🌍 Global Mirror — Visit original CN site →
Back to skills

Game Theory

ASecurity

Advanced game theory analysis for crypto protocols, DeFi mechanisms, governance systems, and strategic decision-making. Use when analyzing tokenomics, evaluating protocol incentives, predicting adversarial behavior, designing mechanisms, or understanding strategic interactions in web3.

33 stars
0 votes
0 copies
5 views
Added 2/10/2026
businesspythongogitsecurity

Security Analysis

A100/100

Scanned 2/12/2026

Install via CLI

$openskills install sundial-org/awesome-openclaw-skills
Download Zip
SKILL.md
---
name: game-theory
description: Advanced game theory analysis for crypto protocols, DeFi mechanisms, governance systems, and strategic decision-making. Use when analyzing tokenomics, evaluating protocol incentives, predicting adversarial behavior, designing mechanisms, or understanding strategic interactions in web3.
metadata: {"clawdbot":{"emoji":"","homepage":"https://github.com/tedkaczynski-the-bot/game-theory"}}
---

# Game Theory for Crypto

Strategic analysis framework for understanding and designing incentive systems in web3.

> "Every protocol is a game. Every token is an incentive. Every user is a player. Understand the rules, or become the played."

## When to Use This Skill

- Analyzing tokenomics for exploits or misaligned incentives
- Evaluating governance proposals and voting mechanisms
- Understanding MEV and adversarial transaction ordering
- Designing auction mechanisms (NFT drops, token sales, liquidations)
- Predicting how rational actors will behave in a system
- Identifying attack vectors in DeFi protocols
- Modeling liquidity provision strategies
- Assessing protocol sustainability

## Core Framework

### The Five Questions

For any protocol or mechanism, ask:

1. **Who are the players?** (Users, LPs, validators, searchers, governance token holders)
2. **What are their strategies?** (Actions available to each player)
3. **What are the payoffs?** (How does each outcome affect each player?)
4. **What information do they have?** (Complete, incomplete, asymmetric?)
5. **What's the equilibrium?** (Where do rational actors end up?)

### Analysis Template

```markdown
## Protocol: [Name]

### Players
- Player A: [Role, objectives, constraints]
- Player B: [Role, objectives, constraints]
- ...

### Strategy Space
- Player A can: [List possible actions]
- Player B can: [List possible actions]

### Payoff Structure
- If (A does X, B does Y): A gets [payoff], B gets [payoff]
- ...

### Information Structure
- Public information: [What everyone knows]
- Private information: [What only some players know]
- Observable actions: [What can be seen on-chain]

### Equilibrium Analysis
- Nash equilibrium: [Stable outcome where no player wants to deviate]
- Dominant strategies: [Strategies that are always best regardless of others]
- Potential exploits: [Deviations that benefit attackers]

### Recommendations
- [Design changes to improve incentive alignment]
```

## Reference Documents

| Document | Use Case |
|----------|----------|
| [Nash Equilibrium](references/nash-equilibrium.md) | Finding stable outcomes in strategic interactions |
| [Mechanism Design](references/mechanism-design.md) | Designing systems with desired equilibria |
| [Auction Theory](references/auction-theory.md) | Token sales, NFT drops, liquidations |
| [MEV Game Theory](references/mev-strategies.md) | Adversarial transaction ordering |
| [Tokenomics Analysis](references/tokenomics-analysis.md) | Evaluating token incentive structures |
| [Governance Attacks](references/governance-attacks.md) | Voting manipulation and capture |
| [Liquidity Games](references/liquidity-games.md) | LP strategies and impermanent loss |
| [Information Economics](references/information-economics.md) | Asymmetric information and signaling |

## Quick Concepts

### Nash Equilibrium
A state where no player can improve their payoff by unilaterally changing strategy. The "stable" outcome of a game.

**Crypto application:** In a staking system, Nash equilibrium determines the stake distribution across validators.

### Dominant Strategy
A strategy that's optimal regardless of what others do.

**Crypto application:** In a second-price auction, bidding your true value is dominant.

### Pareto Efficiency
An outcome where no one can be made better off without making someone worse off.

**Crypto application:** AMM fee structures try to be Pareto efficient for traders and LPs.

### Mechanism Design
"Reverse game theory" - designing rules to achieve desired outcomes.

**Crypto application:** Designing token vesting schedules to align long-term incentives.

### Schelling Point
A solution people converge on without communication.

**Crypto application:** Why certain price levels act as psychological support/resistance.

### Incentive Compatibility
When truthful behavior is optimal for participants.

**Crypto application:** Oracle designs where honest reporting is the dominant strategy.

### Common Knowledge
Everyone knows X, everyone knows everyone knows X, infinitely recursive.

**Crypto application:** Public blockchain state creates common knowledge of balances/positions.

## Analysis Patterns

### Pattern 1: The Tragedy of the Commons

**Structure:** Shared resource, individual incentive to overuse, collective harm.

**Crypto examples:**
- Gas price bidding during congestion
- Governance token voting apathy
- MEV extraction degrading UX

**Solution approaches:**
- Harberger taxes
- Quadratic mechanisms
- Commitment schemes

### Pattern 2: The Prisoner's Dilemma

**Structure:** Individual rationality leads to collective irrationality.

**Crypto examples:**
- Liquidity mining mercenaries (farm and dump)
- Race-to-bottom validator fees
- Bridge security (each chain wants others to secure)

**Solution approaches:**
- Repeated games (reputation)
- Commitment mechanisms (staking/slashing)
- Mechanism redesign

### Pattern 3: The Coordination Game

**Structure:** Multiple equilibria, players want to coordinate but may fail.

**Crypto examples:**
- Which L2 to use?
- Token standard adoption
- Hard fork coordination

**Solution approaches:**
- Focal points (Schelling points)
- Sequential moves (first mover advantage)
- Communication mechanisms

### Pattern 4: The Principal-Agent Problem

**Structure:** One party acts on behalf of another with misaligned incentives.

**Crypto examples:**
- Protocol team vs token holders
- Delegates in governance
- Fund managers

**Solution approaches:**
- Incentive alignment (token vesting)
- Monitoring (transparency)
- Bonding (skin in game)

### Pattern 5: Adverse Selection

**Structure:** Information asymmetry leads to market breakdown.

**Crypto examples:**
- Token launches (team knows more than buyers)
- Insurance protocols (risky users more likely to buy)
- Lending (borrowers know their risk better)

**Solution approaches:**
- Signaling (lock-ups, audits)
- Screening (credit scores, history)
- Pooling equilibria

### Pattern 6: Moral Hazard

**Structure:** Hidden action after agreement leads to risk-taking.

**Crypto examples:**
- Protocols with insurance may take more risk
- Bailout expectations encourage leverage
- Anonymous teams may rug

**Solution approaches:**
- Monitoring and transparency
- Incentive alignment
- Reputation systems

## Common Crypto Games

### The MEV Game

**Players:** Users, searchers, builders, validators
**Key insight:** Transaction ordering is a game; users are often the losers

See: [MEV Strategies](references/mev-strategies.md)

### The Liquidity Game

**Players:** LPs, traders, arbitrageurs
**Key insight:** Impermanent loss is the cost of being adversely selected against

See: [Liquidity Games](references/liquidity-games.md)

### The Governance Game

**Players:** Token holders, delegates, protocol team
**Key insight:** Rational apathy + concentrated interests = capture

See: [Governance Attacks](references/governance-attacks.md)

### The Staking Game

**Players:** Stakers, validators, delegators
**Key insight:** Security budget must exceed attack profit

See: [Tokenomics Analysis](references/tokenomics-analysis.md)

### The Oracle Game

**Players:** Data providers, consumers, attackers
**Key insight:** Profit from manipulation must be less than cost

See: [Mechanism Design](references/mechanism-design.md)

## Red Flags in Protocol Design

### Tokenomics Red Flags
- Insiders can sell before others (vesting asymmetry)
- Inflation benefits few, dilutes many
- No sink mechanisms (perpetual selling pressure)
- Rewards without risk (free money = someone else paying)

### Governance Red Flags
- Low quorum thresholds (minority capture)
- No time delay (flash loan attacks)
- Token voting only (plutocracy)
- Delegates with no skin in game

### Mechanism Red Flags
- First-come-first-served (bot advantage)
- Sealed bids without commitment (frontrunning)
- Rebates/refunds (MEV extraction)
- Complex formulas (hidden exploits)

## Advanced Topics

### Repeated Games and Reputation
Single-shot games often have bad equilibria. Repetition enables cooperation through:
- Trigger strategies (cooperate until defection)
- Reputation building (costly to destroy)
- Future value (patient players cooperate more)

**Crypto application:** Why anonymous actors behave worse than doxxed teams.

### Evolutionary Game Theory
Strategies that survive competitive selection. Relevant for:
- Which protocols survive long-term
- Memetic competition between narratives
- Bot strategy evolution

### Bayesian Games
Games with incomplete information. Players have beliefs about others' types.

**Crypto application:** Trading with unknown counterparties, evaluating anonymous teams.

### Cooperative Game Theory
When players can form binding coalitions.

**Crypto application:** MEV extraction coalitions, validator cartels, governance blocs.

### Algorithmic Game Theory
Computational aspects of game theory.

**Crypto application:** On-chain game computation limits, gas-efficient mechanism design.

## Methodology

### Step 1: Model the Game
- Identify all players (including those not obvious)
- Map complete strategy spaces
- Define payoff functions precisely
- Specify information structure

### Step 2: Find Equilibria
- Check for dominant strategies
- Compute Nash equilibria
- Identify Pareto improvements
- Consider trembling-hand perfection

### Step 3: Stress Test
- What if players collude?
- What if new players enter?
- What if information leaks?
- What if parameters change?

### Step 4: Recommend
- Mechanism changes to improve equilibrium
- Monitoring to detect deviations
- Parameter bounds to maintain stability

## Resources

### Foundational Texts
- "Theory of Games and Economic Behavior" - von Neumann & Morgenstern
- "A Beautiful Mind" (Nash's life, accessible intro)
- "The Strategy of Conflict" - Schelling
- "Mechanism Design Theory" - Myerson (Nobel lecture)

### Crypto-Specific
- "Flash Boys 2.0" - MEV paper
- "SoK: DeFi Attacks" - Systemization of DeFi exploits
- "Clockwork Finance" - MEV and mechanism design
- Paradigm research blog

### Tools
- Nashpy (Python game theory library)
- Gambit (game theory software)
- Agent-based modeling frameworks

Comments (0)

No comments yet. Be the first to comment!

Game Theory (Grade A) - Claude Skill | Skills Directory

Stay up to date

Get the latest news on AI tools and skills delivered to your inbox.