What Is Restaking and How It Works in Crypto
Crypto

What Is Restaking and How It Works in Crypto

E
Emily Carter
· · 14 min read

What Is Restaking and How It Works Restaking has become a key topic in crypto, especially on Ethereum. If you have asked yourself what is restaking and how it...



What Is Restaking and How It Works


Restaking has become a key topic in crypto, especially on Ethereum. If you have asked yourself what is restaking and how it works, you are not alone. Restaking lets stakers reuse their staked assets or staking positions to secure extra networks or services, and earn more rewards in the process. To understand restaking, you first need a clear picture of regular staking and why restaking was created.

From staking to restaking: the basic idea

In a proof-of-stake (PoS) network, staking means locking tokens to help secure the chain. Validators or delegators stake tokens, earn rewards, and risk penalties if they misbehave. This security is paid for by inflation or fees from that network.

Restaking builds on this idea. Instead of using fresh capital to secure a new service or chain, restaking reuses existing staked positions. The same stake can back more than one protocol, under extra rules and risks. This is similar to using the same collateral to support multiple loans, which can increase returns but also increase risk.

In short, staking secures one network; restaking extends that security to extra networks or services, often called “Actively Validated Services” (AVSs) or similar names in different designs.

How restaking extends PoS security

Restaking takes the trust that a PoS chain already has and shares it with newer protocols. Instead of each project needing its own validator set, several projects can lean on the same pool of staked tokens. This shared security model is what makes restaking powerful, but also what makes its risks more interconnected.

What is restaking in simple terms?

Restaking is a crypto mechanism where stakers reuse their staked tokens or liquid staking tokens to secure additional protocols. The staker opts in to extra “slashing conditions” set by those protocols and, in return, can earn extra rewards on top of normal staking yield.

The key idea is shared security. A smaller project can “borrow” security from a large base layer, such as Ethereum, instead of building a new validator set from scratch. Restakers provide that security and get paid for the extra risk they accept.

Many restaking systems are built on Ethereum today, but the concept is general. Any PoS chain with staking and slashing can, in theory, support some form of restaking.

Restaking explained with a simple example

Imagine you stake ETH and get a liquid staking token in return. That token shows you have a valid stake on Ethereum. With restaking, you can deposit that token into a restaking protocol that secures an oracle or bridge. Your same ETH now supports Ethereum and the oracle, and you earn rewards from both, as long as the oracle rules are followed.

How restaking works step by step

While designs differ, most restaking systems follow a similar flow. Here is a high-level view of how restaking works in practice, from initial stake to earning extra rewards.

  1. You first create or hold a staking position on a PoS chain or through a liquid staking provider.
  2. You connect that position to a restaking protocol, usually by depositing a token or linking your validator.
  3. You choose one or more services, such as AVSs, that you want your stake to secure.
  4. You or your operator run any extra software that those services require.
  5. You earn extra rewards from those services, while accepting extra slashing rules and technical risk.

Each step adds both opportunity and risk. The more services a validator supports, the more complex the setup becomes, and the harder it is to track all the ways slashing can occur.

Restaking flow for validators and delegators

Validators deal with the technical side: they run nodes, install AVS clients, and keep infrastructure online. Delegators or LST holders mostly face choice risk: which restaking protocol and which AVSs they back. Both groups are tied together by the same stake, so a mistake by the validator can hurt the delegator’s position.

What is restaking and how it works for AVSs

After the user opts in, the restaking protocol connects that stake to one or more AVSs. These services can be sidechains, data availability layers, oracles, bridges, or other crypto infrastructure that needs honest validators. Each AVS defines its own conditions: what validators must do, how they are checked, and when they are slashed.

Validators or operators then run extra software for the AVSs they support. They sign messages, produce blocks, or perform checks, using the same underlying stake as collateral. If they follow the rules, they earn AVS rewards, usually paid in that AVS’s token or fees.

If a validator misbehaves under an AVS’s rules, the AVS can trigger slashing through the restaking protocol. The protocol then reduces the validator’s stake at the base layer or burns part of the LST. This is the core trade-off of restaking: higher potential yield, but more ways to get slashed.

Types of services that use restaked security

AVSs can cover many roles: they might validate rollups, check bridge messages, provide price feeds, or store data. Each role has its own failure modes. For example, a broken oracle can cause bad prices, while a broken bridge can lose funds. Restaked security is meant to keep these roles honest by putting real capital at risk.

Key components in a restaking system

To understand what is restaking and how it works at a deeper level, it helps to break down the main pieces. Different projects use different names, but the roles are similar across designs.

  • Base stakers or delegators: People who stake tokens on a PoS chain or hold LSTs.
  • Validators or node operators: Entities that run the validator software and often also run AVS software.
  • Restaking protocol: The smart contracts or framework that link base stake to extra services and manage slashing.
  • Actively Validated Services (AVSs): Protocols that need security and define extra rules and rewards.
  • Slashing contracts or mechanisms: Logic that enforces penalties when AVS rules are broken.

Together, these parts let capital from a large chain secure many smaller services. The design tries to balance incentives: AVSs get security, stakers get higher yield, and node operators get more revenue for extra work.

How these components interact in practice

In a live system, stakers and delegators choose operators, operators plug into a restaking protocol, and AVSs publish their terms. Slashing contracts sit in the middle, ready to enforce penalties. If any part fails, such as a bug in the protocol or a misconfigured node, the whole chain of trust can be stressed.

Why restaking exists: problems it tries to solve

Restaking did not appear by chance. It is a response to clear pain points in PoS ecosystems. Understanding these drivers helps explain why restaking has gained attention and capital.

First, security for new chains and services is expensive. A small project may not attract enough stake to resist attacks, especially early on. Restaking lets that project rent security from a larger base chain, which can speed up launch and improve safety.

Second, staked capital is often underused. A large share of tokens may sit in staking, earning yield but doing little else. Restaking promises to stack security uses on top of that capital, which can improve capital efficiency for the ecosystem as a whole.

Capital efficiency and shared trust

Restaking tries to make each unit of stake work harder without breaking trust. By sharing one pool of stake across many services, the system hopes to spread fixed security costs. The question for designers is how far this sharing can go before the risks outweigh the gains.

Benefits of restaking for different participants

Restaking affects several groups: stakers, AVSs, and the base chain. Each group sees different benefits, along with different risks that must be weighed carefully.

For individual stakers, the main draw is higher potential yield. Restaking can turn a single staking reward stream into multiple streams, as long as the extra risk is acceptable. Stakers may also support projects they believe in, by lending them security.

For AVSs and new protocols, restaking offers plug-in security. Instead of building a validator set from zero, they can connect to an existing pool of validators and stake. This can reduce bootstrapping time and help smaller teams focus on their core product.

Benefits for the base chain and ecosystem

The base chain may see higher staking rates and more demand for its token, as restaking makes staking more attractive. The broader ecosystem can see faster experimentation, because teams can launch services without recruiting a full validator set first. These gains, however, rely on restaking staying within safe limits.

Risks and trade-offs of restaking

Extra yield always comes with extra risk. Restaking changes the risk profile of staking in several ways. Anyone asking what is restaking and how it works should also ask how it can go wrong.

The most direct risk is extra slashing. Each AVS adds new ways to lose stake. A bug in AVS software, a misconfigured node, or a faulty slashing rule can lead to real losses. If a validator restakes across many AVSs, one error might trigger slashing across a large position.

There is also smart contract and governance risk. Most restaking systems run through complex contracts and off-chain coordination. A contract bug, an oracle failure, or a governance attack could impact stakers who never touched the AVS code themselves.

Correlated failures and hidden exposure

Because many AVSs can share the same stake, a single failure can hit many services at once. This correlation can surprise users who thought they were diversified. Hidden exposure can grow if the same operators, contracts, or oracles sit behind several AVSs that share restaked capital.

System-level concerns: does restaking affect base chain security?

Restaking can also affect the base PoS chain. Some researchers worry about correlated slashing and new attack paths. If many validators restake into the same AVSs, a single event could slash a large share of total stake at once.

This could weaken the base chain, reduce trust in staking, or cause market shocks if large amounts of tokens are slashed or sold. There is also the risk of governance capture, where a big AVS or restaking protocol gains influence over validators and, indirectly, over base chain decisions.

Because of these concerns, some projects set limits on how much stake can be restaked, or which AVSs are allowed. Design choices here will shape how safe restaking becomes over time.

Policy levers for safer restaking

Designers can use caps on exposure, conservative AVS whitelists, and stricter slashing review to keep systemic risk in check. Community oversight and clear disclosure of how much stake is restaked, and where, can also help users judge whether the system is leaning too far into shared risk.

Restaking versus liquid staking and DeFi yield farming

Restaking often gets compared with liquid staking and DeFi yield farming. These ideas overlap, but they are not the same. Understanding the difference helps you judge risk and reward more clearly.

Liquid staking gives you a token that represents a staked position. You can use that token in DeFi while your base stake keeps earning. Yield farming means using assets in DeFi pools, lending, or other strategies to earn fees or token rewards. In both cases, your base asset may not be directly at risk of extra slashing.

Restaking, in contrast, directly extends the slashing conditions tied to your stake. The base asset or LST can be cut if AVS rules are broken. This is deeper than just putting a token in a lending pool. The upside is more aligned security for AVSs; the downside is that your base capital backs more obligations.

Comparing common crypto yield approaches

The table below compares restaking, liquid staking, and yield farming at a high level. This can help you see where risks and rewards differ.

Comparison of restaking, liquid staking, and DeFi yield farming

Approach Main source of rewards Primary risk to base asset Security role
Restaking Extra AVS rewards on top of staking yield Additional slashing from AVS rules and protocol bugs Directly secures extra services with shared stake
Liquid staking Base staking rewards from PoS chain Provider smart contract and validator performance risk Secures the base PoS chain only
DeFi yield farming Fees, incentives, or token rewards from DeFi protocols Smart contract failures, liquidation, or market moves Usually no direct security role for base chain or AVSs

Each method can make sense for different users and risk levels. Restaking stands out because it ties yield directly to security duties, which can be attractive for builders who want stronger guarantees, but stressful for users who prefer simpler risk.

Practical tips before you use a restaking protocol

If you are thinking about using restaking, a few practical checks can help you manage risk. You do not need to be a developer, but you should be clear about what you sign up for.

First, read the AVS or protocol documentation. Check what actions validators must take, what can trigger slashing, and how disputes are handled. If the rules feel vague or too broad, your risk is harder to judge.

Second, look at how many AVSs a validator supports and how complex they are. More AVSs mean more chances for errors. Many users prefer a focused set of services with clear designs over a long list of experimental AVSs.

Checklist for restaking decisions

Before you restake, run through a short checklist to keep your decision grounded in facts rather than hype or fear of missing out.

Ask yourself whether you understand the slashing rules, whether you trust the operator, and how much of your total portfolio you are willing to expose. Writing these answers down can help you avoid overcommitting in a rush.

The future of restaking: what to watch

Restaking is still early. Designs, standards, and regulations are all changing. As the space grows, several trends are worth watching to understand what is restaking and how it works in real markets, not just in theory.

One area is risk management tools. These include insurance pools, conservative AVS lists, and dashboards that show how much stake is exposed where. Better transparency can help users avoid hidden concentration risks.

Another area is competition between security models. Some projects may choose shared security through restaking, while others may prefer separate validator sets or other designs. The results of real attacks, stress events, and upgrades will shape how trusted restaking becomes.

How restaking might shape PoS networks

If restaking proves safe enough, PoS networks could see a dense web of services all tied to the same trust base. If major failures happen, designers may pull back and keep restaking limited. Watching how users, validators, and AVSs react to early stress tests will show which path is more likely.

Summary: what is restaking and how it works in practice

Restaking lets stakers reuse their existing stake or liquid staking tokens to secure extra protocols, under extra slashing rules. The process links base layer security to new AVSs, which can gain strong security without building a validator set from scratch. Stakers and node operators earn extra rewards for taking on this extra risk.

The idea promises better capital efficiency and faster growth for new crypto services, but it also introduces new technical, economic, and governance risks. Anyone using restaking should understand both sides: higher yield and deeper exposure. As the ecosystem matures, the safest restaking designs will likely be the ones that keep those trade-offs clear and well managed.