返回顶部
g

game-theory

Advanced game theory analysis for crypto protocols, DeFi mechanisms, governance systems, and strategic decision-making. Use when analyzing tokenomics, evaluating protocol incentives, predicting adversarial behavior, designing mechanisms, or understanding strategic interactions in web3.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
1,937
下载量
5
收藏
概述
安装方式
版本历史

game-theory

# Game Theory for Crypto Strategic analysis framework for understanding and designing incentive systems in web3. > "Every protocol is a game. Every token is an incentive. Every user is a player. Understand the rules, or become the played." ## When to Use This Skill - Analyzing tokenomics for exploits or misaligned incentives - Evaluating governance proposals and voting mechanisms - Understanding MEV and adversarial transaction ordering - Designing auction mechanisms (NFT drops, token sales, liquidations) - Predicting how rational actors will behave in a system - Identifying attack vectors in DeFi protocols - Modeling liquidity provision strategies - Assessing protocol sustainability ## Core Framework ### The Five Questions For any protocol or mechanism, ask: 1. **Who are the players?** (Users, LPs, validators, searchers, governance token holders) 2. **What are their strategies?** (Actions available to each player) 3. **What are the payoffs?** (How does each outcome affect each player?) 4. **What information do they have?** (Complete, incomplete, asymmetric?) 5. **What's the equilibrium?** (Where do rational actors end up?) ### Analysis Template ```markdown ## Protocol: [Name] ### Players - Player A: [Role, objectives, constraints] - Player B: [Role, objectives, constraints] - ... ### Strategy Space - Player A can: [List possible actions] - Player B can: [List possible actions] ### Payoff Structure - If (A does X, B does Y): A gets [payoff], B gets [payoff] - ... ### Information Structure - Public information: [What everyone knows] - Private information: [What only some players know] - Observable actions: [What can be seen on-chain] ### Equilibrium Analysis - Nash equilibrium: [Stable outcome where no player wants to deviate] - Dominant strategies: [Strategies that are always best regardless of others] - Potential exploits: [Deviations that benefit attackers] ### Recommendations - [Design changes to improve incentive alignment] ``` ## Reference Documents | Document | Use Case | |----------|----------| | [Nash Equilibrium](references/nash-equilibrium.md) | Finding stable outcomes in strategic interactions | | [Mechanism Design](references/mechanism-design.md) | Designing systems with desired equilibria | | [Auction Theory](references/auction-theory.md) | Token sales, NFT drops, liquidations | | [MEV Game Theory](references/mev-strategies.md) | Adversarial transaction ordering | | [Tokenomics Analysis](references/tokenomics-analysis.md) | Evaluating token incentive structures | | [Governance Attacks](references/governance-attacks.md) | Voting manipulation and capture | | [Liquidity Games](references/liquidity-games.md) | LP strategies and impermanent loss | | [Information Economics](references/information-economics.md) | Asymmetric information and signaling | ## Quick Concepts ### Nash Equilibrium A state where no player can improve their payoff by unilaterally changing strategy. The "stable" outcome of a game. **Crypto application:** In a staking system, Nash equilibrium determines the stake distribution across validators. ### Dominant Strategy A strategy that's optimal regardless of what others do. **Crypto application:** In a second-price auction, bidding your true value is dominant. ### Pareto Efficiency An outcome where no one can be made better off without making someone worse off. **Crypto application:** AMM fee structures try to be Pareto efficient for traders and LPs. ### Mechanism Design "Reverse game theory" - designing rules to achieve desired outcomes. **Crypto application:** Designing token vesting schedules to align long-term incentives. ### Schelling Point A solution people converge on without communication. **Crypto application:** Why certain price levels act as psychological support/resistance. ### Incentive Compatibility When truthful behavior is optimal for participants. **Crypto application:** Oracle designs where honest reporting is the dominant strategy. ### Common Knowledge Everyone knows X, everyone knows everyone knows X, infinitely recursive. **Crypto application:** Public blockchain state creates common knowledge of balances/positions. ## Analysis Patterns ### Pattern 1: The Tragedy of the Commons **Structure:** Shared resource, individual incentive to overuse, collective harm. **Crypto examples:** - Gas price bidding during congestion - Governance token voting apathy - MEV extraction degrading UX **Solution approaches:** - Harberger taxes - Quadratic mechanisms - Commitment schemes ### Pattern 2: The Prisoner's Dilemma **Structure:** Individual rationality leads to collective irrationality. **Crypto examples:** - Liquidity mining mercenaries (farm and dump) - Race-to-bottom validator fees - Bridge security (each chain wants others to secure) **Solution approaches:** - Repeated games (reputation) - Commitment mechanisms (staking/slashing) - Mechanism redesign ### Pattern 3: The Coordination Game **Structure:** Multiple equilibria, players want to coordinate but may fail. **Crypto examples:** - Which L2 to use? - Token standard adoption - Hard fork coordination **Solution approaches:** - Focal points (Schelling points) - Sequential moves (first mover advantage) - Communication mechanisms ### Pattern 4: The Principal-Agent Problem **Structure:** One party acts on behalf of another with misaligned incentives. **Crypto examples:** - Protocol team vs token holders - Delegates in governance - Fund managers **Solution approaches:** - Incentive alignment (token vesting) - Monitoring (transparency) - Bonding (skin in game) ### Pattern 5: Adverse Selection **Structure:** Information asymmetry leads to market breakdown. **Crypto examples:** - Token launches (team knows more than buyers) - Insurance protocols (risky users more likely to buy) - Lending (borrowers know their risk better) **Solution approaches:** - Signaling (lock-ups, audits) - Screening (credit scores, history) - Pooling equilibria ### Pattern 6: Moral Hazard **Structure:** Hidden action after agreement leads to risk-taking. **Crypto examples:** - Protocols with insurance may take more risk - Bailout expectations encourage leverage - Anonymous teams may rug **Solution approaches:** - Monitoring and transparency - Incentive alignment - Reputation systems ## Common Crypto Games ### The MEV Game **Players:** Users, searchers, builders, validators **Key insight:** Transaction ordering is a game; users are often the losers See: [MEV Strategies](references/mev-strategies.md) ### The Liquidity Game **Players:** LPs, traders, arbitrageurs **Key insight:** Impermanent loss is the cost of being adversely selected against See: [Liquidity Games](references/liquidity-games.md) ### The Governance Game **Players:** Token holders, delegates, protocol team **Key insight:** Rational apathy + concentrated interests = capture See: [Governance Attacks](references/governance-attacks.md) ### The Staking Game **Players:** Stakers, validators, delegators **Key insight:** Security budget must exceed attack profit See: [Tokenomics Analysis](references/tokenomics-analysis.md) ### The Oracle Game **Players:** Data providers, consumers, attackers **Key insight:** Profit from manipulation must be less than cost See: [Mechanism Design](references/mechanism-design.md) ## Red Flags in Protocol Design ### Tokenomics Red Flags - Insiders can sell before others (vesting asymmetry) - Inflation benefits few, dilutes many - No sink mechanisms (perpetual selling pressure) - Rewards without risk (free money = someone else paying) ### Governance Red Flags - Low quorum thresholds (minority capture) - No time delay (flash loan attacks) - Token voting only (plutocracy) - Delegates with no skin in game ### Mechanism Red Flags - First-come-first-served (bot advantage) - Sealed bids without commitment (frontrunning) - Rebates/refunds (MEV extraction) - Complex formulas (hidden exploits) ## Advanced Topics ### Repeated Games and Reputation Single-shot games often have bad equilibria. Repetition enables cooperation through: - Trigger strategies (cooperate until defection) - Reputation building (costly to destroy) - Future value (patient players cooperate more) **Crypto application:** Why anonymous actors behave worse than doxxed teams. ### Evolutionary Game Theory Strategies that survive competitive selection. Relevant for: - Which protocols survive long-term - Memetic competition between narratives - Bot strategy evolution ### Bayesian Games Games with incomplete information. Players have beliefs about others' types. **Crypto application:** Trading with unknown counterparties, evaluating anonymous teams. ### Cooperative Game Theory When players can form binding coalitions. **Crypto application:** MEV extraction coalitions, validator cartels, governance blocs. ### Algorithmic Game Theory Computational aspects of game theory. **Crypto application:** On-chain game computation limits, gas-efficient mechanism design. ## Methodology ### Step 1: Model the Game - Identify all players (including those not obvious) - Map complete strategy spaces - Define payoff functions precisely - Specify information structure ### Step 2: Find Equilibria - Check for dominant strategies - Compute Nash equilibria - Identify Pareto improvements - Consider trembling-hand perfection ### Step 3: Stress Test - What if players collude? - What if new players enter? - What if information leaks? - What if parameters change? ### Step 4: Recommend - Mechanism changes to improve equilibrium - Monitoring to detect deviations - Parameter bounds to maintain stability ## Resources ### Foundational Texts - "Theory of Games and Economic Behavior" - von Neumann & Morgenstern - "A Beautiful Mind" (Nash's life, accessible intro) - "The Strategy of Conflict" - Schelling - "Mechanism Design Theory" - Myerson (Nobel lecture) ### Crypto-Specific - "Flash Boys 2.0" - MEV paper - "SoK: DeFi Attacks" - Systemization of DeFi exploits - "Clockwork Finance" - MEV and mechanism design - Paradigm research blog ### Tools - Nashpy (Python game theory library) - Gambit (game theory software) - Agent-based modeling frameworks

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 game-theory-1776379407 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 game-theory-1776379407 技能

通过命令行安装

skillhub install game-theory-1776379407

下载 Zip 包

⬇ 下载 game-theory v1.0.0

文件大小: 35.3 KB | 发布时间: 2026-4-17 16:07

v1.0.0 最新 2026-4-17 16:07
Initial release providing advanced game theory analysis tools for crypto and web3 protocols:

- Strategic frameworks for analyzing tokenomics, governance, MEV, auctions, and incentive systems.
- Analysis templates and core concepts (Nash equilibrium, mechanism design, Schelling points, etc.) tailored to crypto use cases.
- Detailed common patterns (Tragedy of the Commons, Prisoner’s Dilemma, Moral Hazard) with DeFi and governance examples.
- Reference documents for deeper study of game-theoretic models in crypto.
- Practical guidance for identifying red flags and improving protocol incentive alignment.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部