Share this article

Decentralized Exchange Maverick Rolls Out Liquidity Incentives for Price Stability

Maverick's rewards system lets token issuers target a specific price range, offering more efficient incentives than rival Curve Finance and helping pegged assets such as stablecoins, liquid staking derivatives keep their prices stable, the protocol said.

Updated May 2, 2023, 3:01 p.m. Published May 2, 2023, 1:00 p.m.
(Maverick Protocol)
(Maverick Protocol)

Decentralized exchange (DEX) platform Maverick Protocol has unveiled a novel incentive system that can help stablecoins and ether (ETH) liquid staking derivatives keep their price pegs, the protocol said in a press release on Tuesday.

The incentive system allows token issuers such as liquid staking protocols or stablecoin issuers to create so-called “boosted positions,” offering extra rewards to liquidity providers in a customized price range in Maverick’s liquidity pools.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the The Protocol Newsletter today. See all newsletters

Maverick is built around an automated market maker (AMM) algorithm, where traders can swap digital assets without any intermediary in liquidity pools. Token holders can also deploy their assets in the pools to provide liquidity for trading while earning a share of the trading fees.

Advertisement

The protocol’s latest upgrade comes as decentralized exchanges (DEX) are fiercely competing to attract traders and traffic onto their platforms as crypto investors seek decentralized trading venues after multiple blowups of centralized marketplaces and increasing regulatory stranglehold.

To do so, some DEXs offer extra rewards on top of the transaction revenues to liquidity providers to deploy their capital, such as Curve Finance’s “gauge” system. These rewards are generally paid by the token issuers in the liquidity pool.

However, “current incentive systems are too blunt,” Bob Baxley, core developer of Maverick, said.

Maverick’s tool is more efficient than existing offerings because it allows token issuers to concentrate reward payouts to a certain price range and build price walls, Baxley explained in an interview.

This can also help pegged assets such as stablecoins and liquid staking derivatives keep their prices more stable, while liquidity providers can earn additional revenue, according to the press release.

Token issuers, such as decentralized finance (DeFi) protocols or stablecoin issuers, can pay out rewards in the form of any token of their choice over a period between three and thirty days, the press release said.

For example, Lido Finance, the largest ether (ETH) liquid staking protocol and issuer of the stETH token, has already approved to deploy incentives to Maverick’s wstETH-ETH liquidity pool in May, paid out in Lido’s governance token LDO, according to a Lido governance forum post.

Advertisement

Baxley said the development would help position Maverick as the go-to marketplace for ETH liquid staking derivatives after the highly anticipated Shanghai upgrade, which allowed users to withdraw locked-up tokens from the Ethereum blockchain. Liquid staking lets investors earn staking rewards while maintaining their ability to borrow and lend with a derivative token representing their locked-up assets in staking.

Liquid staking protocols have become increasingly popular among investors and analysts forecast further growth for the sector following the Shanghai upgrade.

Mehr für Sie

Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets

Microsoft shareholders voted against adding bitcoin to its company's treasury. (Photo by Craig T Fruchtman/Getty Images)

A new report from Microsoft researchers warned of malware that could steal and decrypt users’ information from 20 of some of the most popular cryptocurrency wallets.

Was Sie wissen sollten:

  • Tech giant Microsoft shared a new report warning of malware that targets 20 of the most popular cryptocurrency wallets used with the Google Chrome extension.
  • The malware, dubbed StilachiRAT, could deploy “sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data."
  • While the malware has not been distributed widely, Microsoft did share that it has not been able to identify what entity is behind the threat.