ByAUJay
“DAO Treasury Multisig,” “ExecutionSuccess,” and Governance Attack News: Lessons for DAO Governance Consultancy
Summary: The most secure DAOs treat their treasury multisig like a finely-tuned, policy-driven operation instead of just a basic wallet. In this guide, we’ve pulled together insights from recent governance attack news and on-chain event data (such as “ExecutionSuccess” and module events) to craft a practical blueprint that you can dive into right now.
Why this matters now
In 2025-2026, we saw DAO treasuries really take off, hitting values in the tens of billions. But with that amazing growth came a crucial reminder: “votes” are only as secure as the systems and monitoring that support them. Just look at the drama surrounding Compound's proposal in 2024, the governance takeover of Tornado Cash in 2023, and the various attempts to mess with “zombie‑DAOs.” These situations clearly show that a rushed vote over a weekend, some careless delegates, or even a couple of misconfigured settings can put huge treasures--sometimes worth nine figures--at risk. Want to dive deeper? Check out more details here.
This post goes over the recommendations from 7Block Labs for founders, CFOs, and protocol leads who want to kickstart or improve their DAO treasury operations on EVM chains. We’ll explore how to utilize Safe (formerly Gnosis Safe), Zodiac modules, and check out some of the newest monitoring techniques.
Part 1 -- “ExecutionSuccess” isn’t just a log line: it’s your ground truth for treasury actions
If your DAO is using Safe for its treasury multisig, every time an on-chain event occurs, it kicks off a notification. There are a couple of important ones you definitely want to watch out for:
- ExecutionSuccess(bytes32 txHash, uint256 payment) -- This event gets triggered when a regular multisig transaction is completed. If you want to dive into the specifics, check out Topic0:
0x442e715f626346e8c54381002da614f62bee8d27386535b2521ec8540898556e. You can easily find this on any Safe transaction log page over at Etherscan. It's pretty standard for larger DAO treasuries like Frax to use this when they execute transactions. (pkg.go.dev) - ExecutionFromModuleSuccess(address module) -- You’ll see this message when a module successfully executes a transaction for the Safe without needing the owner signatures. It's a big deal for governance setups that use modules for automatic execution. If you want to check out some examples, take a look here: (gnosisscan.io).
Why You Should Care:
Here’s the scoop: staying in the loop about important topics can truly change the game. Whether it’s catching up on the latest headlines or diving into specific issues, everything ties back to our daily experiences.
Here are a few key reasons:
- Empowerment: Having knowledge really puts you in the driver’s seat when it comes to making smart choices. When you’re in the loop, you can steer your way through decisions, whether it’s about casting your vote or handling your finances.
- Community Engagement: Staying informed really boosts your ability to connect with your community. It opens up opportunities for discussions, lets you pitch in at local events, and helps you meet others who are into the same things you are.
- Personal Growth: Diving into different perspectives and topics truly expands your horizons. It’s like cracking open a window to a fresh breeze of new ideas and cultures.
- Future Readiness: Keeping yourself in the loop is key to gearing up for what's on the horizon. This includes catching up on tech trends, watching for changes in the job market, and being aware of evolving social issues.
- Informed Advocacy: When you're passionate about certain causes, having the right info makes all the difference. It lets you really speak up, back initiatives, and make an impact where it counts.
Take a second to soak in all that info out there. You’d be surprised at how it can help you and those around you in ways you might not even realize!
- These events are your ultimate "source of truth" when it comes to keeping tabs on money movements or authority actions. They're what you'll want to monitor in your SIEM, and auditors will definitely be looking at these too. With Safe’s Events Service and API, tracking all this is super easy. Take a look over on GitHub.
- It's super important to know the difference between owner-signed ExecutionSuccess and module-initiated ExecutionFromModuleSuccess. Basically, one means “a person put their stamp on this,” while the other means “automation handled it.” Make sure your guardrails and alerts are set up to reflect that difference. If you want to dive deeper, check it out on Gnosis Scan.
Practical Telemetry Checklist
When you're getting into telemetry, having a good checklist can really keep you organized and ensure you don’t miss anything important. Here’s a handy list to help you out:
1. Define Your Objectives
- What kind of insights do you want to uncover?
- Are you keeping an eye on performance, user behavior, or maybe the system's health?
2. Identify Key Metrics
- Create a list of the metrics that really matter for your goals.
- Here are a few that often come up:
- Response time
- Error rates
- Throughput
- User engagement
3. Select Your Tools
- Pick the right tools to gather and analyze your telemetry data. Here are some well-loved choices:
- Prometheus
- Grafana
- Elastic Stack
4. Ensure Data Accessibility
- Ensure that you can easily access the data you need. Keep these in mind:
- API endpoints
- Databases
- Third-party services
5. Set Up Data Collection
- Go ahead and set up your data collection using the tools you've picked.
- For instance, if you're going with Prometheus, make sure to configure the right exporters to get everything running smoothly.
6. Implement Data Storage
- Figure out how and where you want to store your telemetry data. Here are a few options to consider:
- Time-series databases
- Cloud storage
- Local servers
7. Create Dashboards
- Create dashboards that bring your telemetry data to life.
- Check out tools like Grafana; they give you awesome flexibility for crafting visuals that really make an impact.
8. Monitor and Analyze
- Make it a habit to check your telemetry data often.
- Watch out for trends and anomalies so you can spot problems before they escalate.
9. Iterate and Improve
- Keep using the insights you collect to make your system or app better and better.
- Make sure to check back on your goals and the metrics you’re tracking so you can adjust things when necessary.
10. Documentation
- Keep track of your processes and findings. This is super helpful for bringing new team members up to speed and ensuring everything stays clear and organized.
Telemetry is all about gathering useful info that helps you make smarter decisions. So, take your time with each step, and you'll be on the right track to success!
Wire up these event/topic monitors across your treasury Safe(s):
- ExecutionSuccess and ExecutionFailure -- these will give a shout-out to the on-call team if the value or token approvals cross the set policy limits. Check it out here: (pkg.go.dev)
- ExecutionFromModuleSuccess/Failure -- keep an eye on the module address and get an alert if it’s not on your allowlist. More details can be found at: (gnosisscan.io)
- ChangedThreshold, ChangedGuard, ChangedModuleGuard -- these events are like your watchful friends, letting you know if your signing rules or guards have changed without you even noticing. Check the specifics here: (docs.safe.global)
- EnabledModule/DisabledModule -- remember, modules can take control of your Safe, so turning them on or off is a pretty big deal. The Safe contracts themselves warn that a malicious module can completely take over your Safe. Get more info at: (gnosisscan.io)
Tools That Make This Easy
When it comes to making tasks easier, using the right tools can really change the game. Here are some solid options you should consider:
Task Management
- Todoist: This app is super easy to use and is a fantastic tool for organizing all your tasks and projects. It’s just what you need to stay on top of your schedule!
- Trello: If you like a visual approach, Trello’s got you covered with its boards and cards. It’s perfect for collaborating with others and keeping track of your progress.
Note-Taking
- Evernote: This is an awesome tool for quickly capturing notes, saving articles, and keeping all your thoughts organized in one neat spot.
- Notion: A super flexible platform that brings together notes, task management, and databases. You can customize it to match your style and needs perfectly.
Communication
- Slack: This is a cool messaging app built for teams. It helps keep all your conversations in check with channels and direct messages, so you don't lose track of anything.
- Zoom: When it comes to video calls, Zoom is where it’s at. Whether you're having a quick catch-up or hosting a big meeting, it makes everything super easy.
Time Management
- RescueTime: This handy tool keeps tabs on how you’re spending your time on your devices. It really opens your eyes and helps you hone in on what truly matters.
- Toggl: Super straightforward time tracker that shows you exactly where your hours are going. Perfect for freelancers or anyone who needs to keep an eye on billable hours.
Automation
- Zapier: Think of it as your personal assistant that links all your favorite apps together to tackle those boring, repetitive tasks.
- IFTTT: Short for "If This Then That," this tool is great for automating tasks between different apps. It's a lifesaver when you're trying to streamline your workflows!
Having the right tools can really make a difference. Check out these options and find the ones that suit your style the best!
- Check out the Safe Transaction/Events Service for managing transactions and webhooks in a more streamlined way. You can find all the details here.
- Just a little heads up about the OpenZeppelin Monitor: Defender is going to maintenance mode soon, so it's a good time to think about migrating those monitors. You'll get notifications via Slack, Telegram, and PagerDuty, plus some handy policy filters. Take a closer look here.
Part 2 -- What recent governance attacks actually teach us
- Tornado Cash (May 2023): So, there was this crazy episode where an attacker pulled off a sneaky stunt with a “look-alike” upgrade proposal and snagged 1.2 million fake votes. This gave them total control over governance for a little while. They even managed to cash in on some governance assets! Luckily, a later proposal helped regain control. The big lesson here? Always take the time to check bytecode-level diffs and run those simulations; don’t just take things at face value. (cointelegraph.com)
- Compound (July 2024): Back in July, a hefty proposal backed by some big players tried to funnel around $24 million in COMP into a yield wrapper, but it barely passed due to low participation. The community and market makers quickly labeled it a governance attack, which prompted a rapid reversal of the whole idea. The takeaway? Having weekend quorums and inactive delegations can really leave you exposed; it’s high time to consider some structural brakes and put participation SLAs in place. (coindesk.com)
- Indexed Finance DAO (Nov 2023): This unfortunate “zombie DAO” was on the brink of disaster, almost losing about $90K through a self-serving proposal. Thankfully, public blackmail swooped in to save the day. What can we learn from this? Even the smallest or most overlooked treasuries can be at risk; that’s why it’s super important to have wind-down protections and spending caps in place. (blockworks.co)
- Arbitrum (2023): So, the whole AIP-1 omnibus situation and those 700 million ARB treasury politics weren't really a direct “attack,” but they definitely shone a light on the chaos that can happen when off-chain goals, treasury control, and multisig arrangements are out of sync. The main takeaway here? It's super important to keep “coin and state” separate and ensure there’s transparency about what can actually be done. Check out more about it here: (coindesk.com)
Two Positive Counter-Examples
When we chat about counter-examples, we usually zero in on the stuff that shakes our beliefs or theories. But you know what? Sometimes it’s nice to highlight examples that actually back up what we think. Here are two uplifting counter-examples that really catch your attention:
1. The Power of Collaboration
You know, we often hear that competition is the name of the game when it comes to innovation. But take a look at open-source projects like Linux--they tell a different story. Developers from all corners of the world come together to collaborate rather than compete, and the results are pretty impressive. This community-driven vibe has not only given us a powerful and free operating system but has also proven that teamwork can lead to some amazing breakthroughs.
2. Healthy Eating on a Budget
Another widespread myth is that eating healthy has to cost a fortune. But check out these budget-friendly meal plans that emphasize whole foods. You really don’t have to blow your budget on organic fruits and veggies or trendy superfoods! Plenty of folks have figured out how to whip up nutritious meals while keeping their expenses in check. With a little bit of planning and savvy shopping, you can savor healthy eats without breaking the bank.
These examples demonstrate that, contrary to what many people think, teamwork and making thoughtful decisions can actually lead to great results.
- ENS DAO: They've put together a Security Council (4‑of‑8 Safe) that can veto any sketchy proposals, making sure everything stays above board. Plus, there's a well-managed endowment that offers public performance metrics. This whole setup blends community voting with an emergency shutdown option and strong treasury management. Take a look here: (basics.ensdao.org).
- Optimism Collective: They just launched a Multisig Security Policy for the multisigs managed by the council. This policy sets clear guidelines on membership, how to dissolve it, and the security measures in place since they’re shifting more treasury actions on-chain. Curious to dig deeper? Check it out here: (gov.optimism.io).
Part 3 -- Designing a DAO treasury multisig that resists real‑world failures
Principle A -- Separate “coin” and “state”
When we chat about separating “coin” from “state,” we’re really getting into why it’s so crucial to keep digital currencies free from government control. Here’s the lowdown on why this is such a big deal:
- Financial Freedom: When coins are linked to a state, it can put some limits on how folks can spend their cash. By separating them, we make sure that users have complete control over their finances.
- Reduced Manipulation: When a government has control over a currency, it can tweak it for political advantage. Having a separate coin means there's less risk of that kind of manipulation occurring.
- Encouraging Innovation: When we separate currency from state, we open up a playground for fresh ideas to thrive, free from the hassle of regulatory red tape.
- Global Accessibility: A decentralized coin has the ability to connect with folks all around the world, no matter what their government’s rules are regarding currency.
- Resilience Against Censorship: When cryptocurrencies are mixed up with government systems, it's easier for those in power to censor transactions or even freeze people's accounts. By having a separate coin, it becomes trickier for them to pull off those moves.
Keeping “coin” separate from “state” is really about giving power back to individuals and creating a healthier economic environment. This idea is key to building a strong digital currency ecosystem.
Balancer’s 2025 proposal is pretty impressive because it clearly splits governance power from asset custody. This means that a governance executor can’t accidentally--or on purpose--get their hands on all the assets. It really helps reduce risk and makes it easier to manage operational costs without dragging down governance. For more info, head over to the forum.
Concrete Split:
Concrete split happens when the surface of concrete begins to crack or peel apart. There are quite a few reasons why this can happen, and getting a grip on them can help you prevent or tackle these problems effectively.
Causes of Concrete Split
- Temperature Changes: When the weather gets super hot or really cold, it can make concrete expand or contract, which often results in cracks.
- Poor Mixing: If the concrete wasn’t mixed properly or had way too much water in it, that could really compromise the strength of the structure.
- Improper Curing: Skipping out on proper curing for your concrete can cause some serious problems later on.
- Heavy Loads: Putting too much weight on a concrete surface can lead to splits and cracks forming.
- Soil Movement: When the soil under the concrete shifts, it can cause the surface to lift or settle, creating stress that can affect the structure.
Prevention Tips
- Choose the Right Mix: It’s super important to mix your concrete just right. Stick to the guidelines to ensure you're getting the best strength out of it.
- Proper Curing: Make sure to keep the concrete nice and moist during the curing process. This helps it build up strength and durability.
- Control Load: Keep an eye on what you put on concrete surfaces so you don’t go over their weight limits.
Repair Options
- Sealants: Applying a sealant can really help safeguard your concrete against moisture and stop any additional damage from happening.
- Resurfacing: When the cracks are pretty deep, resurfacing can be an awesome way to bring back that smooth look to your concrete.
- Replacement: Sometimes, if the damage is really bad, you might have to consider replacing the entire concrete slab.
Conclusion
Getting a grip on why concrete cracks is key to saving both time and cash on repairs. If you take some smart steps ahead of time and learn how to tackle the problem when it shows up, you'll keep your concrete surfaces looking sharp and extending their lifespan!
- Governance Safe: This one’s in charge of managing protocol upgrades and keeping an eye on the modules and guards. Just a heads-up, it doesn’t really hold a lot of assets.
- Treasury Safe(s): This is where the assets are kept safe and sound. They only take action based on a trusted “executor role” that’s been approved through the modules/guards. Oh, and they absolutely won’t accept any delegate calls, no exceptions.
- Working-Capital Safes: These come with daily limits to keep everything running smoothly. They have different signers and keys to handle grants and operations.
Principle B -- Enforce Policy in Both Plans (Owner-Signed and Module-Executed)
When we're talking about enforcing policies, it’s crucial to pay attention to both the owner-signed and module-executed planes. Basically, we need to make sure that policies are followed on both fronts to keep everything running smoothly and securely. Here’s a breakdown:
- Owner-Signed Policies: These are the formal rules and guidelines that the owner agrees to. You can think of them as the backbone of your governance strategy. They outline the bigger picture--what you believe in and how you want everything to run smoothly.
- Module-Executed Policies: These are the policies that kick in automatically thanks to the modules. They take the policies signed by the owner and turn them into real-life actions in day-to-day operations. It's all about putting things into practice.
By putting policies into action in both areas, you’re building a strong system that not only establishes the standards but also makes sure they’re followed. This two-pronged strategy is great for keeping compliance in check, reducing risks, and making sure everyone’s aligned. It’s really about finding that sweet spot between what’s promised and what’s actually done!
Modern Safe is here to support you with both Guards and Module Guards. By utilizing both, you can ensure that every execution path goes through a solid policy check. This covers rules like “no delegatecall,” “only these selectors/targets,” “per‑day cap,” and a bunch more. Just remember, your risk model should account for the chance that a module might be misconfigured or updated. For more info, dive into the details here.
Principle C -- Serialize with Delay and Human Veto
In this principle, we emphasize the importance of making sure systems can adapt to changes in a thoughtful way. It’s really about pausing for a moment to assess the situation before diving in. Here’s the scoop:
- Serialization with Delay: Here’s the deal -- we’re taking our time. Rather than firing off changes right away, we pause to catch our breath and map things out. This way, we can tackle everything more thoughtfully and keep those pesky errors at bay.
- Human Veto: This section highlights just how vital it is to have a human involved in the decision-making process. Even with all the fancy automation kicking in, there should still be a chance for someone to step in and give the thumbs-up on major decisions. It's all about maintaining that essential human touch where it truly matters.
By blending these two elements, we can build systems that are not only efficient but also considerate and responsible. Tapping into our human judgment helps reduce risk and makes sure we're making the best choices we can.
Timelocks and Delay Modifiers (Zodiac) add a handy cool-down phase between when a proposal gets the green light and when it goes into action. To ramp up the effectiveness, you can pair them with a more compact Security Council that can hit the brakes on any actions during that waiting time. ENS has really nailed this balance. Take a look at it here: (github.com)
Principle D -- Make Off-Chain Signal Binding the Right Way
When we talk about off-chain signal binding, it’s really about nailing the details. This principle highlights just how crucial it is to link on-chain and off-chain signals effectively. Here’s what you should remember:
- Clarity is Key: Keep your signals clear and easy to understand. This way, everyone involved knows what's going on without any mix-ups.
- Consistency Matters: Stick to a consistent way of binding signals. If things get inconsistent, it can lead to misunderstandings and unexpected results.
- Reliability is Crucial: Make sure your off-chain signals are dependable. If people can’t trust them, the whole system falls apart.
- Flexibility is a Plus: While being consistent is super important, it’s also good to stay flexible. Being able to adjust when needed can really help you tackle changing situations or needs.
By adding these elements, you’ll be able to create off-chain signal binding that’s both effective and efficient.
Snapshot is pretty useful, but it operates off-chain. This means if you're relying on it, you'll still need to take care of things manually, which could open the door for potential attacks. If you have to use Snapshot, be sure to run it through a secure execution pipeline like Zodiac Reality (with arbitration) → Roles/Delay → Safe. And definitely have human kill-switches in place for any unexpected situations. (daotimes.com)
Principle E -- Know Exactly What You’re Alerting On
When it comes to alerts, being clear is super important. You want each alert you create to really matter and be linked to particular situations. Here’s how to get it right:
1. Define Your Criteria
Before diving into creating alerts, it's a good idea to pause and consider what actually matters. Take a moment to ask yourself questions like:
- What particular events or thresholds should we set up alerts for?
- Are we concentrating on performance, security, or a mix of both?
2. Be Specific
General alerts can really contribute to alert fatigue, making folks tune them out when they feel overwhelmed. It’s super important to keep your alerts clear and focused. Rather than just saying, "system performance issue," consider being more specific, like, "CPU usage exceeds 80% for 5 minutes."
3. Prioritize Alerts
Not every alert carries the same weight. Some problems need a quick response, while others can chill for a bit. It's a good idea to sort your alerts by urgency and impact so your team knows how to react in the best way possible.
4. Regularly Review and Adjust
Since technology and business demands are always evolving, it’s a good idea to make it a regular practice to check your alerting criteria. Doing this helps you stay on top of things and ensures everything remains relevant and useful.
5. Provide Context
Add some context to your alerts so your team can easily grasp their significance. This might involve dropping in links to documentation, pointing out relevant logs, or just adding a quick description of what the alert is all about.
If you stick to these guidelines, you can make sure every alert you set up has a clear purpose. This way, your team stays in the loop without feeling swamped.
Setting Up Monitors to Trigger On:
To get started with configuring your monitors, make sure you’re looking to trigger on these specific conditions:
- High CPU Usage: You might want to keep an eye on that server CPU usage. If it goes over a certain threshold, it’s definitely worth monitoring.
- Disk Space: Nobody likes running out of disk space! Set up a monitor to alert you when your available space dips below a predetermined percentage.
- Response Time: If your application starts lagging behind, it can really hurt user experience. Monitor response times so you can catch any slowdowns early.
- Error Rate: Keep track of the error rates in your logs. A spike in errors could indicate a bigger issue that needs your attention.
- Network Latency: High latency can be a real pain, especially for cloud applications. Set up a monitor for latency levels to ensure your app is running smoothly.
- SSL Certificate Expiration: Don't let your SSL certificates expire! It's a good idea to keep tabs on their expiration dates so you can renew them on time.
- Service Downtime: Automatically monitor your services to get alerts if something goes down. This way, you can jump on any issues before they affect too many users.
With these triggers in place, you’ll be better equipped to handle any hiccups that come your way!
- CPU Usage: Watch out for those times when your CPU usage climbs over 80% for longer than 5 minutes. Keeping tabs on this can really help you spot any unexpected spikes or performance hiccups.
- Memory Usage: Create a trigger that goes off when memory usage hits over 75% for 10 minutes straight. This is a great way to catch any potential memory leaks or situations where things are getting overloaded.
- Disk Space: Keep an eye on your disk space and set up alerts for when it drops below 10% free. You really don’t want to run out of space for those crucial files!
- Network Latency: Set up an alert for when network latency goes over 200 ms. When latency spikes, it can really drag down your application's performance and leave users frustrated.
- Application Errors: It’s a smart move to set up a monitor for your app that alerts you when error rates creep above 5% in an hour. Keeping an eye on this is super important for making sure your app keeps running smoothly.
- Service Availability: Stay in the loop if any important service is down for more than 2 minutes. Keeping these services running smoothly is essential for delivering a great experience.
By setting up these monitors, you’ll be proactive about catching any potential issues and keeping your system in top shape!
- If you spot any
ExecutionFromModuleSuccesswhere the module isn’t on the allowlist or the selector doesn’t match the policy, definitely take a look at this link. - Keep an eye on
ChangedThresholdwhen it drops below the baseline, or if eitherChangedGuardorChangedModuleGuardis set to0x0(which means it's switched off), or if there's a new module being activated. You can find more info here. - It’s important to watch for ERC‑20 approvals coming from the treasury to unknown spenders, especially if they’re unlimited. These red flags often pop up right before funds are drained, but guards can help prevent that. Dive into the documentation here for more details.
Principle F -- Publish and Practice the Runbook
When it comes to keeping your operations running like a well-oiled machine, a solid runbook is a game changer. But remember, writing the runbook is just the first step. You also want to ensure it's easy for everyone to find and that your team is consistently practicing its use. Here’s how to really get the most out of your runbook:
- Put It Out There: Once you’ve got the runbook ready to roll, make sure to share it somewhere everyone can easily access it. Whether that’s a shared drive, a wiki, or a specialized documentation platform, just ensure it’s clear and well-organized.
- Make It Everyday Practice: Don't let that runbook sit idly on the shelf! It’s a great idea to set up regular training sessions or drills so the team can get hands-on with it. This way, everyone can get comfortable using the runbook, and you'll pinpoint any parts that might need a little tweaking.
- Keep It Updated: Make sure your runbook stays in sync with your processes. Whenever there are changes in systems or you bring in new tools, give the runbook a refresh. Setting up regular reviews can help you keep everything on point and relevant.
- Gather Feedback: It’s super helpful to get your team involved in sharing their thoughts on how well the runbook works. They could have some great suggestions or might catch gaps you may have overlooked.
By sticking to these steps, you'll end up with a great runbook and a team that's all set to jump into action when it matters most. Happy documenting!
A solid setup is just the start; you really need that muscle memory to make it work. So, don't forget to jot down your incident playbook and give it a run-through every three months:
- Disable module X, re-enable guard Y, increase the threshold to N, cancel the approvals for token Z, pause the upgrade proxies, and move any extra liquidity to the cold Safe.
- Figure out who's in charge of paging each signer depending on their time zone, and lay out a plan for key rotation after any incidents.
Part 4 -- A hardened reference architecture (2026‑ready)
Here’s a great setup we recommend to clients managing anywhere from $25 million to $1 billion in treasuries on Ethereum and Layer 2 solutions.
1) Control Plane
The control plane acts as the brain of your network. It's in charge of managing data flow and making sure everything operates seamlessly. This includes taking care of tasks like routing, signaling, and setting up devices.
Key Functions of the Control Plane:
- Routing Protocols: These protocols help figure out the best paths for data to travel, ensuring it reaches its destination quickly and efficiently.
- Signaling: This is all about setting up and keeping communication going between devices. You can think of it like the friendly chat that gets everything sorted before the data starts moving.
- Device Configuration: It handles the settings and configurations of all the devices in the network, making sure they run smoothly and can talk to each other without any hiccups.
Why It Matters
A smoothly running control plane can seriously boost your network’s performance and reliability. It’s super important for scaling operations and adjusting to traffic changes seamlessly.
If you want to really understand how the control plane works, take a look at this article.
- Governance Safe (3‑of‑5)
- Owners: So, we’ve got 5 independent players in the mix here--think of them as the Foundation, key delegates, and various ecosystem organizations. They’re all secured by hardware wallets, which is pretty cool.
- Modules: Right now, there aren't any modules set up by default.
- Guards: We've got a Transaction Guard in place that’s pretty strict. It makes sure that “no asset moves greater than $10k” and no “delegatecall” is permitted.
- Responsibilities: This involves handling upgrades for both guards and modules, plus managing permissions for the Execution Role address exclusively.
2) Asset planes
Understanding Asset Planes
Asset planes play a vital role in keeping track of all the different assets in a project. They’re essential for organizing, monitoring, and taking care of these assets in an efficient way. Let’s dive into the key points you should know about asset planes:
- Definition: Asset planes are basically the organized layers or categories you set up to sort various types of assets. This setup helps you find and manage them more easily.
- Purpose: The main idea behind asset planes is to make your workflow smoother. By organizing your assets into distinct planes, you can keep things organized and boost your productivity.
- Types of Assets: There are a few common types of assets you’ll likely encounter, such as images, videos, audio files, documents, and pretty much any other media that’s relevant to your project.
- Implementation: As you get your asset planes ready, think about how you'll actually use each kind of asset. For instance, you could create separate planes for things like graphic designs, promotional materials, or even project documentation.
- Best Practices:
- Stay Organized: Take some time to regularly go through and clean up your asset planes so everything’s in its right place.
- Choose Clear Names: Using descriptive names for your planes will definitely save you some headaches later on.
- Team Up: If you’re in a team setup, ensure everyone’s on the same page regarding the structure of the asset planes. It makes collaboration a whole lot easier!
Here's a straightforward way to help you visualize asset planes:
Project Assets
├── Images
│ ├── Logos
│ ├── Backgrounds
│ └── Characters
├── Videos
│ ├── Trailers
│ └── Behind the Scenes
└── Audio
├── Sound Effects
└── Voice Overs
With these asset planes in your back pocket, you're all set to handle your project assets like a pro!
- Treasury Safe (4‑of‑7)
- Modules:
- We’ve set up a Roles Modifier featuring one main role: “proposal_executor.” The allowlist includes:
stablecoin.transfer/approvefor vetted counterparties only,- Staking and unstaking actions that get the green light from the protocol,
- Multisend transactions from trusted addresses,
- A maximum outflow cap of assets every 24 hours.
- Delay Modifier: There's a cooldown window of 24 to 48 hours, and everything expires after 7 days.
- We’ve set up a Roles Modifier featuring one main role: “proposal_executor.” The allowlist includes:
- Guards:
- Transaction Guard: This feature blocks delegate calls, unknown ERC‑20 approvals, long-term approvals lasting more than N days, and anything that could fall victim to re-entrancy attacks.
- Module Guard: This one works like the Transaction Guard, applying the same checks for module calls to keep things consistent.
- Monitoring:
- We’re using webhooks to keep tabs on Execution Success/Failure and Execution From Module Success/Failure, all with policy filters to make sure everything runs smoothly.
- Drift is on the lookout for changes like ChangedThreshold, ChangedGuard, ChangedModuleGuard, and whether a Module is Enabled or Disabled.
- Off‑ramps:
- We’ve got a Cold Safe (3‑of‑5) for holding assets in the long run, and it operates without any modules. Only batched, time-locked moves are allowed in this setup.
- Modules:
3) Governance Bridging and Veto
When we chat about governance in this context, we're really getting into how various groups or levels of authority can join forces--or sometimes butt heads--over decision-making. Governance bridging is all about those strategies that help link up different stakeholders, making it smoother for them to collaborate and get things done effectively.
What is Governance Bridging?
Governance Bridging
Governance bridging is all about creating pathways between different groups. It helps break down barriers and encourages teamwork. Imagine it like building bridges between islands, allowing everyone to share resources, ideas, and work towards common goals. This process can involve:
- Facilitating communication: Making sure everyone’s in the loop and that their thoughts and ideas are valued.
- Creating shared goals: Assisting various groups in pinpointing objectives that everyone can rally around.
- Building trust: Nurturing relationships that promote teamwork instead of rivalry.
The Role of Veto
Now, let's dive into veto power! This is where it starts to get a little complicated. A veto gives one party the authority to stop a decision or action. This can be great for safeguarding the interests of minorities, but if it’s used too often, it might just throw everything into gridlock. Here’s why this really matters:
- Checks and balances: This system helps prevent any one group from taking over decisions, making sure power stays balanced.
- Encourages negotiation: When folks know that someone has the power to veto a decision, it often pushes them to negotiate and look for common ground.
- Risk of deadlock: However, if too many people hold veto power, you could end up in a scenario where nothing gets accomplished.
Balancing Bridging and Veto
Finding the right mix between effective governance and the strategic use of veto power can be a bit of a challenge. Here are some steps you might want to think about:
- Encourage open dialogue: Keep the conversation flowing! Regular chats can help spot potential veto points before they turn into real problems.
- Define the scope of veto power: Be clear about when and how vetoes can be used. This helps prevent any misuse down the line.
- Seek consensus: Aim for decisions that everyone can get behind whenever you can. This way, you’ll cut down on the need for vetoes.
To wrap things up, governance bridging and veto power are super important in how groups get together and make choices. When handled properly, they can really enhance teamwork and lead to better results for everyone.
- The “Security Council” is in a decent position (4 out of 8) with one key ability: it can scrap any questionable transactions that are in the queue, but it doesn’t have the power to suggest new ones. It’s important to lay out the document's scope, conflict-of-interest policy, and a plan for a sunset review. A great example to look at is the public write-up from ENS. You can find it here: (basics.ensdao.org)
4) Automation and Observability
The Role of Automation and Observability in Software Development
In today's world of software development, automation and observability are absolutely essential for keeping things running without a hitch. Let’s dive a little deeper into what that really means.
Why Automation?
Automation makes it easier to handle those repetitive tasks, letting you save time and cut down on human mistakes. Here are some of the top perks:
- Efficiency: Tasks get wrapped up quicker when there's no need for constant oversight.
- Consistency: When processes are automated, you can expect the same results every single time.
- Focus on What Matters: With the boring stuff out of the way, teams can dive into innovation and tackle those tricky problems that really need attention.
Understanding Observability
Observability is really about getting a clear view into your systems. Think of it as having a fancy dashboard that helps you monitor everything that's going on under the hood. Here’s why it matters so much:
- Real-time insights: Staying updated on what’s going on in your system in real-time lets you spot problems before they become big headaches.
- Better decision-making: Having detailed metrics and logs at your fingertips means teams can make smart decisions on the fly.
- Improved performance: When you get a grip on how your system behaves, it’s easier to tweak and boost performance overall.
Bringing It All Together
Mixing automation and observability is like having the perfect recipe for smooth software development. It helps you save time, cut down on mistakes, and gives you the power to troubleshoot and optimize without breaking a sweat.
Bringing these practices into your daily routine can really streamline your development process and keep your team feeling great. Just remember, having a well-monitored and automated system is a big step towards making life easier in the software development world!
- Dive into the Safe Events/Transaction Service for all your decoding needs and webhooks. And don’t miss out on the OpenZeppelin Monitor--it's awesome for alerts and those handy automated response playbooks. You know, things like auto-raising thresholds or revoking approvals when something seems off. Just a little reminder: the old "Sentinel" product from Defender is on its way out, so make sure you switch to Monitor from here on out. (docs.safe.global)
5) Organizational Guardrails
Alright, let’s jump into what we mean by organizational guardrails. Picture these as the boundaries and guidelines that keep everything running smoothly in a company. They help the organization stay focused and aligned with its goals while still allowing for some flexibility where it matters.
Here’s a rundown of what you can usually find in these guardrails:
- Clear Objectives: It’s super important for everyone to be on the same page about what they’re aiming for.
- Communication Protocols: Setting up clear ways for info to move within teams helps avoid any mix-ups.
- Decision-making Frameworks: Having a solid method for decision-making is key to keeping things from spiraling out of control.
- Performance Metrics: Understanding how success is gauged helps keep everyone dialed in and responsible.
These guardrails are really handy when tackling the challenges that arise. They allow teams to be creative while keeping everyone’s work aligned with the organization’s big picture mission.
In a nutshell, having organizational guardrails really helps teams hit the ground running while staying on the same page. So, let’s welcome these frameworks to make our work lives smoother and more efficient!
- Signer SOP: Make sure all signers are using HSM-backed or hardware keys. It’s also a good idea to avoid having any browser extensions on those signing laptops. And don’t forget, mandatory passkeys and multi-factor authentication on dashboards are a must!
- Rotation: We’ll be doing a quarterly rotation drill. Just a quick reminder to document “prevOwner” whenever you make changes to the Safe owner list. For checking and verifying the state before and after these changes, use the CLI tooling (Ape‑Safe). You can find more info here.
Part 5 -- Emerging practices you can adopt in Q1
1) “Coin vs. State” Separation as Policy
When we chat about the "Coin vs. State" separation, we're digging into something super important in the realms of finance and governance. This concept highlights why it's crucial to keep government control at bay when it comes to digital currencies.
Why It Matters
Having a clear line between state-issued money, like fiat currencies, and cryptocurrencies is super important for a few reasons:
- Economic Freedom: It allows people the liberty to pick their own currency without the government sticking its nose in.
- Innovation: This kind of separation can spark fresh ideas in the financial world, paving the way for new technologies and solutions to blossom.
- Stability: Keeping state currencies and digital ones separate might help minimize the chances of inflation and economic rollercoasters that usually come with heavy government control.
Key Points to Consider
- Decentralization: Cryptocurrencies are built to be decentralized, meaning no single entity--or even the government--has control over them. This independence is a big part of what draws people to them.
- Regulation: Sure, regulation can keep things safe and sound, but too much of it can really hold back growth and creativity. It's all about striking that perfect balance.
- User Preference: It's really important for folks to have the freedom to choose their currency--whether that's digital or good old-fashioned cash. Giving people this choice not only empowers them but also ramps up competition in the market.
In conclusion, the idea of separating "Coin vs. State" goes beyond just being a theory; it’s a practical policy approach that has the potential to really influence the future of finance.
Balancer's "Separation of Coin and State" proposal hits the nail on the head when it comes to its philosophy. Instead of trying to balance governance speed and capital safety all in one place, why not just divide them and fine-tune each for its own purpose? We’re recommending this split for any treasury that’s over $5M. Take a look at the details here: (forum.balancer.fi)
2) Delegation Health Checks and Quorum Design
When you're aiming to keep your system running without a hitch, making sure you have solid delegation health checks and a well-thought-out quorum design is super important. Let's dive into what these concepts are all about and why they really count.
Delegation Health Checks
Health checks are all about making sure that the services you've delegated are doing their job properly. Here are a few key points to remember:
- Regular checks: Try to get into the routine of performing health checks regularly. This way, you can spot any problems before they blow up.
- Automated vs. Manual: Think about whether you want to automate these checks or handle them manually. Automation can really cut down on time, but there might be times when you prefer to keep an eye on things yourself, especially for your important systems.
- Response time: Keep an eye on how quickly your services react during these health checks. If things are lagging, it might mean there's a bigger issue that needs to be addressed.
Quorum Design
Quorum is basically about ensuring that your system has enough people on board to make decisions. Here’s how to get it right:
- Getting a Grip on Quorum: So, a quorum is basically the least number of folks you need around to get things done. It’s like a voting setup where the majority's voice counts.
- Planning for Fault Tolerance: When you’re putting together your quorum, keep in mind that nodes can fail. You want your system to be able to keep chugging along even if a few nodes drop out.
- Go for an Odd Number of Nodes: It’s generally a smart move to stick with an odd number of nodes in your quorum. This way, you’ll steer clear of any tie situations when it’s time to vote. Aim for 3, 5, or even 7 nodes, depending on what you’re working with.
By putting in some effort into health checks and carefully designing your quorum, you can create a system that's both resilient and efficient!
Compound’s recent scare showed just how much inactive whales can stir things up over a weekend. To address this, we should consider automatically redistributing delegated voting power after three missed votes--whether that’s through social channels or through coding, based on the tech you're working with. Plus, let’s raise the quorums required for treasury decisions and avoid those tight voting windows.
Uniswap’s 2024 RFC might just be the perfect starting point for discussing veto councils and proposal staking. These ideas could really ramp up the security, making it harder for attackers to pull any stunts. If you want more info, you can check it out here.
3) Formalizing Multisig Standards
When it comes to protecting our crypto assets, multisignature (multisig) wallets are total game changers. They need multiple signatures to approve a transaction, which gives us that extra layer of security we all want. But with so many different ways to do it, we really need to establish some solid formal standards. Here’s why that’s crucial and how we can make it happen.
Why Formal Standards Matter
- Better Security: When we use standardized multisig setups, it cuts down on the risks and weaknesses that can arise when everyone tries to create their own approach.
- Better Interoperability: When wallets and services stick to the same standards, they can connect and communicate better. This means users have a smoother experience overall.
- User Confidence: Having clear standards can really enhance trust in multisig solutions. When users know exactly what to expect in terms of features and security, it makes a big difference.
- Regulatory Clarity: Establishing clear standards can really help when it comes to understanding and meeting regulatory requirements. This has become a big deal in the crypto world, where regulations are constantly evolving.
Steps to Formalize Standards
- Gather Stakeholders: Let's round up developers, wallet providers, and security pros to share ideas and figure out the best practices together.
- Draft Specifications: Let’s create some straightforward specs that outline different multisig setups. We should make sure to include details on key management and recovery methods too.
- Iterate and Test: Once you’ve got your draft ready, it’s all about putting those standards to the test in actual situations. Gather feedback to fine-tune everything.
- Publish and Promote: After we've nailed down a strong set of standards, it's super important to get the word out. We want everyone in the ecosystem to jump on board and start using them!
Conclusion
Formalizing these multisig standards isn’t just a nice-to-have--it’s crucial for ensuring the security of crypto transactions moving forward. When we collaborate and come to an agreement on best practices, we can establish a safer space for everyone involved. Let’s get to work on this!
If you have a setup with several council-managed safes, it might be a good idea to check out a published Multisig Security Policy, just like Optimism has. This policy touches on important stuff like who’s in the group, how to dissolve it if needed, and reporting procedures. It makes audits and handling incidents way smoother, plus it helps eliminate any misunderstandings. You can take a look at it here: (gov.optimism.io).
4) Endowment-Style Treasury with Controlled Risk
When we chat about an endowment-style treasury, we're really getting into a strategy that finds a sweet spot between stability and growth, all while managing risk. The goal here is to build a portfolio that can back your long-term objectives without throwing you into the wild ups and downs of the market.
Key Points to Keep in Mind:
- Stay Focused: It’s easy to get distracted, so try to keep your eye on the prize.
- Be Open to Feedback: Constructive criticism can help you grow, so don't shy away from it.
- Time Management is Key: Prioritize tasks to make the most of your day.
- Stay Curious: Never stop learning! Explore new ideas and perspectives.
- Network: Building connections can bring new opportunities your way.
Remember, these points aren’t just tips, they’re stepping stones to help you succeed!
- Diversification is Key: If you want to lower your risk and boost your returns, spreading your investments across different asset classes is the way to go. Consider mixing in stocks, bonds, real estate, and a dash of alternative investments for good measure.
- Focus on Long-Term Growth: Rather than getting caught up in the rush for quick returns, this approach is centered on steady, long-term growth. You want to find investments that are likely to appreciate in value as time passes.
- Controlled Risk Exposure: Sure, taking risks can lead to better returns, but you’ve got to keep that risk in check. That means taking the time to regularly check in on your portfolio and making tweaks when needed, so you stay comfy with your level of risk.
- Sustainable Spending: Think of it like an endowment; the idea is to make withdrawals at a level that won’t drain the principal. This way, the treasury can keep funding its objectives for the long run.
If you want to explore endowment strategies and risk management a bit more, take a look at these resources:
So, to wrap it up, an endowment-style treasury is really about striking the right balance between growth and risk. It’s all about making sure you’re set up for success both now and down the road!
ENS’s endowment is a fantastic example of turning unused assets into a reliable funding source, all while maintaining control. They implement public investment policies, collaborate with professional asset managers through Safe, have a limited veto council for emergencies, and share monthly performance updates. If your DAO relies on variable fees, this method can really help balance out your budgets. Take a look here: (basics.ensdao.org)
5) Module Hardening
When you're looking to boost your system's security, module hardening is key! It’s all about reducing vulnerabilities and really strengthening the integrity of your applications. So, let's dive in and break it down.
What is Module Hardening?
Module hardening is all about beefing up the security of your software modules. The main goal here is to shrink the attack surface and lock down features that aren’t really needed. By tightening things up like this, you’re lowering the odds of someone successfully exploiting your system.
Key Techniques for Module Hardening
Here’s a handy list of a few techniques you might want to check out:
- Code Reviews: Make it a habit to regularly check your code for any security glitches that might pop up.
- Limit Permissions: Double-check that your modules only have access to the stuff they actually need.
- Disable Unused Features: If you're not using a feature, just turn it off. It’ll help you close off some potential vulnerabilities.
- Patch Regularly: Stay on top of things by keeping your modules updated with the latest security patches.
- Static Analysis Tools: Leverage tools that review your code for any weak spots before you hit that deploy button.
Example: Hardening a Web Application Module
If we're looking at a web application module, here are some practical steps you can take to make it more secure:
1. Implement input validation to prevent SQL injection.
2. Use prepared statements for database queries.
3. Enable logging for sensitive actions.
4. Set proper HTTP headers (like Content Security Policy).
5. Regularly audit the application for vulnerabilities.
Final Thoughts
Module hardening is essential for building strong and secure applications. By putting these techniques into practice, you're not just protecting your system--you’re also giving yourself a little peace of mind, knowing you’ve done your part to secure your work. Remember to stay proactive and keep yourself updated on new security methods!
Treat your modules like they’re rock stars! Safe’s documentation and comments point out that a rogue module could sneak in and take control of a Safe. So, it’s super important to audit those modules, lock their versions, and set up guards to prevent any delegatecall shenanigans from these modules. Plus, make sure you’re monitoring for any changes in EnabledModule or DisabledModule--alerts can be a lifesaver. For more details, check it out here: (gnosisscan.io).
Part 6 -- Turn governance “news” into execution safeguards
Translate Incident Patterns into Concrete Controls:
When you notice the same kinds of incidents cropping up repeatedly, it’s definitely time to step in and transform those patterns into effective controls. Here’s a simple guide on how to make that happen:
Step 1: Identify Patterns
First off, make sure to stay on top of the incidents. Keep an eye out for any trends or patterns that keep showing up. You might notice that some issues pop up more often or that certain areas seem to have more problems.
Step 2: Analyze the Data
Once you’ve gathered your patterns, it’s time to roll up your sleeves and dig into the details. Take a close look at the data related to each incident to pinpoint what went awry. Here are some questions you might want to consider:
- What sparked the incident?
- When did it take place?
- Who was part of it?
Step 3: Develop Controls
After collecting your thoughts, let’s kick around some ideas for controls that could help stop these incidents from cropping up again. Here are a few suggestions:
- Policies & Procedures: Take the time to craft new policies or tweak the ones we already have to tackle the real issues at hand.
- Training: Roll out training sessions so everyone’s in the loop on how to deal with these kinds of situations.
- Technology Solutions: Think about incorporating tools or software that can automate certain processes to help cut down on human error.
Step 4: Implement and Monitor
Putting your controls into action is super important. Go ahead and roll them out, then keep an eye on how well they’re working. Make it a habit to check in regularly to see if incidents are going down. If they’re not, it might be time to adjust your controls or explore a new strategy.
Step 5: Document and Review
Lastly, make sure you’re documenting everything! Keeping a record of what’s effective and what’s not will really help you fine-tune your strategy as you go along. It’s a good idea to set up regular reviews to keep your controls fresh and relevant.
By following these steps, you can turn those incident patterns into reliable controls that really help keep your environment both safe and efficient.
- Hidden-logic or “identical except” proposals (Tornado Cash 2023) → these bad boys need some bytecode tweaks and two distinct simulations tied to any executable proposal. On top of that, there’s a mandatory cooldown period that must pass before ExecutionSuccess can even kick in. You can dive into the details here.
- Low-engagement + whale control (Compound 2024) → this strategy raises the quorums needed for decisions that affect the treasury, extends voting times during weekdays, and adds options like proposal staking or a “No with Veto” to help deal with spammy or self-serving proposals. Curious to learn more? Check it out here.
- Zombie‑DAO drains (Indexed 2023; small treasuries) → To tackle this issue, we could implement default spending limits, develop wind-down playbooks, and incorporate auto-archive features when activity falls beneath a specific level. If you want to dive deeper, take a look here.
- Off-chain votes without binding execution (Snapshot) → We have a couple of options: we can switch to on-chain voting with timelocks, or we could go for Reality/Delay/Roles combined with a veto council. This approach would help connect signaling with actual spending. If you're interested in diving deeper, check it out here.
Part 7 -- Step‑by‑step: instrumenting your Safe today
1) Index Your Safe
It’s really important to know exactly what’s in your safe. Here are some handy tips to kick things off:
- Make a List: Take a moment to write down all the things swirling around in your mind. This list can be super helpful if you need to check in on your thoughts later on.
- Categorize Items: Consider sorting your belongings into categories, such as important documents, jewelry, or cash. This way, you'll always know exactly where to find what you need when the time comes.
- Use a Spreadsheet: If you love tech, why not whip up a simple spreadsheet? You can track all sorts of details like the item name, a brief description, and even its value.
| Item | Description | Value |
|---------------|---------------------|---------|
| Gold Ring | Family heirloom | $1,500 |
| Birth Certificate| John Doe's | N/A |
| Cash | Emergency fund | $500 |
- Secure Your List: Make sure to stash this list in a secure place--perhaps in a password-protected digital format. You want it to be just as protected as the valuable stuff in your safe!
- Review Regularly: Get into the groove of checking this list every few months, or whenever you make a big purchase or go through a significant life change.
By doing this, you’ll not only keep things organized, but you’ll also feel way more at ease knowing that everything's taken care of.
- Be sure to use a Safe proxy (masterCopy) and double-check the version you're on. As of 2025, Safe v1.5.0 has become quite standard. (ethereum.stackexchange.com)
2) Ship Event Monitors (1 Hour)
Setting up ship event monitors is pretty simple and should only take you about an hour. Here’s a quick rundown of the main steps to make sure everything goes off without a hitch:
- Gather necessary equipment: Before diving in, make sure you’ve got all the tools and devices you’ll need.
- Install the software: Go ahead and download and install any software you require on your system.
- Connect the monitors: Hook up your monitors based on the provided instructions. Don’t forget to double-check all your connections!
- Configure settings: Tweak the settings to match what you need.
- Test functionality: Do a quick test run to make sure everything’s working smoothly.
If you need more detailed instructions, feel free to take a look at the manual here.
- Let’s start with
ExecutionSuccess/FailureandExecutionFromModuleSuccess/Failure. Make sure to snag those topic hashes from Safe ABIs or SDKs to avoid any copying mistakes. You can check it out here: (pkg.go.dev). - Now, onto adding some monitors for
ChangedThreshold,ChangedGuard,ChangedModuleGuard, andEnabledModule/DisabledModule. Remember to connect these to Slack and PagerDuty for your notifications! More info is available here: (docs.safe.global).
3) Enforce Policy (Half-Day)
- Get a Transaction Guard and a Module Guard in place to ensure that you:
- manage which targets/selectors are allowed,
- cap the maximum outflows for each transaction and for each day,
- prevent delegate calls and any unknown ERC-20 approvals.
- Do a few test runs with a dry-run Safe and try to see if you can breach your own rules. (docs.safe.global)
4) Serialize Execution (1 Hour)
- Let's add a Delay Modifier that comes with a cooldown of 24 to 48 hours. This will work hand-in-hand with a Security Council that has the power to cancel any harmful queues. You can dive into the details here: (github.com)
5) Publish the runbook (half-day)
Once you've wrapped up all your edits and reviews, it’s time to show off your runbook! This part typically takes around half a day. Here’s the lowdown on how to get it done:
- Wrap Up Your Document: Go through everything to make sure it’s all set. Look for any typos, double-check that all the links are working, and confirm that every image is included where it should be.
- Choose a Platform: Think about where you’d like to share your runbook. You could go for your company’s internal wiki, a shared drive, or even a documentation site like Read the Docs.
- Upload and Format: Once you've picked your platform, it's time to upload your runbook. Don’t forget to give it a quick format check for better readability. Adding headings, bullet points, and tables can really help users find what they need with ease.
- Notify Stakeholders: After it's up and running, drop an email or a quick message to your team and anyone else who needs to know. Give them a heads-up that it's available and invite them to check it out!
- Gather Feedback: Get your audience involved by asking them for their thoughts and suggestions. Their insights can really help you fine-tune the runbook down the line.
- Update Regularly: Lastly, don’t forget to set a reminder for yourself to check in and refresh the runbook every now and then. Keeping it updated ensures it stays useful and on point!
If you follow these steps, you'll ensure that your runbook is easy to access and super helpful for everyone who needs it!
- Make sure you jot down all the specific calls you make, like raising the threshold, turning off modules, resetting
setGuard/setModuleGuardto known addresses, and revoking high-risk approvals. It's smart to use Ape-Safe to check and confirm the state before and after you make any changes. You can dive deeper into this here.
Appendix -- Notes for enterprises and regulated entities
- Legal wrappers: Major players, such as Uniswap, are jumping into formal legal structures for governance and treasury operations, like the Wyoming DUNA. If you've got a U.S. entity, it’s a good idea to get your treasury setup and legal wrappers figured out sooner rather than later. (coindesk.com)
- Programmatic transparency: Setting up a live dashboard is a smart move! It can showcase all the important stuff like ExecutionSuccess events, module activity, and any configuration changes. Honestly, not many delegates are going to sift through logs, but they’ll definitely value those clear signals.
- Cross‑chain consistency: It’s crucial to ensure that the guard/module policy stays consistent across all L2 Safes. We don’t want those “side treasuries” drifting off track!
The punchline
DAO governance goes beyond just “voting”--it’s really about making sure policies are executed safely. If you pay attention to key events like “ExecutionSuccess” and module executions, and keep the coin separate from the state, you can enforce your policies effectively in both execution planes. Throw in some delays and vetoes, and you’ll make any governance attacks loud, slow, and costly for anyone trying to throw a wrench in your plans--ensuring you come out ahead.
If you want to have 7Block Labs take a look at your current setup, we typically start by:
- Running a simulation of your last 90 days of ExecutionSuccess/ModuleSuccess activity based on a policy model,
- Performing an audit to check for any guard/module misconfigurations,
- Designing a split-plane architecture and creating an incident runbook tailored to fit your treasury profile.
The best time to boost your multisig was just before the vote. But guess what? The next best time is right now!
Sources and further reading
- Safe events and execution logs: Take a look at Etherscan for some cool examples. They offer the Safe Events/Transaction Service along with some documentation that could be really useful. You can check it out here: (etherscan.io)
- Module and guard mechanisms: Check out the module and guard systems, plus those crucial change events right here. (gnosisscan.io)
- Delay/Reality/Zodiac Patterns and Risks: Dive into the patterns and the risks that come with Delay, Reality, and Zodiac. Check it out here!
- Governance incidents and policy responses: Check out some key happenings like the Tornado Cash saga from 2023, Compound's situation in 2024, and Indexed's events in 2023. Also, be sure to go through the Uniswap RFC on attacks, Optimism's take on multisig policy, and the metrics from the ENS Security Council. (cointelegraph.com)
- “Separation of coin and state” (Balancer BIP‑850): Dive into this topic for a detailed discussion over at Balancer’s forum. Check it out here: (forum.balancer.fi)
- Off‑chain voting risks: Make sure you look into the risks tied to off-chain voting on Snapshot. You can read more about it here.
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Building Supply Chain Trackers for Luxury Goods: A Step-by-Step Guide
How to Create Supply Chain Trackers for Luxury Goods
ByAUJay
Building 'Private Social Networks' with Onchain Keys
Creating Private Social Networks with Onchain Keys
ByAUJay
Tokenizing Intellectual Property for AI Models: A Simple Guide
## How to Tokenize “Intellectual Property” for AI Models ### Summary: A lot of AI teams struggle to show what their models have been trained on or what licenses they comply with. With the EU AI Act set to kick in by 2026 and new publisher standards like RSL 1.0 making things more transparent, it's becoming more crucial than ever to get this right.

