Back to blog
Security

The four types of on-chain risk every custodian needs to monitor

TO
Team Opsion
Opsion
·March 31, 2026·6 min read
CustodiansRisk ManagementAMLSecurity

Crypto custody has a maturity problem. The compliance frameworks borrowed from traditional finance, KYC at onboarding, periodic reviews, manual transaction monitoring, were designed for a world where assets move through centralised intermediaries at human speed. On-chain, assets move at block speed, 24 hours a day, across jurisdictions with no overnight settlement window.

The custodians building durable compliance programmes understand that monitoring is not a point-in-time activity. It is a continuous posture. Here are the four risk categories that deserve dedicated monitoring infrastructure.

Counterparty exposure

Every time a custodied wallet receives funds, those funds carry the history of every address they passed through. A deposit that originated three hops from a sanctioned entity may not be flagged by a simple screening tool, but it creates regulatory exposure for the custodian that received it.

Counterparty monitoring means watching the indirect exposure created by the funds' on-chain history, not just the direct sender. This requires a graph traversal model with configurable hop depth and risk-weighting. A simple address blacklist is not enough.

Outgoing transactions matter too. A customer sending funds to a high-risk counterparty may indicate a relationship that warrants enhanced due diligence or transaction blocking, depending on your jurisdiction.

Smart contract interaction

As DeFi matures, custodians are increasingly asked to hold assets that interact with smart contracts: staking positions, liquidity pool deposits, structured product vaults. Each interaction creates a risk exposure that traditional custody frameworks have no model for.

Smart contract risk monitoring covers interactions with newly deployed or unaudited contracts, contract upgrades that change the risk profile of existing positions, large withdrawals from protocols where custodied assets are deposited, and known exploit patterns such as flash loan attacks and oracle manipulation.

The most costly custodial incidents in recent years have not been private key compromises. They have been unexpected smart contract behaviours that drained assets before any human noticed.

Opsion Security Review, Q1 2026

Velocity and behavioural anomalies

Behavioural baselines are powerful signals. A wallet that has moved between 0.1 ETH and 2 ETH per day for six months, then suddenly initiates a 150 ETH transfer, deserves scrutiny regardless of the destination.

Velocity monitoring requires historical context per address, per asset, and per time window. Useful rules include volume exceeding 5x the 30-day average, transactions at unusual hours for the account's jurisdiction, rapid consolidation of many small inputs, and sudden changes in the mix of counterparties.

This category is also the most likely to surface account compromise before the customer notices. An attacker with access to a private key will often probe with a small test transaction before moving larger amounts. Velocity monitoring can catch that pattern early.

Network-level and cross-chain exposure

This is the category most custodians are not yet monitoring: systemic risks at the protocol or network layer rather than the individual wallet layer.

  • Bridge exposure: if custodied assets are bridged across chains, the security of the bridge protocol is part of your risk surface. Monitoring bridge contract TVL drops and unusual withdrawal patterns is not optional for custodians with cross-chain positions.
  • Stablecoin depegs: custodied stablecoin positions can lose value rapidly. Monitoring peg deviation against on-chain oracle prices provides earlier warning than exchange prices.
  • Protocol concentration: if a significant portion of custodied assets are in a single DeFi protocol, a governance attack or exploit on that protocol is a custodial risk. Concentration limits and monitoring go together.
  • Validator and sequencer health: for custodied assets on PoS chains or L2 networks, validator set changes, sequencer downtime, and governance proposals that affect consensus are relevant risk signals.

Turning signals into action

Monitoring these four categories produces a stream of signals. The operational challenge is getting those signals to the right person quickly enough to act. A counterparty risk flag on an incoming deposit is useful if it arrives before settlement. Twelve hours later it is much less useful.

Sub-3-second detection latency is not a marketing claim. For regulated custodians, the window between detection and obligatory action, whether freezing, reporting, or blocking, depends entirely on how quickly your monitoring infrastructure fires.

Opsion monitors all four risk categories out of the box, with alert delivery to Slack, Telegram, Lark, email, and webhooks. If you are reviewing your custody risk programme, we are happy to walk through how these categories map to your specific asset mix and jurisdictional requirements.

TO
Team Opsion
Opsion
More posts
Compliance
MiCAR Article 72: What on-chain monitoring looks like in practice
April 28, 2026 · 7 min
Engineering
Building a sub-3-second alert pipeline across 14 chains
April 14, 2026 · 9 min