FeedProjects
Developers
Settings
๐ŸŽ‰ A new chapter begins: Boardroom has joined Agora
Learn more
protocol logo
Explore / Projects
Moonwell

Insights

Proposals

Discussions

Members

Information

Reports

Meetings

Create Proposal

Moonwell

InsightsProposalsDiscussionsMembersInformationReportsMeetings
ProposalExecutable Code
Back to Proposals
executedEnded 7 months ago ยท  Onchain

MIP-B45: Remediation of Base Safety Module Rewards (Phase 1)

By 0x10b8...004bE5

Summary

This proposal reimburses stkWELL stakers on Base who lost rewards due to the reward calculation bug triggered by MIP-X28.

It creates a Merkl airdrop campaign to fully refund affected users for their pre-bug rewards, sets Base Safety Module emissions to zero going forward, and transitions reward distribution to Merkl claims.

For those unfamiliar, Merkl is an incentive distribution platform headed by the Angle Protocol team. The protocol connects liquidity providers and distributes rewards on behalf of both users and protocols. It leverages both onchain and offchain data to compute rewards and points for campaigns, giving it a range of flexibility. Read more here.

Wallets that overclaimed WELL following the execution of MIP-X28 will not receive additional tokens. A list of these addresses is published below, and they are encouraged to voluntarily return the excess tokens to the Temporal Governor contract. However, these wallets face no legal action should they choose not to.


Excluded Wallets

AddressAmount ClaimedAmount EarnedOver Claimed
0xE22B0ebE4b97be51fbB007871bC85FB6E1158Ef8445968896216449815419140445968.9445472.34
0x3d0cFCC2BaAf94a8ef9eba1A2C577CC35F20E4bF4053352478094962854821640533.5240512.11
0xe66E3A37C3274Ac24FE8590f7D84A2427194DC1715672062204203830819965241567206.221567195.79
0xeb2751d509f2b04d748b2e32e6a7a307a51e8c29271630709894679949014495271630.71271478.02
0xFB3E5CBCc4e995114025862Ceffec1AC94796FDe222530391861173085739049222530.39222412.42
0x98f6484b2400b251705822767117b6BA89A5d70e34630795126672666177364023463079.513460859.66
0x9F3fc75C2aA56DB0da8B70A70E63Dc0D27ba462811422709568172908423013621142270.961141659.17
0x6134F7D28B4E6C4b266c36acd6542B7a832c118b1403763394753343245406114037.6314032.35
0x1c0eC596303Ce6666f5a4D24c29e78Cf881cb5d310982653590390803303901381098265.361097542.95
0x200e073f2bb2E6c420dd986F52234815599B58Dd9753635256990447879137097536.3596423.28
0x9C5a7A7326Cb38765990aCfEeeD8F52316a8c0A7865287767464643428565865.29861.10
0xbb7809A2bF7B788CbEf16CA8F1e9D8Ab44756C9035179368675077194518523517.943515.69
0x27f52Daa475DA8DCd1e456b2d5e6C7382Bb0774D2184257428518318870021.8421.83
0x40d858CbD3Dfd86397dd9478e2287044419f892657034572724550875082675703.465585.58
0x85c9C226a6287d1A62F77857b687277C9c5011d690332104315139855700009033.218861.52
0xE009ed8E562FC31a88c2B2D8d53d22cd6E65257E3059625669195054147040230596.2630580.62
0x1bB0BdEE9a305de2ebD0a9d9752d690F839DaaA726327011979277983694232632.72628.60
0x35e5f7158957DaabE0c3C27D585e01a32A1C405c664035960555524858855664.04651.43
0xc8a5CE9ea6716B04F8c971b591DD0611318ec9D351990226860516296196995199.025087.26
0x5A2F97034b259e53568890cAf132164D5A9a3760137760144044125155504137.76137.59
0x04003e7b28D08bA3A3F9111702Ca8279d786c74C459670116144668201550459.67451.86
0x255aAf3e91f40eF6558f67d10Fcd19cFF44e358227316743065628299536322731.672729.89
0x22723cc5aE5a1B4514ca41F2466E2ADe15Cf529B11487983724088118787161148.81144.60

Background

On August 13, 2025, the execution of MIP-X28 updated reward speeds for the Base Safety Module. This triggered a bug in the reward configuration due to an edge case:

  • An address transferred stkWELL to the stkWELL contract, creating a non-zero balance in the contract.
  • An admin function was then called on Base to update the reward configuration, which caused reward accruals to inflate.

Key Points

  • Impact was limited to Base only.
  • User funds were never at risk.
  • The overflow caused reward accruals to spike, allowing the first 23 claimants to drain the full four-week reward budget (8.4M WELL).
  • Thanks to security practices that only fund rewards on a per-period basis, losses were limited to that reward window.

This proposal ensures stkWELL stakers are fully reimbursed for their legitimate rewards.


Proposal

If approved, this proposal will:

  1. Allocate WELL to fund a Merkl airdrop for all stkWELL stakers entitled to rewards prior to MIP-X28.

  2. Set emissions on the Base Safety Module to zero, preventing further distribution via the staking contract.

  3. Transition all Base Safety Module rewards to Merkl-based claims going forward, using Angle Protocol.

  4. Exclude the 23 wallets that overclaimed during the bug window.

    • They may voluntarily return excess WELL by transferring to the Temporal Governor contract:
      0x8b621804a7637b781e2BbD58e256a591F2dF7d51
    • Regardless of whether these wallets return the funds or not, they will not face any legal repercussions.
    • If you send within 100 WELL of the overclaimed amount we will consider your debt repaid.

Rationale

  • Restores trust in Moonwell staking by making affected users whole.
  • Provides a clean path forward by moving reward distribution to Angle Protocol, avoiding the need for a complete Safety Module liquidity migration on Base.
  • Maintains long-term alignment between stkWELL holders and Moonwell governance.

Implementation

  • Take a snapshot of stkWELL balances at the block immediately prior to MIP-X28 execution.
  • Generate a Merkl root of stkWELL staker entitlements.
  • Deploy a Merkl distributor via Angle Protocol.
  • Fund the distributor with the required WELL.
  • Communicate claim instructions to stkWELL holders.

Next Steps

This proposal covers Phase 1 remediation:

  • Reimbursing pre-bug rewards.
  • Transitioning to Merkl claims.

A future governance proposal will address post-bug rewards using a time-weighted distribution.


Voting Options

  • For: Approve the Merkl airdrop, set Base Safety Module emissions to zero, and transition rewards to Merkl claims.
  • Against: Do not reimburse stkWELL stakers or change Base Safety Module reward distribution.
  • Abstain
Continue Reading
Connect Wallet to Add Note
0
Votes 565
VoterCast PowerVote & Rationale
0xB540...6e78B4
16.542M

FOR

0xBB2b...2F26fD
15.057M

FOR

0x7A91...d1877c
12.134M

FOR

0x7374...048503
10.456M

FOR

0xcCa6...822738
7.565M

FOR

SHOW MORE
VOTE POWER
0
Connect Wallet
Proposal Status
  • Wed August 20 2025, 11:08 pmPublished Onchain 0x10b8...004bE5
  • Wed August 20 2025, 11:08 pmVoting Period Starts
  • Sat August 23 2025, 11:08 pmEnd Voting Period
  • Queue Proposal
  • Mon August 25 2025, 04:35 pmExecute Proposal
Current Results

1-FOR

280.174M

96.1%

2-ABSTAIN

8.085M

2.77%

3-AGAINST

3.297M

1.13%
Quorum 291.556M/100M
DocumentationBrandingContact Us