Files
cross-chain-pmm-lps/docs/10-behavioral-stability-analysis.md
2026-03-02 12:14:07 -08:00

4.1 KiB
Raw Permalink Blame History

Behavioral Stability Analysis

From architecture to behavioral stability: what the two-layer + PMM stack enables, how the three metrics interact, what to simulate first, and where the system can break.


1. What you have systemically

Layer A — Design graph

  • “What could route”: all 11 chains, all potential cW* pools.
  • Lets you simulate future expansion before deploying.
  • Prevents accidental routing exposure when adding pools.

Layer B — Deployment graph

  • “What actually routes”: defined by config/deployment-status.json.
  • Kill switch: remove a pool from deployment-status to disable routing.
  • Acts as exposure registry, routing firewall, expansion throttle.

That separation is central-bank-grade control: programmable monetary corridor, not just liquidity.


2. PMM depth as state variable

Depth:

D = D_0 · min(1, I_T / I_T^*)

This gives:

  • Self-limiting router exposure: drain → D drops → marginal rate worsens.
  • Endogenous slippage widening: no ad-hoc circuit breaker needed for normal stress.
  • Routers drain you → marginal rate worsens → routers leave.

So the mechanism is mathematically stabilizing.


3. Three metrics — economic interpretation

Metric Economic meaning Target / risk
Router capture ratio Are you the primary stable swap venue? High capture = revenue + inventory risk. Low = safer peg, less fee income.
Inventory churn Stress metric: Σ|ΔI_T| / I_T^* per epoch Healthy: 0.30.8 normal, <1.5 stress. If churn >1.52.0, bot intervenes constantly.
Intervention cost “Monetary defense budget”: bridge/mint/burn to keep peg Linear in volume → OK. Exponential during topology switch → danger.

4. What to simulate first

A) Hub-only across all 11 chains

One PMM per cW per chain vs hub.

Questions:

  • Does router capture stabilize around 1030%?
  • Does churn remain <1 under normal volume?
  • Is intervention frequency periodic rather than constant?

This is the baseline.

B) Full-quote on chains 1, 56, 137

Enable extra quotes (USDT, DAI, etc.) only on Ethereum, BSC, Polygon.

Watch for:

  • Multi-hop reflexivity
  • Increased churn
  • Increased router capture
  • Nonlinear intervention cost

Rule of thumb: If churn increases >50% vs hub model → do not deploy full-quote.

C) Bridge shock scenario

Inject e.g.:

  • 5% supply migration 137 → 56 over 24 blocks, or
  • 10% whale exit on one chain

Measure:

  • Time to re-center peg
  • Total bot injection required
  • Peak deviation

Interpretation:

  • Damped oscillator → good.
  • Resonant feedback loop → bad.

5. Where it can break (advanced)

Cross-chain arbitrage loops

If bridge cost < slippage difference, routers do: Chain A → bridge → Chain B → swap → bridge back.

Model must include: bridge latency + probabilistic settlement delay. Otherwise risk is underestimated.

k too tight globally

Default k = 0.1, fee = 25 bps. If inventory target is high and k is tight, you can become the cheapest stable venue on thin chains.

Simulate: k ∈ {0.05, 0.1, 0.2}. Often k = 0.150.2 is safer cross-chain.

EUR tokens (cWEURC, cWEURT)

  • FX volatility; USD-quoted hubs; dual-source peg risk.
  • Need: slightly higher k, slightly wider band, possibly higher fee.
  • Do not treat EUR and USD tokens symmetrically.

6. System-level framing

The architecture is a multi-chain programmable monetary corridor. Each PMM pool is a localized peg defense membrane. deployment-status.json is the exposure registry, routing firewall, and expansion throttle.


7. Next steps (options)

  1. Run a synthetic 30-day stress sim and extract equilibrium metrics.
  2. Derive analytical stability conditions for k, fee, D_0.
  3. Design adaptive k control law (automatic routing dampener).
  4. Model MEV + oracle-lag attack surface.
  5. Derive safe inventory target sizing formula per chain → see 11-safe-inventory-sizing.md.