Great point, for the most part I agree with this analysis around difficulty applying this to vaults v.s. things like Ark.
One point I'd make, is that if you set it up such that the signing oracle is getting paid somehow, over time, and people prefer to use the longest running signing oracles, you create a strong incentive to have long running honest bonds since then you forgoe a recurring revenue for a one-time sweep.
Further, given that the covenant creation using my keygen mechanism happens private from the oracle (entirely offline even!), the oracles aren't aware of which utxos they could even possibly do something with until a signature request is made.
Even then (and this part isn't in the paper, but I should add it as an addendum), it'd be possible to either restructure the oracle to be SIGHASH(tx) + ZKP(SIGHASH(tx), E_i(tx)), such that the oracle blind signs the TX without learning details / gaining broadcastability, or to do the signing in a homomorphic computation such that the txs are checked before sent back.
Then, in a single-party vault context:
- you'd be able to punish any misbehavior
- the oracle themselves wouldn't really be able to outright steal coins
- you'd likely also 2-of-2 with your own key so that you're both enforcing the same ruleset
the only further issue is liveness, which you'd have to handle with a different mechanism (e.g., 5-of-8 "ultra cold" keys + timelock in a tapleaf).