The Good Tech Companies - Wildcat: Undercollateralized Credit Expansion for Fun and Profit 2.0

Episode Date: December 27, 2024

This story was originally published on HackerNoon at: https://hackernoon.com/wildcat-undercollateralized-credit-expansion-for-fun-and-profit-20. Uncollateralized lending... is the future of DeFi. Learn how Wildcat Finance is bringing undercollateralized loans onchain and making DeFi accessible to users. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content about #defi, #ethereum-defi, #ethereum, #decentralized-finance, #defi-solutions, #ethereum-blockchain, #2077-research, #good-company, and more. This story was written by: @2077research. Learn more about this writer by checking @2077research's about page, and for more stories, please visit hackernoon.com. Un(der)collateralized lending is a billion-dollar industry responsible for fueling much of the world's growth today. Despite the appeal of undercollateralized loans, the decentralized finance (DeFi) has only supported overcollateralized lending so far. Wildcat Finance fixes this problem by introducing a secure, sufficiently decentralized, and efficient market for taking and providing undercollateralized loans onchain.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. Wildcat. Under collateralized credit expansion for fun and profit 2.0, by 2077 research, a huge amount of crypto's valuation is due to the extraordinary success of the decentralized finance DeFi industry. By leveraging the trustless and immutable nature of blockchains we have crafted different composable financial services that improve on traditional finance, trad-fi, products. Today, we have stablecoins to rival global banking and foreign exchange, decentralized exchanges and automated market makers, AMMs, to rival traditional brokerage and market making, and on-chain yield derivatives to rival traditional derivatives.
Starting point is 00:00:44 We've also created a plethora of value-bearing assets that provide better ROI than traditional investment vehicles. However, we haven't been able to replicate credit systems and fractional reserve banking to a satisfiable extent. These two primitives underpin the global financial system and have played a key role in the relative success of modern-day capitalism. There's little doubt that the development of proper credit rails backed by a centralized reputation scoring system will lead to even more growth and potentially take DeFi mainstream. We just have to do it without all the crime and bear market-inducing financial blowups this time. In this article, we present Wildcat Finance, a protocol that allows select borrowers to
Starting point is 00:01:25 offer undercollateralized yield opportunities to lenders at the former's discretion. It's quite far from the dream of undercollateralized credit rails for end users, but we believe it is very much essential for select use cases. More importantly, we believe that Wildcat's architecture and innovations are a massive leap in the journey to bringing credit markets and unsecured loans on-chain. An overview of traditional credit and money markets. Credit is the spine of civilization access to un, der, secured debt has allowed individuals, businesses, industries, and nation states to benefit from the global banking system for centuries. However, the problem facing this entire setup is well summarized in this scene from the classic Game of Thrones series, where Bronn asks what happens if he refuses to pay back a loan from
Starting point is 00:02:09 Tyrion. Bronn is intuiting about the problem credit has faced from inception, debtors defaulting on their obligations. In the past this was extensively circumvented by the lender making sure they only lent when they had some leverage, on the borrower for example, that they were more powerful and could obtain their funds in a forceful manner if it came to that. As Tyrion explained in the scene, it wasn't unusual for lenders to possess or have the means to purchase armies beyond that of their ruler. If they feel their debt is at risk, they could simply pay for the throne to be seized in a rebellion. One way or another, lenders always get their gold back. In more modern times we aren't that outrightly barbaric. We've witnessed the rapid expansion of a worldwide banking standard, aided by international credit rails, and backed by all sorts of multilateral deals and pacts.
Starting point is 00:02:59 To this end, consumer credit has taken on a new form with credit scores. Credit bureaus are granted access to the profile of customers of the financial sector. That data is then assessed using various models, such as the FICO model, to produce a score that represents the likelihood of an individual to repay a debt. This is all great but there are two pain points that persist due to the unreliability of the underlying architecture, securing the financial data of consumers. The offerings of the better credit bureaus and their customers being siloed to the west. Let's not kid ourselves, the first is a persistent issue that carries into crypto.
Starting point is 00:03:35 Until we have fully thought out cryptographic attestation models, the occurrence of leaks and oopsies are likely a matter of time in any case. The good news is that we're getting there with web proofs. But solving the second problem is the entire point of DeFi borderless transactions and composability. In the following section we will provide an overview of how credit has fared in crypto so far. The wild west, but it's set in a dark forest. The entire point of decentralized finance is coordinated financial disintermediation the elimination of middlemen and centralized parties who are usually responsible for ensuring an opaque system is functioning as intended. Users do not have to wholly place their trust in such entities when they opt into using DeFi protocols. They can simply verify it is all
Starting point is 00:04:19 working as intended because every on-chain action is transparent and immutable. A second benefit that comes from the settlement of DeFi on blockchains. There is virtually no limits to who can be your counterparty. This is evident in the success of payment giants such as Circle, Tether, and the more native Liquity Protocol. It's a 24-7 party and everyone's invited regardless of geographical limitations. This notion of borderless trust elimination is entirely opposite to the very essence of traditional credit and money markets, where trust is essential and conditionally rated at every point of interaction. To overcome this clash of ideals, DeFi protocols like Aave and Compound introduced over-collateralized, peer-to-pool loans as the
Starting point is 00:05:00 default. Under this arrangement, the borrower loses a higher value of collateral if they choose to default on their loan's term. These features served as training wheels that allowed the growth of yield anti-IELD derivatives in DeFi's conceptual era but we can do more with better trust models. We must do more if DeFi is to become more useful to the average Joe. As we discussed in the previous section, traditional credit is heavily reliant in borrower credibility and reputation, assessed via credit score. While in-chain reputation scoring remains a formidable task due to the pseudonymity of blockchains and the ability of users to simply switch profiles, this feature has been replicated to an extent by various providers such as
Starting point is 00:05:41 Accountable and Credora. These providers offer this data to applications which seek to offer under collateralized loans to select participants. This is a great feat overall, but it still faces the challenges we previously outlined. For example, crypto users have the ability to possess multiple identities and profiles which they may wish to not coalesce. A proper reputation system has to take the entirety of a single user's identities into consideration, which makes existing on-chain credit systems susceptible to failures. The difficulty of tracking creditworthiness in crypto contributed to the Alameda FTX saga that rocked the crypto industry in 2022. No one else but Alameda and FTX had the full perspective of
Starting point is 00:06:22 their financial situation, which allowed them to misrepresent their books to lenders and users. Alameda wasn't the only casualty in the crisis that rocked crypto's nascent unsecured lending industry. Other high-profile casualties were Celsius, Three Arrows Capital, 3AC, and orthogonal trading to name a few. The 2021-2022 crises essentially heralded the end of crypto under collateralized credit before it even had a chance to grow. A second, milder criticism of reputation systems in crypto is that they are essentially regressive. This is due to the fact that trust is outsourced to a single entity in the worst case, presenting a non-trivial attack vector.
Starting point is 00:07:02 What happens if a provider faces a security incident, critics typically ask. It's also important to note that this risk vector doesn't disappear when trust IS distributed by using data from various providers. There is still a lot of room to improve undercollateralized lending, rather than letting it morph into its traditional analog. After all, we intend for these systems to be at the very least viable alternatives to their traditional counterparts. The consensus is that we've barely even grazed the surface of what is possible, and Wildcat changes this. Wildcat. Trust, but verify. Wildcat's novel attempt to improving on-chain undercollateralized credit involve a staking-a-see-all, non-intrusive
Starting point is 00:07:42 approach to credit arrangements, while granting borrowers a considerable amount of leeway to access capital as they please. The protocol is only involved in the first stage, assessing borrower credibility. Beyond that everything else is processed based on the parameters defined by a borrower and opted into by a lender. Paraphrasing their seminal white paper, Wildcat permits ratified borrowers to establish fixed-rate on-chain credit facilities, the collateral of which can be partially withdrawn for the borrowers' purposes. Counterparty selection eyes entirely up to borrowers, who are expected to optimize their lender set to fit the jurisdiction in which they reside, amongst other things, without impeding too much on their obtainable credit lines. This is all also backed by Wildcat's
Starting point is 00:08:26 approach to credit quagmires, the protocol is designed to integrate legal guardrails through almost every relevant aspect and not so surprising fact, given Wildcat's founder is a well-rounded law aficionado. While relying on traditional legal systems to resolve disputes marries eyebrows, we contend that crypto is already moving beyond the infamous code is law, and Wildcat's approach as a signed crypto is ready to interact with the real world. In the following subsections, we will now evaluate some of Wildcat V1's notable features under the optics of the protocol, its borrowers and lenders. The Wildcat Protocol At a glance, the Wildcat Protocol consists of the following components.
Starting point is 00:09:10 The ARCH controller is a protocol-affiliated multisig tasked with ensuring that only permitted borrowers can deploy vaults via any specified controller. The conditions of its permissibility are mostly off-chain and dependent on the ability of a borrower to pass the required checks. The Sentinel The Sentinel is a second protocol affiliated multisig that is responsible for dealing with issues involving jurisdictional legalities and sanctions. It is extensively able to move a lender's entire position to an auxiliary escrow contract, such as in the case that it detects the associated address is on a list of sanctioned addresses. The Sentinel contract utilizes Chainalysis's service to periodically ensure that lenders across deployed vaults are unsanctioned. In the case that a lender is
Starting point is 00:09:50 flagged, the contract calls an excision function within the associated vault, causing the deployment of the aforementioned auxiliary contract and the transfer of the lender's position to this contract. The borrower is expected to immediately settle the lender's position to this contract. The borrower is expected to immediately settle the lender's position to this contract, and the funds are held there until the lender resolves the issue under the corresponding jurisdiction. The controllers The controllers are a set of contracts responsible for handling vault access permissions for both borrowers and lenders. They are essentially a representation of the borrower and the logic they implement for their interactions with lenders. These contracts contain the borrower's address, which is permitted their interactions with lenders. These contracts contain
Starting point is 00:10:25 the borrower's address, which is permitted by the ARCH controller to deploy vaults, the mechanism for the lender selection process, the sanity check logic for a vault's parameters during deployment, the mechanisms for altering a vault's parameters post-deployment, the factory. The factory contains the logic of a template vault which is used to approve, reject the parameters proposed by a borrower during vault deployment. They are responsible for curtailing borrower excesses during the vault creation phase. The Vault The Vault is where most of the magic happens. Lenders deposit their assets according to parameters defined by the borrower and subject to the Controller and Sentinel contracts, and are then issued interest-accruing debt tokens. The Borrower The Borrower and subject to the controller and sentinel contracts and are then issued interest accruing debt tokens. The borrower the borrower is able to set up permissioned vaults using the
Starting point is 00:11:09 following parameters. The asset they want to borrow which could be any ERC20 token they desire. The reserve ratio for every vault is defined by the borrower at creation and represents the minimum amount of lenders deposit the vault must always hold to be considered healthy. A grace period is also specified to represent the maximum amount of time a vault can remain unhealthy, i.e. below its reserve ratio, before an annualized delinquency rate is charged to the borrower's position. The maximum capacity of a vault, i.e. its debt ceiling, is defined by the borrower based on their needs and can be arbitrarily adjusted subject to the lender's agreement. The interest rate for a vault is a static rate, since the arrangement takes on the form of perpetual duration loans. It is implicitly
Starting point is 00:11:55 agreed upon by both parties when the lender deposits into the vault and can be adjusted following new agreements. The withdrawal cycle, which is the term's duration, at the end of which lenders can redeem their deposit and interest prorated, depending on how much of the collateral has been returned by the lender. Borrowers are entirely responsible for vetting their counterparties. They maintain a list of eligible lender addresses per controller, which represents parties with whom they have reached an off-chain agreement beforehand. This list can be altered as they please to add or remove lenders. Lender addition is expected to be preceded by sufficient due diligence and lender removal must be followed by the satisfaction of the borrower's debt obligation
Starting point is 00:12:34 towards the former. Borrowers also have the ability to deprecate a vault by reducing the APR to zero and satisfying all their outstanding obligations to the vault's lenders. These obligations are specified by the lender, an important agent in the Wildcat protocol we analyze subsequently. The lender the experience for lenders remains mostly the same as in over-collateralized money markets, except that the ability to lend is a permissioned role dependent in the borrower's approval. Lenders also have the option to sign an agreement which outlines the conditions of a default and how asset retrievals are top receipt under these conditions. This feature is a failsafe to allow direct jurisdictional intervention in cases where a borrower pulls an Alameda or A3AC. If you know, you know. To bring it all together,
Starting point is 00:13:20 with a bunch of sketches, let us assume we have a borrower, Alice, and a lender, Bob. These are some of the actions they are expected to carry out while using Wildcat. 1. Alice approaches the Wildcat team to be verified as a borrower. The processes they would have to pass through depend on various factors, the most important being the residents of their business. If they pass the required checks, they can proceed to create a market using the aforementioned variables. 2. Bob can then approach Alice via a provided channel to submit a request to Beallode to deposit to the latter's market. Alice will grant them the ability to deposit if they pass the required checks, if not they are ghosted. 3. If Bob is granted access to the market,
Starting point is 00:14:02 they can proceed to deposit the underlying asset. The protocol automatically mints them a corresponding quantity of market tokens which represent their position, capital plus interest. 4. When Bob wishes to exit their position, either partially or fully, they submit a withdrawal request and burn the amount of market tokens they would like to receive. The protocol begins a withdrawal cycle and notifies Alice of their request. The burning, or not, of Bob's market tokens depends on the availability of sufficient reserves to handle their request. If the reserves are sufficient, all their market tokens are burned, if not only the quantity satisfiable by the reserves are burned,
Starting point is 00:14:39 and the rest is marked as expired. The withdrawal of this expired request is then deferred to a later time when Alice has effective liar collateralized the market. 5. If a second lender, Chris, was onboarded at a previous time and now wishes Tio withdraw alongside Bob, their request is added to Bob's to be settled at the end of the withdrawal cycle. If the reserves cannot satisfy both of their requests fully, the available amount is distributed pro rata and their leftover requests are marked as expired to be processed at a later withdrawal cycle when Alice has returned the deposits to the market. Wildcat v2. Less trust for double the verification after almost a year on mainnet, holding steady at a TVL of $2.9 million, and with more than $30 million in processed loans, Wildcat is already undergoing
Starting point is 00:15:27 some changes aimed at ease of use. The devs are doing something. A notable feature of Wildcat V2 is the addition of hooks for various purposes, enabling a more modular architecture. For the uninitiated, hooks are conditional helper contracts that constrict, expand a particular logic so that it is more granular beyond the protocol's default offering. Wildcat V2 hooks help borrowers to define what conditions the address submitted by a lender must satisfy in order to be granted the ability to deposit their assets to a market. Some of the areas which benefit from the modularization of the Wildcat protocol are, counterparty selection. Counterparty selection in Wildcat V1 was a manual process on the borrower's end. Addresses would only interact with a market if the borrower had added them to a set of allowed addresses stored in the controller contract for
Starting point is 00:16:14 that market. Thesis conditional on the lender who provides the address, passing the checks required of them by the borrower in a manual process. This was a considerable friction point due to the logistics involved on either party's end, and we're all very busy people after all. Wildcat V2 optimizes this experience by placing the access policies for every market behind hooks. In this way, lender selection is almost entirely automated for borrowers who wish it so. A borrower could set up their market so that it can accept deposits from Onyadress that has a certain credential, such as NFTs and or SBTs, zero-knowledge proofs of access to certain sites, or even off-chain credentials from KYC, KYB services. The protocol
Starting point is 00:16:58 would then automatically grant access to any address which satisfies the condition. Term durations by default, Wildcat loans are perpetual duration loans, meaning that a lender could choose to opt out of the arrangement at any time by submitting a withdrawal request. This could disrupt the intentions and plans of the borrower, as they may not be done with the lender's capital at this time. Wildcat v2 allows borrowers to define time-restricted markets where lenders cannot place a withdrawal claim for a specified minimum period. This allows the implementation of closed, fixed-term loans, after which they convert back to perpetuals. Minimum deposit requirements Most borrowers may choose to impose a minimum deposit amount on their lenders so that they can reach their
Starting point is 00:17:40 maximum capacity with less parties involved or for whatever other reason. In Wildcat V1 this could only be implemented via a backroom handshake deal, where the borrower bargains with lenders before they deposit. However, the introduction of hooks in Wildcat V2 will allow the enforcement of a minimum asset quantity at the point of deposit. Playing to win, the risks and contingencies of undercollateralized lending. Like everything else, the use of the Wildcat protocol in any instance comes with some risks, the most obvious being borrower defaults. Wildcat makes it so that undercollateralization risk is entirely dependent on the lender's perception of the borrower. How good is their social reputation? To be fair, SBF has shown the risks of over-indexing on social reputation.
Starting point is 00:18:25 Someone being perceived as, based, isn't enough reason to hand over your capital to them. How risk-averse are their observable strategies? How well have they fared since their operation? All these and more are questions that must be considered by a lender before they try to get in contact with a borrower and give out their capital. Most of the answers can be deduced from various reputation systems and other attestation methods such as proof-of-reserve dashboard reports. Better systems with verifiable compute are possibly the next step because verification is still very much necessary regardless of trust levels. No one wants to face a 1001 days in the life of a turkey scenario where borrowers suddenly stop being able to satisfy
Starting point is 00:19:05 their obligations due to the lack of timely insight and information asymmetry between counterparties until then we must make the best of what we have this is not a wildcat native issue though the reality of assigning trust scores is that reputation lags horribly in comparison to crypto's volatility a single wick in the wrong direction might cause a borrower to become deficient and lead to a chain of insolvencies as we witnessed throughout 2022. The good news here is that Wildcat brings it all out to the open from the onset and allows the legal arm to do its thing. Defaults? Simply cite the MLA and sue for your settlement. Your counterparty violated a signed agreement, contract, better call your
Starting point is 00:19:45 lawyer. The simple idea is that jurisdictional bodies are very much willing to intervene in any case of a violation of agreement, it's essentially free money. So we simply leave it up to them, rather than argue to what extent CODIS law, it isn't arguable anyway in this case. Concerning smart contract risks. Wildcat is still part defy even if extensive liper mission and defy is infamous for its contract exploits however wildcat has taken a tight approach to security that includes integrations with spherics an on-chain security solution spherics improves wildcats robustness against breaches by performing checks to validate the logic of pre and post post-function calls made to
Starting point is 00:20:25 any of the protocol's contracts. This effectively creates an iron dome around the protocol, as the Wildcat team describes it. Additionally, Wildcat's contracts have also undergone audits by security researchers and multiple public code for RENA reviews. We're tempted to describe Wildcat as having a, mandate of heaven, level of security, but this is DeFi and we shouldn't forget Euler a formally verified lending protocol with 6 auditors suffered one of the most dramatic hacks to date. Nonetheless, prospective users will appreciate the effort Wildcat has made to prevent zero-day exploits and keep funds safe. Final thoughts, while Wildcat isn't the only provider of undercollateralized credit,
Starting point is 00:21:05 its unique approach across the board sets it out amongst its competitors. Their collaboration with Wintermute is also not to be ignored, especially since Wintermute isn't known for not dominating whatever fields they play in. The thesis is simple. Wildcat will make undercollateralized credit cool again and usher in productive risk-taking that will ultimately define a new era for all of crypto. This is on-chain banking, but better. Authors note. A version of this article was previously published here. Thank you for listening to this Hackernoon story, read by Artificial Intelligence. Visit hackernoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.