Admin keys are an existential risk disguised as convenience. If one EOA can pause, upgrade, or drain a protocol, the "decentralized" app has a single point of failure. Thread ↓
2/ Centralization vector #1 – Upgradeable proxies. A compromised proxy admin = total protocol takeover. Mitigated with multisig, timelocks, and transparent governance.
3/ Centralization vector #2 – Single-source oracles. When one server signs prices, it's just one AWS outage away from a liquidation cascade. Decentralized or multi-feed oracles with quorum checks help prevent this.
4/ Centralization vector #3 – Emergency pause switches. It's a vital safety net that is easy to abuse. Cap pause duration (e.g., 48h), document who can trigger it, and how recovery works.
5/ Centralization is a spectrum. The more “just-trust-me” levers in code, the larger the attack surface. Learn more about security best practices:
814