stake",
        "Value Capture",
        "Value Capture Mechanisms",
        "Value Consensus",
        "Value Determination",
        "Value Exchange",
        "Value Expression",
        "Value Extraction Mechanisms",
        "Value Extraction Mitigation",
        "Value Extraction Optimization",
        "Value Extraction Strategies",
        "Value Extraction Techniques",
        "Value Flow",
        "Value Fluctuations",
        "Value Foregone",
        "Value Function",
        "Value Generation",
        "Value Heuristics",
        "Value Leakage",
        "Value Leakage Quantification",
        "Value Locked",
        "Value Redistribution",
        "Value Return",
        "Value Secured Threshold",
        "Value Transfer",
        "Value Transfer Architecture",
        "Value Transfer Assurance",
        "Value Transfer Friction",
        "Value Transfer Mechanisms",
        "Value Transfer Protocols",
        "Value Transfer Risk",
        "Value Transfer Systems",
        "Value-at-Risk Adaptation",
        "Value-at-Risk Calculations",
        "Value-at-Risk Calibration",
        "Value-at-Risk Capital",
        "Value-at-Risk Capital Buffer",
        "Value-at-Risk Encoding",
        "Value-at-Risk Framework",
        "Value-at-Risk Frameworks",
        "Value-at-Risk Inaccuracy",
        "Value-at-Risk Liquidation",
        "Value-at-Risk Proofs",
        "Value-at-Risk Proofs Generation",
        "Variance-Covariance",
        "Vega",
        "Vega Sensitivity",
        "Yield Aggregator Security",
        "Yield Farming Insurance",
        "Zero Knowledge Proofs",
        "Zero-Knowledge Risk Proofs",
        "ZK Rollup Validity Proofs",
        "ZK-Proof of Value at Risk"
    ]
}
```

```json
{
    "@context": "https://schema.org",
    "@type": "WebSite",
    "url": "https://term.greeks.live/",
    "potentialAction": {
        "@type": "SearchAction",
        "target": "https://term.greeks.live/?s=search_term_string",
        "query-input": "required name=search_term_string"
    }
}
```


---

**Original URL:** https://term.greeks.live/term/value-at-risk-security/
