game-theory
Advanced game theory analysis for crypto protocols, DeFi mechanisms, governance systems, and strategic decision-making. Use when analyzing tokenomics, evaluating protocol incentives, predicting adversarial behavior, designing mechanisms, or understanding strategic interactions in web3.
Install
mkdir -p .claude/skills/game-theory && curl -L -o skill.zip "https://mcp.directory/api/skills/download/2453" && unzip -o skill.zip -d .claude/skills/game-theory && rm skill.zipInstalls to .claude/skills/game-theory
About this skill
Game Theory for Crypto
Strategic analysis framework for understanding and designing incentive systems in web3.
"Every protocol is a game. Every token is an incentive. Every user is a player. Understand the rules, or become the played."
When to Use This Skill
- Analyzing tokenomics for exploits or misaligned incentives
- Evaluating governance proposals and voting mechanisms
- Understanding MEV and adversarial transaction ordering
- Designing auction mechanisms (NFT drops, token sales, liquidations)
- Predicting how rational actors will behave in a system
- Identifying attack vectors in DeFi protocols
- Modeling liquidity provision strategies
- Assessing protocol sustainability
Core Framework
The Five Questions
For any protocol or mechanism, ask:
- Who are the players? (Users, LPs, validators, searchers, governance token holders)
- What are their strategies? (Actions available to each player)
- What are the payoffs? (How does each outcome affect each player?)
- What information do they have? (Complete, incomplete, asymmetric?)
- What's the equilibrium? (Where do rational actors end up?)
Analysis Template
## Protocol: [Name]
### Players
- Player A: [Role, objectives, constraints]
- Player B: [Role, objectives, constraints]
- ...
### Strategy Space
- Player A can: [List possible actions]
- Player B can: [List possible actions]
### Payoff Structure
- If (A does X, B does Y): A gets [payoff], B gets [payoff]
- ...
### Information Structure
- Public information: [What everyone knows]
- Private information: [What only some players know]
- Observable actions: [What can be seen on-chain]
### Equilibrium Analysis
- Nash equilibrium: [Stable outcome where no player wants to deviate]
- Dominant strategies: [Strategies that are always best regardless of others]
- Potential exploits: [Deviations that benefit attackers]
### Recommendations
- [Design changes to improve incentive alignment]
Reference Documents
| Document | Use Case |
|---|---|
| Nash Equilibrium | Finding stable outcomes in strategic interactions |
| Mechanism Design | Designing systems with desired equilibria |
| Auction Theory | Token sales, NFT drops, liquidations |
| MEV Game Theory | Adversarial transaction ordering |
| Tokenomics Analysis | Evaluating token incentive structures |
| Governance Attacks | Voting manipulation and capture |
| Liquidity Games | LP strategies and impermanent loss |
| Information Economics | Asymmetric information and signaling |
Quick Concepts
Nash Equilibrium
A state where no player can improve their payoff by unilaterally changing strategy. The "stable" outcome of a game.
Crypto application: In a staking system, Nash equilibrium determines the stake distribution across validators.
Dominant Strategy
A strategy that's optimal regardless of what others do.
Crypto application: In a second-price auction, bidding your true value is dominant.
Pareto Efficiency
An outcome where no one can be made better off without making someone worse off.
Crypto application: AMM fee structures try to be Pareto efficient for traders and LPs.
Mechanism Design
"Reverse game theory" - designing rules to achieve desired outcomes.
Crypto application: Designing token vesting schedules to align long-term incentives.
Schelling Point
A solution people converge on without communication.
Crypto application: Why certain price levels act as psychological support/resistance.
Incentive Compatibility
When truthful behavior is optimal for participants.
Crypto application: Oracle designs where honest reporting is the dominant strategy.
Common Knowledge
Everyone knows X, everyone knows everyone knows X, infinitely recursive.
Crypto application: Public blockchain state creates common knowledge of balances/positions.
Analysis Patterns
Pattern 1: The Tragedy of the Commons
Structure: Shared resource, individual incentive to overuse, collective harm.
Crypto examples:
- Gas price bidding during congestion
- Governance token voting apathy
- MEV extraction degrading UX
Solution approaches:
- Harberger taxes
- Quadratic mechanisms
- Commitment schemes
Pattern 2: The Prisoner's Dilemma
Structure: Individual rationality leads to collective irrationality.
Crypto examples:
- Liquidity mining mercenaries (farm and dump)
- Race-to-bottom validator fees
- Bridge security (each chain wants others to secure)
Solution approaches:
- Repeated games (reputation)
- Commitment mechanisms (staking/slashing)
- Mechanism redesign
Pattern 3: The Coordination Game
Structure: Multiple equilibria, players want to coordinate but may fail.
Crypto examples:
- Which L2 to use?
- Token standard adoption
- Hard fork coordination
Solution approaches:
- Focal points (Schelling points)
- Sequential moves (first mover advantage)
- Communication mechanisms
Pattern 4: The Principal-Agent Problem
Structure: One party acts on behalf of another with misaligned incentives.
Crypto examples:
- Protocol team vs token holders
- Delegates in governance
- Fund managers
Solution approaches:
- Incentive alignment (token vesting)
- Monitoring (transparency)
- Bonding (skin in game)
Pattern 5: Adverse Selection
Structure: Information asymmetry leads to market breakdown.
Crypto examples:
- Token launches (team knows more than buyers)
- Insurance protocols (risky users more likely to buy)
- Lending (borrowers know their risk better)
Solution approaches:
- Signaling (lock-ups, audits)
- Screening (credit scores, history)
- Pooling equilibria
Pattern 6: Moral Hazard
Structure: Hidden action after agreement leads to risk-taking.
Crypto examples:
- Protocols with insurance may take more risk
- Bailout expectations encourage leverage
- Anonymous teams may rug
Solution approaches:
- Monitoring and transparency
- Incentive alignment
- Reputation systems
Common Crypto Games
The MEV Game
Players: Users, searchers, builders, validators Key insight: Transaction ordering is a game; users are often the losers
See: MEV Strategies
The Liquidity Game
Players: LPs, traders, arbitrageurs Key insight: Impermanent loss is the cost of being adversely selected against
See: Liquidity Games
The Governance Game
Players: Token holders, delegates, protocol team Key insight: Rational apathy + concentrated interests = capture
See: Governance Attacks
The Staking Game
Players: Stakers, validators, delegators Key insight: Security budget must exceed attack profit
See: Tokenomics Analysis
The Oracle Game
Players: Data providers, consumers, attackers Key insight: Profit from manipulation must be less than cost
See: Mechanism Design
Red Flags in Protocol Design
Tokenomics Red Flags
- Insiders can sell before others (vesting asymmetry)
- Inflation benefits few, dilutes many
- No sink mechanisms (perpetual selling pressure)
- Rewards without risk (free money = someone else paying)
Governance Red Flags
- Low quorum thresholds (minority capture)
- No time delay (flash loan attacks)
- Token voting only (plutocracy)
- Delegates with no skin in game
Mechanism Red Flags
- First-come-first-served (bot advantage)
- Sealed bids without commitment (frontrunning)
- Rebates/refunds (MEV extraction)
- Complex formulas (hidden exploits)
Advanced Topics
Repeated Games and Reputation
Single-shot games often have bad equilibria. Repetition enables cooperation through:
- Trigger strategies (cooperate until defection)
- Reputation building (costly to destroy)
- Future value (patient players cooperate more)
Crypto application: Why anonymous actors behave worse than doxxed teams.
Evolutionary Game Theory
Strategies that survive competitive selection. Relevant for:
- Which protocols survive long-term
- Memetic competition between narratives
- Bot strategy evolution
Bayesian Games
Games with incomplete information. Players have beliefs about others' types.
Crypto application: Trading with unknown counterparties, evaluating anonymous teams.
Cooperative Game Theory
When players can form binding coalitions.
Crypto application: MEV extraction coalitions, validator cartels, governance blocs.
Algorithmic Game Theory
Computational aspects of game theory.
Crypto application: On-chain game computation limits, gas-efficient mechanism design.
Methodology
Step 1: Model the Game
- Identify all players (including those not obvious)
- Map complete strategy spaces
- Define payoff functions precisely
- Specify information structure
Step 2: Find Equilibria
- Check for dominant strategies
- Compute Nash equilibria
- Identify Pareto improvements
- Consider trembling-hand perfection
Step 3: Stress Test
- What if players collude?
- What if new players enter?
- What if information leaks?
- What if parameters change?
Step 4: Recommend
- Mechanism changes to improve equilibrium
- Monitoring to detect deviations
- Parameter bounds to maintain stability
Resources
Foundational Texts
- "Theory of Games and Economic Behavior" - von Neumann & Morgenstern
- "A Beautiful Mind" (Nash's life, accessible intro)
- "The Strategy of Conflict" - Schelling
- "Mechanism Design Theory" - Myerson (Nobel lecture)
Crypto-Specific
- "Flash Boys 2.0" - MEV paper
- "SoK: DeFi Attacks" - Systemization of DeFi exploits
- "Clo
Content truncated.
More by openclaw
View all skills by openclaw →You might also like
flutter-development
aj-geddes
Build beautiful cross-platform mobile apps with Flutter and Dart. Covers widgets, state management with Provider/BLoC, navigation, API integration, and material design.
drawio-diagrams-enhanced
jgtolentino
Create professional draw.io (diagrams.net) diagrams in XML format (.drawio files) with integrated PMP/PMBOK methodologies, extensive visual asset libraries, and industry-standard professional templates. Use this skill when users ask to create flowcharts, swimlane diagrams, cross-functional flowcharts, org charts, network diagrams, UML diagrams, BPMN, project management diagrams (WBS, Gantt, PERT, RACI), risk matrices, stakeholder maps, or any other visual diagram in draw.io format. This skill includes access to custom shape libraries for icons, clipart, and professional symbols.
ui-ux-pro-max
nextlevelbuilder
"UI/UX design intelligence. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks (React, Next.js, Vue, Svelte, SwiftUI, React Native, Flutter, Tailwind). Actions: plan, build, create, design, implement, review, fix, improve, optimize, enhance, refactor, check UI/UX code. Projects: website, landing page, dashboard, admin panel, e-commerce, SaaS, portfolio, blog, mobile app, .html, .tsx, .vue, .svelte. Elements: button, modal, navbar, sidebar, card, table, form, chart. Styles: glassmorphism, claymorphism, minimalism, brutalism, neumorphism, bento grid, dark mode, responsive, skeuomorphism, flat design. Topics: color palette, accessibility, animation, layout, typography, font pairing, spacing, hover, shadow, gradient."
godot
bfollington
This skill should be used when working on Godot Engine projects. It provides specialized knowledge of Godot's file formats (.gd, .tscn, .tres), architecture patterns (component-based, signal-driven, resource-based), common pitfalls, validation tools, code templates, and CLI workflows. The `godot` command is available for running the game, validating scripts, importing resources, and exporting builds. Use this skill for tasks involving Godot game development, debugging scene/resource files, implementing game systems, or creating new Godot components.
nano-banana-pro
garg-aayush
Generate and edit images using Google's Nano Banana Pro (Gemini 3 Pro Image) API. Use when the user asks to generate, create, edit, modify, change, alter, or update images. Also use when user references an existing image file and asks to modify it in any way (e.g., "modify this image", "change the background", "replace X with Y"). Supports both text-to-image generation and image-to-image editing with configurable resolution (1K default, 2K, or 4K for high resolution). DO NOT read the image file first - use this skill directly with the --input-image parameter.
fastapi-templates
wshobson
Create production-ready FastAPI projects with async patterns, dependency injection, and comprehensive error handling. Use when building new FastAPI applications or setting up backend API projects.
Related MCP Servers
Browse all serversTrack your crypto wallet balances with Ankr—an advanced wallet tracker for crypto coins, tokens, and portfolio analysis
Pangea integrates AI and cyber security tools for threat intelligence, data protection, and advanced security analysis w
Advanced MCP server enabling AI agents to autonomously run 150+ security and penetration testing tools. Covers reconnais
Desktop Commander MCP unifies code management with advanced source control, git, and svn support—streamlining developmen
Integrate with Gemini CLI for large-scale file analysis, secure code execution, and advanced context control using Googl
Empower your Unity projects with Unity-MCP: AI-driven control, seamless integration, and advanced workflows within the U
Stay ahead of the MCP ecosystem
Get weekly updates on new skills and servers.