Scope of Coverage

The Guardian Fund is designed to provide protocol-native remediation for a defined set of adverse events that may impact users of Radiant Capital. This page outlines the categories of events that may be eligible for coverage, the scope of protection, and important limitations.

The Guardian Fund is intended to mitigate protocol-level risks, not individual user errors or market-driven losses. Coverage applies to Core Markets, RIZ Isolated Markets, Vaults, Strategies, however explicitly excludes RIZ isolated markets in some categories.

Covered events generally fall into the categories below.


Smart Contract Exploits and Hacks

Description

Smart contract exploits refer to unintended vulnerabilities or logic flaws in Radiant protocol smart contracts that result in loss of user funds.

Examples include:

  • Re-entrancy vulnerabilities

  • Incorrect accounting or rounding errors

  • Permission or access control failures

  • Faulty upgrade or initialization logic

  • Exploits arising from unexpected contract interactions

Coverage Intent

If a verified exploit of Radiant Core contracts results in user fund loss, the Guardian Fund may be used to remediate affected users.

Exclusions

  • Exploits in third-party protocols integrated by Radiant

  • Exploits in dependencies widely used across the industry

  • User-deployed vaults or custom strategies

  • Known risks disclosed prior to the event


Severe Oracle Failures or Manipulation

Description

Oracle failures occur when price feeds used by the protocol provide incorrect, delayed, or manipulated data that materially impacts protocol operations.

Examples include:

  • Manipulation of on-chain price sources

  • Incorrect asset pricing due to feed configuration errors

  • Cross-market price desynchronization

Coverage Intent

If an oracle failure directly causes incorrect liquidations, bad debt, or user losses, the Guardian Fund may be used for remediation.

Exclusions

  • Normal price volatility

  • Extreme oracle latency or downtime

  • Temporary oracle deviations that self-correct without loss

  • Oracle issues in RIZ isolated markets, other than Chainlink or Pyth


Custodian Risks and Operational Failures

Description

Custodian risks relate to failures or compromises involving protocol-controlled infrastructure or privileged actors.

Examples include:

  • Compromise of Radiant contributor wallets

  • Key mismanagement or signer compromise

  • Failures in DAO-controlled operational systems

  • Multisig execution errors

Coverage Intent

If such failures result in direct loss of user funds, the Guardian Fund may be used to remediate affected users.

Exclusions

  • Losses caused by individual user wallet compromise

  • Losses caused by incorrect approvals

  • Social engineering or phishing targeting users


Liquidation Failures (Core Markets Only)

Description

Liquidation failures occur when the protocol’s liquidation mechanisms fail to operate as intended during periods of market stress.

Examples include:

  • Insufficient liquidator participation

  • Network congestion preventing timely liquidations

  • Incorrect liquidation parameters

  • Liquidation logic failures

Coverage Intent

If liquidation failures in Core Markets result in systemic losses or unfair user impact, the Guardian Fund may be used to remediate affected positions.

Exclusions

  • Liquidation failures in RIZ isolated markets

  • Losses due to extreme but expected market volatility (such as delistings)


Bad Debt (Core Markets Only)

Description

Bad debt arises when borrower positions cannot be liquidated profitably, resulting in a shortfall that impacts lenders or the protocol.

Examples include:

  • Rapid price collapses exceeding liquidation thresholds

  • Failed or partial liquidations

Coverage Intent

The Guardian Fund may be used to cover protocol-level bad debt in Core Markets to protect lenders and maintain market solvency.

Exclusions

  • Bad debt in RIZ isolated markets


Covered vs Not Covered

Category
Covered
Not Covered

Smart contract exploits

Oracle manipulation

Custodian / signer compromise

Liquidation failures

RIZ isolated markets

Bad debt

RIZ isolated markets

User error or misuse

Market volatility / price movements

Third-party protocol failures

Dependencies

Impermanent loss

MEV or gas-related losses


Severity Thresholds & Partial Coverage

The Guardian Fund is designed to respond to material protocol-level incidents rather than minor or transient issues.

Severity Thresholds

Coverage eligibility generally depends on factors such as:

  • The magnitude of user losses

  • Whether the event results in protocol insolvency or systemic risk

  • The number of affected users

  • Whether normal protocol mechanisms can self-correct the issue

Minor incidents that do not threaten protocol solvency or materially impact users may not trigger Guardian Fund remediation.

Partial Coverage

In some cases, remediation may be partial rather than full, depending on:

  • Available assets in the Guardian Fund

  • The scale of losses relative to fund capacity

  • Governance-approved payout limits

  • Risk parameters in effect at the time of the event

Partial remediation distributes available capital in the Guardian Fund proportionally among eligible users. Any remediation event results in a corresponding reduction in Guardian Fund assets and gLP value.

Numerical Examples

Example 1: Full Coverage

  • Total Guardian Fund assets: $1M

  • Eligible user losses: $200k

  • Outcome: Users are fully remediated. Guardian Fund assets decrease to $800k. gLP price declines proportionally via slashing.

Example 2: Partial Coverage

  • Total Guardian Fund assets: $1M

  • Eligible user losses: $2M

  • Outcome: 50% of losses are remediated pro-rata. Guardian Fund assets are fully depleted. gLP holders fully absorb the loss via slashing.


Hard vs Soft Triggers

Covered events may trigger remediation through either hard (automatic) or soft (governance-reviewed) processes.

Hard Triggers (Automatic)

Hard triggers are predefined, objective conditions that may automatically initiate remediation logic, such as:

  • Verified smart contract exploit in Radiant Core contracts

  • Deterministic oracle failure with measurable loss impact

  • Critical liquidation mechanism failure

Hard triggers are designed to minimize response time and reduce governance overhead during emergencies.

Soft Triggers (Governance-Reviewed)

Soft triggers require explicit review and approval by the Radiant DAO governance framework. Examples include:

  • Custodian or signer compromise

  • Cross-chain infrastructure failures

  • Ambiguous or multi-causal loss events

Soft triggers allow for contextual assessment, forensic analysis, and tailored remediation decisions.


Events Explicitly Not Covered

The Guardian Fund does not provide coverage for:

  • User error (incorrect transactions, leverage misuse)

  • Market risk or asset price volatility

  • Impermanent loss

  • Some losses in RIZ isolated markets

  • Third-party protocol failures unrelated to Radiant

  • Third-party dependencies widely used by the industry

  • Gas fee losses or MEV-related effects


Remediation Process (High-Level)

  1. Event detection and incident analysis

  2. Scope and impact assessment

  3. Automated or DAO-approved remediation decision

  4. Distribution of assets from the Guardian Fund

  5. Corresponding gLP slashing

Remediation amounts are partial and subject to Guardian Fund capacity.


Important Notes

  • Coverage is best-effort, not guaranteed.

  • The Guardian Fund does not constitute insurance.

  • All coverage decisions are ultimately governed by Radiant DAO processes

Last updated