DefiCareDefiCare
Checking auth...

Origin Protocol

About

Origin Protocol builds audited, composable yield-bearing tokens and liquidity infrastructure for DeFi, operating since 2020. Its product suite includes Origin Ether (OETH, an Ethereum LST with Merkle Proof validator verification), Origin Dollar (OUSD, a fully liquid yield-bearing stablecoin backed by USDC deployed into Morpho and Curve strategies), Automated Redemption Manager (ARM, an arbitrage-driven yield vault), Super OETH (a Base-native LST combining Beacon Chain staking with AMM incentives), and Origin Sonic (OS, a Sonic-native LST). All products share a common battle-tested codebase, are fully collateralized, and are governed by xOGN stakers.

Where Does Yield Come From?

Origin Protocol generates yield through five different products. A 20% performance fee is taken from all yields before depositors get their share, and that fee is used entirely to buy back OGN tokens for xOGN stakers (people who lock up the protocol's governance token).

1. OETH (Origin Ether) — A liquid staking token on Ethereum. Yield comes from Ethereum's Beacon Chain staking rewards. Origin runs two groups of validators (four nodes each) spread across different regions using SSV Network's distributed validator tech. The protocol verifies validator balances directly onchain using Merkle Proofs (no middleman oracles needed). "0x02" validators allow rewards to compound automatically — earnings add directly to validator balances without extra scripts, and partial withdrawals make liquidity faster. The AMO (Automated Market Operator) keeps protocol-owned liquidity ready so OETH stays close to ETH's price. You can redeem asynchronously (up to ~8 days via Beacon Chain queue) or swap instantly through Curve pools.

2. OUSD (Origin Dollar) — A yield-bearing stablecoin fully backed 1:1 by USDC. That USDC gets deployed into:

  • Morpho lending vaults (co-managed by Origin and Yearn) on Ethereum, Base, and HyperLiquid — USDC is lent out against high-quality collateral, with Yearn handling daily allocation. Cross-chain yield is bridged back to Ethereum mainnet using Circle CCTP.
  • Curve OUSD/USDC pool (usually under 20% of collateral) providing instant exit liquidity and earning LP rewards (including CRV).

Yield is boosted by a rebasing design — contracts that don't rebase forfeit their yield to active holders. Spreading deposits across multiple Morpho markets reduces yield compression (diminishing returns from too much capital in one place). Pooled gas costs make frequent compounding affordable, and the AMO can earn up to 2x rewards on the same capital.

3. Super OETH (superOETHb) — A Base-native liquid staking token. ETH staking rewards come from bridged wOETH (sent from Ethereum to Base via Chainlink CCIP). The protocol-owned AMO liquidity in the superOETHb/WETH Curve pool on Base generates AMM incentive tokens, which are harvested and given to holders daily as extra yield. The AMO also keeps the token price tight. Collateral stays on Ethereum mainnet — only yield and redemption liquidity cross the bridge, limiting risk.

4. ARM (Automated Redemption Manager) — An onchain arbitrage engine for liquid staking tokens (stETH, eETH, OS). When an LST trades below its true redemption value on secondary markets, the ARM buys the discounted token and redeems it for the underlying collateral. When there's no arbitrage opportunity, the capital sits in Morpho lending markets (Ethereum ARM vaults) or Silo (Sonic ARM vault) earning lending yields. This gives a yield floor from lending during calm periods and extra upside from arbitrage during volatile periods.

5. Origin Sonic (OS) — A Sonic-native liquid staking token earning staking yield from the Sonic network, with similar AMO mechanisms to maintain its peg.

Programmatic Yield Infrastructure: Yield Forwarding lets staking rewards be sent to other contracts for better AMM/lending efficiency. Pool Booster directs yield to liquidity provider reward gauges. Borrow Booster sends yield to Merkl to subsidize borrowing rates for users.

Persons

  • Josh Fraser

    Cofounder

  • Matthew Liu

    Cofounder

  • Micah Alcorn

    Advisor

  • Domen Grabec

    Engineer

  • Shahul Hameed

    Engineer

  • Aure Gimon

    Product Designer

  • Kara Chang

    Executive Assistant

  • Clément Moller

    Engineer

  • Christopher Jacobs

    Senior Engineer

  • Kelly Hwang

    Investments/Treasury

  • Justin Charlton

    Head of Finance

  • Peter Gray

    BD Manager

  • Ryan McNamara

    Product Marketing Manager

  • Jonathan Snow

    Data Engineer

  • Rafael Ugolini

    CEO

  • Nick Addison

    Sr Solidity Engineer

  • Antoine Codogno

    Sr Engineer

Audits

Audit / DateFindingsVerdict
Sigma Prime01-02-2026
  • Critical0
  • High0
  • Medium3
  • Low3
  • Info10
The audit found no critical or high-severity vulnerabilities, with all medium-risk issues either resolved by the development team or acknowledged as non-exploitable under current conditions, indicating that the OUSD Upgrade contracts were assessed to be in a reasonably secure state for deployment.
  • Critical0
  • High0
  • Medium3
  • Low1
  • Info4
Sigma Prime identified 8 findings (3 medium, 1 low, 4 informational), all of which were resolved or acknowledged by the Origin Protocol team, demonstrating a thorough remediation cycle prior to deployment.
yAudit24-11-2025 - 28-11-2025
  • Critical0
  • High1
  • Medium1
  • Low3
  • Info2
The Origin ARM protocol demonstrates solid architectural design and appropriate access controls, with the one high-severity issue regarding slashing loss distribution addressed during the audit. Overall the codebase shows strong security fundamentals with limited attack surface for malicious actors.
Nethermind10-10-202516-10-2025
  • Critical0
  • High0
  • Medium0
  • Low0
  • Info1
The audit found only one informational issue (an off-by-one error capping validators at 47 instead of 48), which was promptly fixed, and no vulnerabilities of critical, high, medium, or low severity were identified, indicating strong code quality and thorough testing.
OpenZeppelin06-08-2025 - 20-08-2025
  • Critical1
  • High2
  • Medium2
  • Low5
  • Info8
The audit resolved or partially resolved the critical and high-severity issues, but residual temporary denial-of-service and under-accounting risks tied to consensus-layer edge cases remain and have been acknowledged by the Origin Protocol team as accepted. Given the complexity of synchronizing execution and consensus layer states, continued monitoring and further review are recommended.
Sigma Prime01-09-2025
  • Critical1
  • High5
  • Medium1
  • Low3
  • Info2
Sigma Prime's audit of the Origin Protocol Compounding Staking Strategy identified 12 issues (1 critical, 5 high, 1 medium, 3 low, 2 informational), all of which were fully remediated by the development team except one informational item that was acknowledged and closed. The comprehensive refactoring of the deposit-tracking logic addressed the most severe array-manipulation and state-transition risks, resulting in a materially improved security posture for the protocol.
OpenZeppelin09-06-2025 - 13-06-2025
  • Critical0
  • High0
  • Medium0
  • Low5
  • Info9
The audit uncovered no critical, high, or medium severity vulnerabilities, only low and informational findings — all of which were either resolved or acknowledged — reflecting a well-structured codebase and a sound security posture for the Plume Rooster AMO strategy.
OpenZeppelin13-05-2025 - 19-05-2025
  • Critical0
  • High1
  • Medium1
  • Low7
  • Info15
The two substantive security issues (high-severity storage gap and medium-severity reward-stealing vector via Magpie) were either resolved or partially mitigated, meaning the core ARM contracts can be deployed with reasonable safety if the remaining partially resolved medium issue is understood and accepted by the protocol team; the seven low-severity items were mostly acknowledged as acceptable design choices for initial deployment.
OpenZeppelin31-03-2025 - 03-04-2025
  • Critical0
  • High0
  • Medium0
  • Low1
  • Info1
The audit did not find any critical or high-severity vulnerabilities; the one low-severity issue was acknowledged with minimal residual risk, and all three client-reported findings were successfully remediated, making the protocol updates safe for deployment against rapid inflation attacks.
OpenZeppelin20-03-2025 - 28-03-2025
  • Critical0
  • High0
  • Medium1
  • Low3
  • Info2
The audit found no critical or high-severity vulnerabilities; one medium-severity issue and a client-reported front-running risk were both resolved before publication, while three low-severity items and two informational notes were acknowledged by the team, indicating a clean and robust codebase with only residual edge-case risks.
Perimeter03-04-2025
  • Critical0
  • High0
  • Medium0
  • Low0
  • Info0
The fuzzing engagement found no exploitable vulnerabilities in the WOETH contract, and all 31 invariants passed within acceptable rounding tolerances after billions of test calls. This suggests the core WOETH implementation is robust against the fuzzed attack surfaces, though the report is limited to fuzzing coverage and does not constitute a comprehensive manual security review.
OpenZeppelin10-02-2025 - 13-02-2025
  • Critical0
  • High0
  • Medium1
  • Low3
  • Info4
The audit found no critical or high-severity issues; the sole medium-severity finding was resolved, and the remaining acknowledged low and informational items represent accepted design trade-offs and code clarity improvements rather than security risks, indicating the protocol is sound for deployment.
Certora26-11-2024 - 12-12-2024
  • Critical0
  • High0
  • Medium0
  • Low0
  • Info0
Certora's formal verification of OUSD confirms the contract is mathematically correct for all verified rules, with the only violation being a bounded rounding discrepancy inherent to the rebasing mechanism under low-resolution conditions, not a security exploit. No security vulnerabilities were identified across any severity level.
OpenZeppelin26-11-2024 - 02-12-2024
  • Critical0
  • High0
  • Medium0
  • Low3
  • Info5
The OpenZeppelin audit of the OUSD yield delegation upgrade found no critical, high, or medium severity vulnerabilities, with only three low-severity and five informational items identified, most of which were addressed by the Origin team. The codebase was deemed compatible with the previous version and expected to function as intended post-upgrade.
OpenZeppelin15-10-2024 - 21-10-2024
  • Critical0
  • High0
  • Medium1
  • Low2
  • Info7
The audit found the ARM contracts to be well-thought-out with no critical or high severity issues, and the single medium-severity finding (potential DoS in setCrossPrice) was resolved during the audit engagement.
OpenZeppelin09-09-2024 - 16-09-2024
  • Critical0
  • High0
  • Medium0
  • Low2
  • Info1
The audit concluded the contract is securely coded and well-integrated, with two low-severity items (one resolved, one acknowledged) and no critical, high, or medium findings, indicating the Aerodrome AMO strategy poses minimal security risk.
OpenZeppelin29-07-2024 - 01-08-2024
  • Critical0
  • High0
  • Medium2
  • Low4
  • Info8
All critical and high severity findings were zero; the two medium issues were resolved before publication, and the two acknowledged low-severity items represent accepted design trade-offs for the withdrawal queue, making the audited code safe for deployment with continued monitoring of queue liquidity.
OpenZeppelin13-05-2024 - 27-05-2024
  • Critical0
  • High0
  • Medium2
  • Low1
  • Info7
The audit found no critical or high-severity vulnerabilities, with both medium-severity findings either resolved or acknowledged by the team. However, the system's reliance on off-chain monitoring and manual strategist intervention for accounting accuracy introduces operational risk that is a design trade-off of not using a staking oracle.
OpenZeppelin29-04-2024 - 03-05-2024
  • Critical0
  • High0
  • Medium0
  • Low2
  • Info9
The audit found no critical, high, or medium severity vulnerabilities, with the only low-severity finding resolved and the rest being documentation or best-practice items, indicating the merge contracts were well-constructed at the time of review.
Perimeter25-03-2024
  • Critical0
  • High1
  • Medium0
  • Low0
  • Info0
The fuzzing engagement concluded that all identified rounding errors fall within acceptable tolerance thresholds defined with Origin Protocol, allowing safe deployment of the refactored OETHVault code provided redemption fees remain sufficiently high to deter yield-stealing sandwich attacks.
OpenZeppelin07-08-2023 - 16-08-2023
  • Critical0
  • High3
  • Medium4
  • Low4
  • Info8
The audit found three high-severity issues, all resolved or mitigated via design changes (oracle removal, VaultValueChecker safeguards), and the medium-severity issues were largely addressed or accepted with compensating controls, making the strategy safe for deployment under the stated trust assumptions (strategist-only deposits/withdrawals, Balancer/Aura as trusted external contracts).
Narya17-04-2023 - 08-05-2023
  • Critical0
  • High0
  • Medium0
  • Low5
  • Info0
All five identified issues were Low severity and the Gas finding is minor, with each acknowledged and remediated by Origin Protocol, meaning no critical or high-risk vulnerabilities existed in the audited OETH codebase at the time of testing.
OpenZeppelin03-05-2023 - 11-05-2023
  • Critical0
  • High0
  • Medium1
  • Low9
  • Info11
No critical or high-severity issues were found, and the single medium-severity finding was resolved, demonstrating that the OETH integration code is generally secure. However, several acknowledged-but-unresolved design concerns (e.g., permitting deposits when redemptions may be blocked, indefinite allowances) introduce minor residual risk that should be considered during market disruptions or protocol upgrades.
OpenZeppelin20-03-2023 - 03-04-2023
  • Critical0
  • High0
  • Medium2
  • Low10
  • Info14
No critical or high-severity vulnerabilities were identified, and both medium-severity issues were resolved, indicating a sound design for the Dripper and Uniswap V3 strategy additions, though several acknowledged informational items and the partially resolved locked-ETH finding remain as residual considerations.
CyberScope19-12-2022
  • Critical0
  • High0
  • Medium0
  • Low0
  • Info9
The audit found no critical or high-severity issues, with all nine findings classified as Minor/Informative and centered on code quality, gas optimization, and naming conventions rather than exploitable vulnerabilities. The staking contract's core logic appears sound from a security perspective, though the unresolved recommendations suggest opportunities for improvement in robustness and adherence to best practices.
OpenZeppelin03-10-2022 - 14-10-2022
  • Critical0
  • High0
  • Medium1
  • Low9
  • Info4
The OpenZeppelin audit found no critical or high severity vulnerabilities, and all medium and low severity findings were resolved or acknowledged, concluding that the Origin Dollar Convex integration was safe for deployment with no outstanding blockers.
Solidified11-07-2022
  • Critical0
  • High0
  • Medium0
  • Low0
  • Info0
The audit found no critical issues, though at least one finding concerning season advancement logic was identified and remediation was recommended. The poor text extraction prevents a precise count of lower-severity issues, so the report should be consulted directly for full details.
Solidified05-05-2022
  • Critical0
  • High0
  • Medium1
  • Low2
  • Info3
The audit found no critical issues, with the most notable finding being a medium-severity signature replay concern that was acknowledged by the team; the overall codebase was assessed with reasonable security posture across OGV, wOUSD, and ERC721a contracts.
OpenZeppelin16-05-2022 - 20-05-2022
  • Critical0
  • High2
  • Medium3
  • Low2
  • Info4
Both high-severity findings were resolved before or shortly after the audit, and the Origin team responded promptly to most recommendations, leaving only minor edge cases (smart-contract receiver checks and some gas optimizations) partially open.
  • Critical1
  • High5
  • Medium5
  • Low19
  • Info14
The critical and most high-severity issues were resolved or mitigated before deployment, but one high-severity finding (valid redemption failures with non-default strategies) was acknowledged and left unfixed by design, requiring ongoing trusted strategist oversight for allocations. Overall, the audit reveals a reasonable security posture for a governed, upgradeable stablecoin protocol with the main residual risks centered on governance trust assumptions and external DeFi dependencies.
  • Critical0
  • High0
  • Medium0
  • Low0
  • Info0
The audit identified several governance-level and documentation issues, all acknowledged or low-severity in nature, but the garbled text quality precludes a definitive safety assessment of the protocol from this extracted material alone.
Trail of Bits02-11-2020 - 17-11-2020
  • Critical0
  • High8
  • Medium1
  • Low6
  • Info5
The audit found multiple critical-class flaws including a directly drainable mint function and governance bypasses, and while most issues were remediated by December 2020, two high-severity concerns (Timelock admin takeover and OUSD invariant violations) remained only partially or not fixed, indicating the contracts were not ready for deployment at the time of the report.
Trail of Bits13-11-2018 - 28-11-2018
  • Critical0
  • High4
  • Medium4
  • Low1
  • Info2
Trail of Bits identified significant risks in the Marketplace contract, particularly around reentrancy and fund drainage, but all findings were either remediated or formally risk-accepted with documented off-chain mitigations before mainnet deployment.

Legal

Legal form

Limited liability company (Origin Protocol Labs / Origin Protocol, Inc.)

Registration jurisdiction

Cayman Islands (Grand Cayman) — registered address: Floor 4, Willow House, Cricket Square, Grand Cayman KY1-9010; P.O. Box 61, Harbour Centre, George Town, Grand Cayman KY1-1102

Status and notes

The operating entity is Origin Protocol Labs (also referred to as Origin Protocol, Inc. in the homepage footer). The Terms of Service (last updated Sept 5, 2024) and Privacy Policy (last updated Oct 30, 2020) are published on the website and identify Origin Protocol Labs as the contracting party, with a registered address in the Cayman Islands. Dispute resolution is seated in the Grand Caymans with AAA arbitration. The privacy policy explicitly names "Origin Protocol Labs and its related companies."