KelpDAO Exploit Post-Mortem
Now that the dust is getting settled, I want to highlight how various protocols have handled the market risk. There’s a huge diversity between how protocols have designed their risk buffers, and how they’ve been used to weather this shock. Let’s dive in.


