2024-12-18 Update for @ChaosLabs risk parameters and including third-party migration incentives.
Title: [ARFC] Adjust Risk Parameters for Aave V2 and V3 on Polygon
Author: @ACI
Date: 2024-12-13
This proposal seeks community feedback on adjusting risk parameters for Aave V2 and V3 instances on the Polygon network. The adjustments are in response to an upcoming proposal that will significantly impact the risk profiles of bridged assets within the Polygon network.
Polygon governance is currently evaluating a proposal that would redefine the risk profile of bridged assets on the Polygon network. This change could have substantial implications for the risk profiles of Aave V2 and V3 deployments on Polygon PoS.
Historically, bridge vulnerabilities have caused the largest losses in the DeFi ecosystem, including:
The Aave ecosystem has experienced both indirect and direct impacts from bridge vulnerabilities, notably the Multichain and Harmony bridge hacks. Additionally, depositing user funds into unsafe protocols has historically resulted in significant losses. For example, the Angle Protocol deposited EURA funds into Euler a week before its hack, which caused EURA to lose its peg temporarily, impacting Aave users.
This ARFC aims to mitigate potential losses for Aave users by:
Sonic team announced a 20m$ incentives plan for their TEMP CHECK with 10% allocated for migration incentives.
The following recommendations are proposed to mitigate risk and incentivize migration from the Polygon network:
@ChaosLabs recommend the following risk parameters change:
| Deployment | Asset | Current LTV | Proposed LTV | Current RF | Proposed RF |
|---|---|---|---|---|---|
| Polygon V3 | DAI | 63% | 0% | 25% | - |
| Polygon V3 | USDC.e | 75% | 0% | 50% | 60% |
| Polygon V3 | USDT | 75% | 0% | 10% | 25% |
| Polygon V3 | USDC | 75% | 0% | 10% | 20% |
| Polygon V2 | USDC.e | 75% | 0% | 99.9% | - |
| Polygon V2 | DAI | 63% | 0% | 99.9% | - |
The ACI has not been compensated for creating this proposal.
Copyright and related rights waived via CC0.