Infrastructure Providers
Infrastructure Providers

Infrastructure Providers

Infrastructure providers supply the data, automation, and interoperability that every vault and lending market depends on. Without accurate oracles, curators cannot measure risk. Without reliable automation, strategies cannot execute. Without bridges, capital cannot move across chains. This layer is invisible to most depositors, but it determines whether a vault functions safely under pressure.
At a glance:
  • Infrastructure providers supply the data, automation, and interoperability that every vault and lending market depends on to function. They are invisible to most depositors but central to how safely a vault operates.
  • Oracles are the most critical layer: they determine when a position is solvent, undercollateralized, or liquidatable. A wrong or delayed price feed can break a vault regardless of how well everything else is configured.
  • Choosing infrastructure is a risk decision, not just a technical one. Curators evaluate oracles, bridges, and automation networks with the same scrutiny they apply to collateral and strategy logic.

Top Infrastructure Providers

The 5 layers of DeFi infrastructure

  • Oracles deliver real-time price data for collateral and assets. Every lending market depends on an oracle to know how much collateral is worth and when to trigger a liquidation. They are the primary risk input for every vault.
  • Bridges and cross-chain messaging layers move assets and data between chains. They allow a vault on one chain to communicate with positions or assets on another, enabling multi-chain strategies and collateral routing.
  • Automation networks execute vault operations on schedule: compounding rewards, rebalancing portfolios, triggering parameter updates. They keep strategies running without manual intervention.
  • Analytics and monitoring tools help curators visualize market health, stress-test vaults, and detect early signs of instability. They turn raw on-chain data into actionable signals.
  • Standards and frameworks (such as ERC-4626 and Safe modules) give developers a consistent, auditable structure for building vaults. They reduce integration risk and make it easier to connect oracles, automation, and strategies without rebuilding core logic each time.

What makes a good oracle for vault risk management?

A vault can survive slow rebalancing or temporary bridge congestion. It rarely survives a wrong price feed. Oracles determine whether a position is solvent, undercollateralized, or liquidatable. Choosing the wrong oracle is not a configuration decision: it is a risk decision.
From a curator's perspective, a reliable oracle needs six properties:
1. Transparency of data sourcing: Curators need to know which venues the oracle reads from, whether data comes from spot prices, perps, TWAPs, or indices, and how those sources are selected and weighted. If you cannot trace where a price comes from and how it is built, you cannot trust it to liquidate positions safely.
2. Diversity and independence of data sources: A good oracle pulls from multiple independent venues, avoids dominance by a single thin exchange, and uses aggregation methods (median, trimmed mean) to reduce outlier impact. Source diversity ensures a single broken market cannot drag the feed off course.
3. Decentralization and operator model: Curators care about who can censor or freeze updates, who can push a malicious price, and whether governance can upgrade feeds safely with timelocks. Strong oracles distribute data providers, node operators, and signing responsibilities. Concentrated control is acceptable only if it is fully disclosed and compensated with robust processes.
4. Auditability and verifiable pipelines: Good oracles publish feed configurations and on-chain references, allow verification of historical prices, document upgrade history, and increasingly provide proofs or attestations for off-chain data pipelines. This makes it possible to verify that a liquidation was correct and to catch misconfigurations before they cause damage.
5. Appropriate update logic: Feeds should update frequently enough to protect lenders but not so aggressively that noise triggers unnecessary liquidations. A good price feed uses time-based heartbeats for slow-moving markets, event-based updates on large price moves, and volatility-aware logic that reacts quickly to real breaks without overreacting to micro-noise.
6. Monitoring and fail-safes: Even the best oracle fails occasionally. Curators look for stale feed detection and alerts, max-delta limits per block or interval, circuit breakers that halt updates outside configured bounds, fallback feeds, and the ability to pause liquidations if a feed is clearly wrong. Many curators run primary and secondary feeds simultaneously and treat significant divergence as a red flag requiring investigation.

How risk curators select infrastructure providers

Infrastructure selection is part technical evaluation, part economic judgment, and part governance assessment. These are the 6 criteria most curators work through.
1. Strategy and asset fit: Curators start by mapping the strategy: what assets are used as collateral, what chains and venues are involved, and how quickly the strategy must react under stress. A stablecoin-only prime vault needs a conservative oracle with deep liquidity sources and a robust, slow update cadence. A high-yield long-tail vault needs more flexible monitoring and aggressive automation. Infra that does not match the risk profile is rejected or used only with tight caps.
2. Security maturity and incident history: For each provider, curators evaluate past incidents and how they were handled, audit history and who performed it, upgrade patterns and timelocks, and the presence of admin keys and emergency controls. The key question is: when this fails, how does it fail, and is the worst case acceptable for this vault?
3. Operational reliability and performance: Curators track historical uptime and missed updates, latency under peak volatility, and how infrastructure behaves during gas spikes. Many test providers in staging or with a small live allocation before committing larger size.
4. Governance structure and alignment: Who controls upgrades and config changes, how quickly changes can be made, and whether control sits with a multisig, DAO, or company all matter. Misaligned incentives (for example, earning more if users leverage more) are a red flag for conservative strategies.
5. Composability and integration cost: Curators and protocol teams also weigh how easily the infrastructure plugs into the vault framework, whether it is already battle-tested with the base protocol, and how much custom code is required. Lower integration complexity means fewer unknown failure modes and faster time to market.
6. Continuous monitoring and vendor risk management: Infrastructure selection is not a one-time decision. Good curators track oracle deviations, uptime, and anomalies continuously. If quality degrades, they can tighten caps, freeze new deposits, migrate to alternative providers, or switch to fallback feeds while investigating.

Oracle comparison: DIA vs Chainlink, Pyth, Redstone, Chronicle

Not all oracles suit the same vault types. The table below compares the five most widely used oracle providers across the criteria curators care about most.
Category
DIA
Chainlink
Pyth Network
Redstone
Chronicle
Data Sourcing Model
First-party sourcing from exchanges, APIs, L1/L2 protocols; full transparency of source lists
Aggregated institutional feeds from private providers; sources often opaque
Exchange-provided price streams; fast but less transparent source weighting
Modular sourcing; pulls from CeFi, DEXs, off-chain vendors; partially transparent
Mostly MakerDAO ecosystem assets; limited but vetted data sources
Transparency & Auditability
Full on-chain pipeline via DIA Lumina; sources, transformations, and validators visible
Limited transparency; oracle configuration is not fully open
Public feeds, but source methodology partially opaque
Strong transparency claims, but mixed across feeds
Higher transparency than most, but smaller scope
Data Variety
Highest in category: 10k+ crypto assets, NFTs, LSTs, LRTs, RWAs, FX, commodities, custom indices
Focus on top assets, FX, commodities, RWAs; slower to list new markets
High coverage of crypto majors and L2 assets; fewer RWAs
Good long-tail crypto support; experimental RWA indices
Very limited; focused on Maker collateral universe
Customization
Full custom pipeline: bespoke feeds for vault allocators, RWAs, vol-adjusted prices, strategy-specific indices
Very limited; standardized feeds only
Limited customization
Strong custom feed capability
Minor customization; mostly internal to Maker
Latency & Update Model
Fast; configurable triggers; supports pull-based and push-based updates
Fast — Push model; slower but stable; large batching delays possible
Very fast (sub-second); good for perps, leverage
Fast with configurable triggers
Moderate latency; predictable but slower
Manipulation Resistance
Multi-source, index-based, medianized; transparent anti-manipulation logic
Strong history; heavy reliance on large centralized providers
Susceptible to exchange-level anomalies due to single-source nature
Depends on config; can be strong with multi-source
Strong for Maker collateral, limited elsewhere
RWA Support
Leading: US treasuries, bonds, FX, macro indices, NAV-based feeds with verifiable sources
Strong institutional RWA pipeline; but less transparent
Weak RWA support
Experimental
Strong for MakerDAO’s RWA vaults only
LST/LRT Support
Full and expanding, including chain-specific LSTs and emerging LRTs; custom methodology integration
Moderate; slow listings
Good coverage
Medium
Limited
On-Chain Verifiability
Maximum; End-to-end pipeline recorded onchain with zk-proof roadmap (Lumina)
Minimal; mostly off-chain proprietary systems
Medium;On-chain posted values; sourcing unclear
High; posted to-chain but sourcing varies
Medium; onchain values but limited pipeline disclosure
Ideal Use Cases for Vaults
Risk-sensitive vaults, RWAs, strategy overlays, long-tail markets, LST/LRT vaults, multi-chain systems, verifiable data
High-TVL blue-chip markets, conservative collateral, RWA-heavy institutional protocols
High-frequency leveraged markets, perps, HFT-like strategies
Medium-risk vaults, long-tail crypto, custom strategies
MakerDAO-specific vaults and conservative collateral
Why Curators Choose / Avoid
Choose: transparency, verifiability, first-party data, custom feeds, RWA support, manipulation resistance. Avoid: if only wanting a “standardized” feed.
Choose: battle-tested reputation. Avoid: opaque sourcing, slow listing, outdated cadence.
Choose: speed. Avoid: poor manipulation resistance for collateralized vaults.
Choose: flexibility. Avoid: inconsistent source guarantees.
Choose: conservative risk profile. Avoid: narrow asset universe.
Risk Profile for Vaults
Low: Lowest oracle opacity risk; low manipulation risk; high configurability
Low: Low operational risk; medium opacity risk
Medium: Fast but higher manipulation risk
Medium: medium risk depending on configuration
Low: Low risk but narrow scope

Providers

31

Categories

5

All providers

31 providers
DIA
Oracle and Data

Cross-chain oracle for verifiable data.

Chainlink
Oracle and Data

Industry-standard oracle platform.

Pyth Network
Oracle and Data

Price layer for global financial markets.

Redstone
Oracle and Data

Modular oracle for DeFi data feeds.

API3
Oracle and Data

Decentralized first-party oracle network.

Chronicle
Oracle and Data

Verifiable oracle for Web3 data.

eOracle
Oracle and Data

Data Layer for RWAs and Institutional DeFi.

Stargate Finance
Cross-chain Messaging

Omnichain interoperability protocol.

Wormhole
Cross-chain Messaging

Leading interoperability platform.

Hyperlane
Cross-chain Messaging

Open interoperability across chains.

Axelar Network
Cross-chain Messaging

Decentralized network connecting blockchains.

Across
Cross-chain Messaging

Optimistic bridge across EVMs.

Synapse
Cross-chain Messaging

Cross-chain communication for blockchains.

Superbridge
Cross-chain Messaging

Native bridge for rollups.

Gelato
Automation and Monitoring

Web3 infrastructure for wallets and chains.

Chainlink Automation
Automation and Monitoring

Secure decentralized smart contract automation.

OpenZeppelin Defender
Automation and Monitoring

Developer security platform for blockchain.

Tenderly
Automation and Monitoring

Full-stack Web3 development tools.

Forta
Automation and Monitoring

Blockchain security monitoring network.

Revert Compoundor
Automation and Monitoring

Automate compounding of liquidity provider fees.

Liquify Protocol
Automation and Monitoring

Provides instant access to staked liquidity.

Nexus Mutual
Insurance

Decentralized cover against smart contract failure.

Ease
Insurance

Decentralized coverage protocol.

Unslashed
Insurance

Decentralized insurance for major DeFi protocols.

Cover Protocol
Insurance

A peer-to-peer coverage market.

Sherlock
Insurance

Risk management protocol.

Ante Finance
Insurance

Smart Tests for Smart Contracts.

Bridge Mutual
Insurance

Risk coverage for stablecoins, protocols, smart contracts, exchanges.

ERC-4626 Vault Standard
Standards and Kits

Libraries for ERC-4626 vault standard.

Euler Vault Kit
Standards and Kits

Framework for building credit vaults.

Ethereum Vault Connector
Standards and Kits

Connects ERC-4626 and other types of vaults on Ethereum.