FeedProjects
Developers
Settings
🎉 A new chapter begins: Boardroom has joined Agora
Learn more
protocol logo
Explore / Projects
Ethereum Name Service

Proposals

Discussions

Members

Information

Create Proposal

Ethereum Name Service

ProposalsDiscussionsMembersInformation
Proposal
Back to Proposals
executedEnded 2 years ago ·  Onchain

[EP 5.14] [Executable] Endowment permissions to karpatkey - Update #4

By 0x76A6...32BbB8

Abstract

This proposal aims to introduce new permissions for deploying Endowment funds, focusing on improved diversification and alignment with the evolving market landscape and liquidity. We are also introducing an independent audit report together with the Permissions Update; this will be the standard practice for Permissions Updates going forward.

Motivation

Effective treasury management strategies must be adapted to market conditions and protocol updates; for existing Permissions, there might be migrations and introductions of new pools; for new Permissions, protocols and pools that were previously considered immature and unsuitable for the Endowment’s risk appetite may become viable options as they become more time- and battle-tested. This proposal seeks to request new permissions from the ENS DAO for karpatkey, enabling the introduction of new yield-generation strategies for the Endowment.

The new permissions have also been audited by ThirdGuard, an independent 3rd-party, to ensure the suggested changes have been thoroughly reviewed by a technically-competent, independent party.

Specification

New permissions implemented in this payload

  1. Deposit osETH on Aave v3;
  2. Stake (and unstake) ETH on Stakewise v3. Through the Genesis Vault.
  3. Mint (and burn) osETH on Stakewise v3. Through the Genesis Vault.
  4. WETH/osETH pool on Balancer;
  5. WETH/osETH pool on Aura Finance;
  6. Swaps:
  • WETH <> osETH on Balancer
  • USDC <> osETH on Uniswap v3
  • USDC <> WETH <> osETH on CoW Swap
  • RPL <> WETH on Uniswap v3
  • RPL <> WETH on CoW Swap
  1. Unsign order on Cow Protocol so that a pending order that has been submitted but not executed can be cancelled.

Additional implementation details

  1. The enableModule(address module) function is called to enable the modules, pointing it to the Avatar address (the Endowment).
  2. The payload to be executed upon the successful approval of this proposal can be found here. The proposed permissions policy can be visualised in the aforementioned link for ease of review.
  3. We have tested the payload to make sure all interactions mentioned on this proposal work as expected through our Test Safe.
  4. With the introduction of the new Roles App Permissions Visualisation tool, manually updating the “Preset Permissions - ENS Endowment” document is no longer necessary. The new tool provides an up-to-date and accurate method for exploring the current permissions granted to karpatkey by the ENS DAO.

Auditing process

Introduction of an independent audit report

We have received feedback in the previous proposal that independent, 3rd party code review would be helpful for the ENS community and delegates to make a more informed decision and to reduce delegate fatigue.

In our commitment to transparency and effort towards DAO efficiency, karpatkey decided to engage with independent, third-party firms / individuals for every contract upgrade starting with this proposal. ThirdGuard has been engaged for this proposal’s code review; ThirdGuard is a provider of on-chain risk monitoring solutions, and has been working with the Zodiac Roles Modifier since its inception (and its precursor, Scope Guard). Given their past experiences across Zodiac Roles Modifier, Solidity, and DeFi risk management, ThirdGuard was deemed to be a suitable candidate to fulfil the role of policy reviewer. Their approach to auditing the permissions can be found here.

The ThirdGuard audit for the permissions in this payload can be found here.

Audit report summary is as follows:

  • No material findings were found.
  • Policy changes requested were considered bona fide actions needed by the Manager to carry out their DeFi operations.
  • 1 Informational Finding and 1 Warning were logged, and acknowledged by karpatkey. These findings do not post an immediate risk but are relevant to security best practices.
Continue Reading
Connect Wallet to Add Note
0
Votes 151
VoterCast PowerVote & Rationale
0x5BFC...418390
193,399

FOR

0xb8c2...A267d5
129,574

FOR

0x8393...6F0780
129,379

FOR

0x9831...1b6744
123,495

ABSTAIN

0x76A6...32BbB8
116,430

FOR

SHOW MORE
VOTE POWER
0
Connect Wallet
Proposal Status
  • Sat August 24 2024, 03:20 pmPublished Onchain 0x76A6...32BbB8
  • Sat August 24 2024, 03:20 pmVoting Period Starts
  • Sat August 31 2024, 12:59 amEnd Voting Period
  • Sat August 31 2024, 02:04 pmQueue Proposal
  • Mon September 02 2024, 02:08 pmExecute Proposal
Current Results

1-FOR

1.142M

83.18%

2-ABSTAIN

224,186.62

16.33%

3-AGAINST

6,780.65

0.49%
Quorum 1.373M/1M
DocumentationBrandingContact Us
Home
This Project is Currently Disabled

If you would like to enable it, please checkout below.

Boardroom Subscription

Sign up for an individual subscription (access all projects on the platform)

Subscribe
Enable Project

Enable the entire project for every user

Enable Project
Contact Us