Advanced game theory analysis for crypto protocols, DeFi mechanisms, governance systems, and strategic decision-making. Use when analyzing tokenomics, evaluating protocol incentives, predicting adversarial behavior, designing mechanisms, or understanding strategic interactions in web3.
OpenClaw skills run inside an OpenClaw container. EasyClawd deploys and manages yours — no server setup needed.
Initial release providing advanced game theory analysis tools for crypto and web3 protocols: - Strategic frameworks for analyzing tokenomics, governance, MEV, auctions, and incentive systems. - Analysis templates and core concepts (Nash equilibrium, mechanism design, Schelling points, etc.) tailored to crypto use cases. - Detailed common patterns (Tragedy of the Commons, Prisoner’s Dilemma, Moral Hazard) with DeFi and governance examples. - Reference documents for deeper study of game-theoretic models in crypto. - Practical guidance for identifying red flags and improving protocol incentive alignment.
---
name: game-theory
description: Advanced game theory analysis for crypto protocols, DeFi mechanisms, governance systems, and strategic decision-making. Use when analyzing tokenomics, evaluating protocol incentives, predicting adversarial behavior, designing mechanisms, or understanding strategic interactions in web3.
metadata: {"clawdbot":{"emoji":"","homepage":"https://github.com/tedkaczynski-the-bot/game-theory"}}
---
# Game Theory for Crypto
Strategic analysis framework for understanding and designing incentive systems in web3.
> "Every protocol is a game. Every token is an incentive. Every user is a player. Understand the rules, or become the played."
## When to Use This Skill
- Analyzing tokenomics for exploits or misaligned incentives
- Evaluating governance proposals and voting mechanisms
- Understanding MEV and adversarial transaction ordering
- Designing auction mechanisms (NFT drops, token sales, liquidations)
- Predicting how rational actors will behave in a system
- Identifying attack vectors in DeFi protocols
- Modeling liquidity provision strategies
- Assessing protocol sustainability
## Core Framework
### The Five Questions
For any protocol or mechanism, ask:
1. **Who are the players?** (Users, LPs, validators, searchers, governance token holders)
2. **What are their strategies?** (Actions available to each player)
3. **What are the payoffs?** (How does each outcome affect each player?)
4. **What information do they have?** (Complete, incomplete, asymmetric?)
5. **What's the equilibrium?** (Where do rational actors end up?)
### Analysis Template
```markdown
## Protocol: [Name]
### Players
- Player A: [Role, objectives, constraints]
- Player B: [Role, objectives, constraints]
- ...
### Strategy Space
- Player A can: [List possible actions]
- Player B can: [List possible actions]
### Payoff Structure
- If (A does X, B does Y): A gets [payoff], B gets [payoff]
- ...
### Information Structure
- Public information: [What everyone knows]
- Private information: [What only some players know]
- Observable actions: [What can be seen on-chain]
### Equilibrium Analysis
- Nash equilibrium: [Stable outcome where no player wants to deviate]
- Dominant strategies: [Strategies that are always best regardless of others]
- Potential exploits: [Deviations that benefit attackers]
### Recommendations
- [Design changes to improve incentive alignment]
```
## Reference Documents
| Document | Use Case |
|----------|----------|
| [Nash Equilibrium](references/nash-equilibrium.md) | Finding stable outcomes in strategic interactions |
| [Mechanism Design](references/mechanism-design.md) | Designing systems with desired equilibria |
| [Auction Theory](references/auction-theory.md) | Token sales, NFT drops, liquidations |
| [MEV Game Theory](references/mev-strategies.md) | Adversarial transaction ordering |
| [Tokenomics Analysis](references/tokenomics-analysis.md) | Evaluating token incentive structures |
| [Governance Attacks](references/governance-attacks.md) | Voting manipulation and capture |
| [Liquidity Games](references/liquidity-games.md) | LP strategies and impermanent loss |
| [Information Economics](references/information-economics.md) | Asymmetric information and signaling |
## Quick Concepts
### Nash Equilibrium
A state where no player can improve their payoff by unilaterally changing strategy. The "stable" outcome of a game.
**Crypto application:** In a staking system, Nash equilibrium determines the stake distribution across validators.
### Dominant Strategy
A strategy that's optimal regardless of what others do.
**Crypto application:** In a second-price auction, bidding your true value is dominant.
### Pareto Efficiency
An outcome where no one can be made better off without making someone worse off.
**Crypto application:** AMM fee structures try to be Pareto efficient for traders and LPs.
### Mechanism Design
"Reverse game theory" - designing rules to achieve desired outcomes.
**Crypto application:** Designing token vesting schedules to align long-term incentives.
### Schelling Point
A solution people converge on without communication.
**Crypto application:** Why certain price levels act as psychological support/resistance.
### Incentive Compatibility
When truthful behavior is optimal for participants.
**Crypto application:** Oracle designs where honest reporting is the dominant strategy.
### Common Knowledge
Everyone knows X, everyone knows everyone knows X, infinitely recursive.
**Crypto application:** Public blockchain state creates common knowledge of balances/positions.
## Analysis Patterns
### Pattern 1: The Tragedy of the Commons
**Structure:** Shared resource, individual incentive to overuse, collective harm.
**Crypto examples:**
- Gas price bidding during congestion
- Governance token voting apathy
- MEV extraction degrading UX
**Solution approaches:**
- Harberger taxes
- Quadratic mechanisms
- Commitment schemes
### Pattern 2: The Prisoner's Dilemma
**Structure:** Individual rationality leads to collective irrationality.
**Crypto examples:**
- Liquidity mining mercenaries (farm and dump)
- Race-to-bottom validator fees
- Bridge security (each chain wants others to secure)
**Solution approaches:**
- Repeated games (reputation)
- Commitment mechanisms (staking/slashing)
- Mechanism redesign
### Pattern 3: The Coordination Game
**Structure:** Multiple equilibria, players want to coordinate but may fail.
**Crypto examples:**
- Which L2 to use?
- Token standard adoption
- Hard fork coordination
**Solution approaches:**
- Focal points (Schelling points)
- Sequential moves (first mover advantage)
- Communication mechanisms
### Pattern 4: The Principal-Agent Problem
**Structure:** One party acts on behalf of another with misaligned incentives.
**Crypto examples:**
- Protocol team vs token holders
- Delegates in governance
- Fund managers
**Solution approaches:**
- Incentive alignment (token vesting)
- Monitoring (transparency)
- Bonding (skin in game)
### Pattern 5: Adverse Selection
**Structure:** Information asymmetry leads to market breakdown.
**Crypto examples:**
- Token launches (team knows more than buyers)
- Insurance protocols (risky users more likely to buy)
- Lending (borrowers know their risk better)
**Solution approaches:**
- Signaling (lock-ups, audits)
- Screening (credit scores, history)
- Pooling equilibria
### Pattern 6: Moral Hazard
**Structure:** Hidden action after agreement leads to risk-taking.
**Crypto examples:**
- Protocols with insurance may take more risk
- Bailout expectations encourage leverage
- Anonymous teams may rug
**Solution approaches:**
- Monitoring and transparency
- Incentive alignment
- Reputation systems
## Common Crypto Games
### The MEV Game
**Players:** Users, searchers, builders, validators
**Key insight:** Transaction ordering is a game; users are often the losers
See: [MEV Strategies](references/mev-strategies.md)
### The Liquidity Game
**Players:** LPs, traders, arbitrageurs
**Key insight:** Impermanent loss is the cost of being adversely selected against
See: [Liquidity Games](references/liquidity-games.md)
### The Governance Game
**Players:** Token holders, delegates, protocol team
**Key insight:** Rational apathy + concentrated interests = capture
See: [Governance Attacks](references/governance-attacks.md)
### The Staking Game
**Players:** Stakers, validators, delegators
**Key insight:** Security budget must exceed attack profit
See: [Tokenomics Analysis](references/tokenomics-analysis.md)
### The Oracle Game
**Players:** Data providers, consumers, attackers
**Key insight:** Profit from manipulation must be less than cost
See: [Mechanism Design](references/mechanism-design.md)
## Red Flags in Protocol Design
### Tokenomics Red Flags
- Insiders can sell before others (vesting asymmetry)
- Inflation benefits few, dilutes many
- No sink mechanisms (perpetual selling pressure)
- Rewards without risk (free money = someoneRead full documentation on ClawHub