# Risks and mitigants

{% hint style="danger" %}
A vault is high risk when its TVL is a large % of the pool TVL as measured by [Vault/Pool](/charm/provide-liquidity/user-guides/vault-information-page.md#vault-pool), or if the pool's TVL is low.

These vaults have an increased risk of [market manipulation](https://chain.link/education-hub/market-manipulation-vs-oracle-exploits) and [adverse selection](https://en.wikipedia.org/wiki/Adverse_selection), both of which can lower its returns. High risk vaults will be clearly indicated on the front-end before every deposit.<br>

If you want to use high risk vaults to manage liquidity, please contact Charm for further assistance at [team@charm.fi](mailto:contact@charm.fi).
{% endhint %}

<details>

<summary>Unexpected price volatility</summary>

If there is unexpected price volatility, the vault's liquidity may become [Out Of Range](/charm/appendix/glossary.md#out-of-range-liquidity). The Liquidity may be worse than a Full-Range Position, and will only improve if the price moves back into range.

If projects are uncertain how the vault's tokens will trade, they can:

* Set a larger [Full-Range Weight](/charm/manage-liquidity/user-guides/vault-parameters.md#full-range-weight-fullrangeweight), so that there is still Liquidity if trading takes place Out Of Range.
* Set a wider [Base-Order](/charm/manage-liquidity/user-guides/vault-parameters.md#base-order-width-basethreshold) and [Limit-Order](/charm/manage-liquidity/user-guides/vault-parameters.md#limit-order-width-limitthreshold) to prevent tokens trading Out Of Range.

Projects can update the parameters at any time. For example, if the volatility is lower, they can increase Fee Income or Capital Efficiency by choosing a [narrow-range strategy](/charm/manage-liquidity/user-guides/create-vault/default-values.md#narrow-range-strategy), or by decreasing the value of Full-Range Weight.

To help projects chose parameters, Alpha Vaults' front-end will summarise what a vault will do [before](/charm/manage-liquidity/user-guides/walkthroughs/create-vault.md) and [after](/charm/manage-liquidity/user-guides/walkthroughs/edit-vault.md) it's created.

</details>

<details>

<summary>Infrequent Rebalancing</summary>

Anyone\* can Rebalance the vault, but if no one triggers rebalance, the vault's Liquidity Positions will not be updated as the price changes. The means the vault is more likely to underperform.

To [automate rebalancing](/charm/manage-liquidity/user-guides/walkthroughs/automating-rebalance.md), projects can use an automation solution (eg [Gelato Automate](https://www.gelato.network/automate)), incentivise their community to trigger rebalance, or use a keeper script to trigger rebalance themselves.

\*Vault Manager can turn this off so that only whitelisted addresses can call rebalance.

</details>

<details>

<summary>Price manipulation</summary>

Price manipulation occurs when attackers use large amounts of capital to swap tokens, in order to manipulate the price within a pool. If other protocols (eg lending protocols) use the pool's price as the oracle, value can be extracted from the protocol when the pool price is temporarily manipulated.

[Research shows](https://github.com/euler-xyz/uni-v3-twap-manipulation/blob/master/cost-of-attack.pdf) price manipulation is less likely if there is a Full Range Position and therefore, projects may wish to have a [larger](/charm/manage-liquidity/user-guides/vault-parameters.md#full-range-weight-fullrangeweight) % of liquidity in full-range if their vault is managing most of the liquidity within a pool.\
\
To protection against price manipulation, managers can do a [TWAP check](/charm/manage-liquidity/user-guides/vault-parameters.md#security-parameters) for every vault. By default, a TWAP check is performed for every vault created using Charm's front-end.  Managers may want to change the TWAP parameters to offer more security, but this will be at the risk of users not able to deposit or rebalance. It is **NOT** recommended to set a very low value for the TWAP duration, or a high value for the TWAP deviation, as the vault will be more vulnerable to price manipulation during deposits and rebalance.

</details>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://learn.charm.fi/charm/manage-liquidity/risks-and-mitigants.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
