ByAUJay
Hierarchical Multisig for DAO Governance and Treasury Guardrails
Summary: Hierarchical multisig takes the usual “one-size-fits-all” approach to approvals and shakes it up with layered, purpose-built controls. It blends things like security councils, timelocks, role-based modules, and spending limits. In this guide, we’ll dive into how leading DAOs are rolling it out these days, what you might want to emulate, what to steer clear of, and how to set up solid guardrails using Safe, Zodiac, and OpenZeppelin.
Why hierarchical multisig now
A flat M‑of‑N multisig puts all the power in one spot, which makes it pretty straightforward to use, but it can be fragile. On the other hand, a hierarchical setup breaks down authority into different levels, featuring various signers, thresholds, delays, and scopes. This approach leads to quicker responses during incidents without handing over total control to one group. Plus, it creates enforceable exit windows for users and clear, auditable boundaries for teams and vendors.
You’ve probably noticed this trend popping up in major ecosystems like Optimism, Arbitrum, Base, and Linea, as well as in established protocols such as Maker, Compound, and Aave. They're moving towards setting up “security councils,” emergency guardians, and budget modules instead of depending on a single mega-multisig. Check it out for more details: (forum.l2beat.com)
What “hierarchical multisig” means in practice
- Multisig-of-multisigs (nesting)
- Different thresholds for various actions (like an instant emergency fix versus slower upgrades)
- Role-scoped keys (for example, guardians can pause but can't move any assets)
- Guard modules that can approve or reject certain transactions
- Timelocks that set clear "exit windows"
- Spending-limit modules to manage controlled, signer-less fund movements
This isn't just theory. Here are some solid, real-world patterns that you can start using in production.
Pattern 1: Nested multisig for upgrades (Optimism’s 2‑of‑2)
Optimism’s OP Stack upgrades have a pretty solid security setup with a top-level 2-of-2 multisig. Now, each "2" is actually its own multisig: there's a 10-of-13 Security Council and a 5-of-7 Foundation multisig. What this means is that either of the sub-multisigs can veto any action, but both need to give the thumbs up to go ahead with something. This smart structure helps them respond quickly to any incidents while still keeping those important double checks in place. You can read more about it here.
Optimism keeps things transparent by adding a 14-day delay for protocol upgrades and any specific designation changes. This gives users a clear exit window, acting as a public safeguard. You can check out more details here.
How to Copy:
- Set up emergency and routine powers using separate sub-multisigs.
- Make sure you need approval from two different entities at the top for any changes.
- For non-emergency situations, stick to standard delays--usually around 14 days is the norm for core changes at Layer 2.
Pattern 2: Dual councils + staged delays (Arbitrum)
Arbitrum has used two security multisigs in the past, with the same members but different powers. There’s a 9/12 multisig that allows for instant upgrades, and then there’s a 7/12 multisig that requires a multi-day delay for upgrades (though it later shifted to a 9/12 to align with L2BEAT’s benchmarks). This setup clearly separates “break-glass emergency” upgrades from “slow path” upgrades, providing users with clear exit windows. You can find more details here.
Operational maturity means incorporating rotating membership through public elections. Take the upcoming March-May 2025 election, for example. It has set phases and a cool twist: voting weights decay over time, encouraging people to participate sooner rather than later. Make sure to include elections and rotation in your council charter from the very start. Check out more details here: (forum.arbitrum.foundation).
Pattern 3: Security council quorum at Stage‑1 standards (Base)
Base has hit Stage-1 decentralization, bringing together a council that features Coinbase, Optimism, and 10 independent entities. To make any upgrades, they need a solid majority--at least 75% or 9 out of 12 votes. This Stage-1 setup ensures there are at least eight participants and that no one can call the shots alone. Basically, it prevents any single operator from forcing through invalid changes or blocking exits without a lot of collusion. You can check out more details here.
Key takeaway: It's super important to tackle those Stage-1 requirements right from the get-go. When you do this, you’ll find that your governance narrative, risk disclosures, and vendor diligence are a whole lot easier to handle. Check it out here: (forum.l2beat.com)
Pattern 4: Security council + default timelock (Linea)
Linea's roadmap set up a Security Council made up of 9 out of 12 members, and they've put a standard 7-day timelock in place for any upgrades. Plus, there's a specific override option for critical vulnerabilities--just the right balance between “emergency” and “standard” procedures that you’d want. (community.linea.build)
Pattern 5: Treasury guardrails via timelocks and guardians (Maker, Compound, Aave, Angle, Seamless)
- The Maker’s Governance Security Module (GSM) keeps things in check with a network-wide pause delay. Recently, it got an adjustment thanks to executive votes--like when it dropped from 30 hours to 16 hours in July 2024, only to be set back to 30 hours again on February 6, 2025. These tweaks are all out in the open, fully parameterized, and easy to audit--just the kind of transparency you want in any DAO. (vote.makerdao.com)
- Compound was the trendsetter with its “Pause Guardian.” This guardian’s powers are pretty much limited to stopping minting, borrowing, transferring, and liquidating. It can't unpause things or move any funds around. The control rests in the hands of a community multisig, giving them a tightly scoped but high-impact emergency tool. (docs.compound.finance)
- Aave has its own approach using Short and Long Executors, with a 1-day and 7-day timelock, respectively. They're also experimenting with risk oracles and automated freeze guardians for sensitive assets (think USDe). These guardrails are smart because they adjust to asset-level risks instead of relying on a one-size-fits-all solution. (aave.org)
- Meanwhile, Angle and Seamless share the responsibilities by creating two roles: “Governance Guardian” and “Protocol Guardian.” Each of these roles operates behind a multisig and is limited to vetoing or pausing actions, but they can’t make unilateral upgrades. This model sets a nice example for defining roles effectively. (docs.angle.money)
Turning patterns into a deployable architecture
Here's a reference architecture we roll out for clients using Safe, Zodiac, and OpenZeppelin. It's designed with a clear viewpoint, made to be testable, and super easy to audit.
1) Core account and upgrade path
- Safe A (Protocol Admin) is set up as a nested multisignature wallet: it's a 2‑of‑2 arrangement where each branch operates as its own Safe:
- Safe B: This is managed by the Security Council (think of it as 10‑of‑13).
- Safe C: This one handles the Foundation/Company side (like 5‑of‑7).
- For any upgrades, we need the go-ahead from both B and C. If there's ever a need for an emergency fix, that can only go through B, but we’ll keep it short--like no more than 72 hours for temporary guardian ownership. Plus, there’s a built-in automatic reversion transaction saved in the timelock. (docs.optimism.io)
2) Timelocks
- OZ TimelockController with:
- A short queue (24-48h) for those routine parameter tweaks
- A long queue (≥7d) for big changes like core adjustments, bridge updates, or pause delays
- Keep the current delays documented publicly and include “office hours” windows for when things can be executed, making it easier to predict when things will happen (like Maker does). (vote.makerdao.com)
3) Guardians (strictly scoped)
- ProtocolGuardian (multisig) can only:
- trigger pause/freeze functions
- lower caps/LTVs
- GovernanceGuardian (multisig) can veto actions during the timelock period, but can't just carry out any random actions. Let's adopt Compound’s approach of “cannot unpause” to steer clear of any sneaky privilege increases. (docs.compound.finance)
4) Execution guardrails on the Safe
- Set up a Transaction Guard to check every transaction before it goes through:
- block any “unknown recipients”
- set limits on spending per transaction and over 24 hours
- make sure reference IDs are included in calldata for financial operations
- Utilize Safe’s Module Guard for calls coming from modules; if those guards fail, it could lead to a denial of service, so include a pre-arranged “break glass” uninstall path that both B and C can control. (docs.safe.global)
5) Role‑based modules (Zodiac)
- Roles Modifier: This feature lets you tie callable selectors and parameter ranges to specific roles. For instance, in RiskOps, folks can tweak caps but can't mess with the upgrade logic itself. Check it out here.
- Reality (SafeSnap) Module: This is your go-to for running Snapshot results once the oracle gives the green light, complete with bonds and cooldowns. Just make sure you've got a questionTimeout of at least 48 hours and a solid minimumBond. Keep an eye on
ProposalQuestionCreated, and if anything goes sideways, you can enable emergency invalidation. For more details, visit this page.
6) Spending guardrails for the treasury
- Safe Allowance Module (“Spending Limits”) for signer-less disbursements:
- Set periodic caps for each token per beneficiary
- Choose reset schedules (daily, weekly, or monthly) for operational expenses
- Create departmental budgets with tiered sub-allowances using the Firm’s Budget module. This is especially handy for nested cost centers like “Engineering → Grants → Bounties.” Check it out here: (help.safe.global)
7) Monitoring, approvals, and automation
- OpenZeppelin Defender:
- Approval Processes: This feature wraps multisig wallets, relayers, timelocks, and governor contracts, ensuring you have consistent trails for “who signed what.”
- Relayer Groups: These groups help with redundant and rate-limited transaction submissions. You’ll get some handy throughput guidance (keeping it to ≤50 tx/min per relayer) and enterprise notifications via Slack, PagerDuty, or OpsGenie if anything looks off.
- Access Control Dashboards: With these dashboards, you can keep an eye on owner/role changes across various chains. They help enforce policies like “multisig or DAO owns admins” (docs.openzeppelin.com).
Concrete configurations we recommend
Check out these tried-and-true setups, complete with numeric thresholds and delays that you can use as they are or tweak to fit your needs.
L2 protocol (Stage‑1‑ready)
- Security Council: We're working with a 10‑of‑13 multisig setup, which means that to make decisions, we need a majority of our council. We've got a public membership policy, and elections will roll around every 6 to 12 months.
- Foundation/Company: This operates with a 5‑of‑7 multisig system, ensuring that a solid majority is needed for any key decisions.
- Upgrade multisig: For upgrades, it’s a straightforward 2‑of‑2 requirement, so both the Council and Foundation need to agree.
- Delays:
- Emergency patch: This is handled by the Council only, with no delays involved. It's time-boxed, meaning we have a strict timeframe, and it also requires us to include a post-mortem and rollback plan in the same batch.
- Standard upgrade: Expect about a 14-day wait for these.
- Bridge/withdrawal logic: At least a 14-day timeline here as well.
- Exit guarantees: We need to document an exit window that's at least 7 days for any upgrade that isn’t an emergency. This aligns with what's laid out in L2BEAT Stage‑1. You can check it out here.
DeFi lending protocol
- Governors:
- Short Executor: You can expect changes for caps/IRM tweaks within 24-48 hours.
- Long Executor: Governance core decisions take about 7 days.
- Guardians:
- Pause Guardian: This guy can pause certain functions but can't unpause them. Plus, their role expires or rotates every quarter.
- Risk Guardian: They only manage bounded caps and LTV reductions.
- Sentinel Monitors:
- Keep an eye on emitted events for role grants or revokes.
- Track large outbound transfers.
- Watch for new modules or guards that get enabled on any Safe.
- Treasury:
- Allowances: Ops wallets can handle $20k USDC per day, market-makers get $100k USDC per week, and all beneficiaries are whitelisted by the Roles Modifier.
- There’s a quarterly “cliff” disbursement with a timelock. This goes to a downstream Safe to help avoid large balances just sitting in the root treasury.
- Reference: You can check out Compound’s Pause Guardian pattern, Aave’s dual executors, and the Angle/Seamless guardian split for more insights. (docs.compound.finance)
DAO grants program
- Snapshot → Reality → Safe execution:
questionTimeout: 72 hoursminimumBond: set to keep spam at bay (adjust based on token price)cooldown: 24 hours before anything gets executed
- Spending Limits:
- Evaluators: $2,000 USDC per day for each person
- Program Lead: $20,000 USDC per week
- Transaction Guard rules:
- Need a
memostring in the calldata - Block any new recipients unless they’re on an allowlist that’s managed by someone in a specific role (not a signer)
- Need a
- Monitoring: Keep an eye out for new Reality proposals and any allowance overuse; set up Defender approval workflows for those monthly top-ups. Check it out here: (zodiac.wiki)
TSS/MPC vs on‑chain multisig: when and how to combine
- On-chain multisignature solutions, like Safe, offer a lot of transparency, can easily integrate with other modules, and are enforced by the blockchain itself. This makes them perfect for governance and treasury setups that want some programmable safety nets and the ability for everyone to audit things publicly.
- Threshold Signatures (TSS/MPC) keep the approval process off the blockchain, resulting in a single standard signature on-chain. The perks? You’ll enjoy smaller transaction sizes, keep the signer identities private, and get solid support across multiple blockchains--super handy for centralized teams or custodial processes. Companies like Blockdaemon and Fireblocks even provide policy engines, step-up approvals, and connect with compliance tools. Check it out here: (blockdaemon.com)
Recommendation
If you've got operational wallets that require a lot of transactions and need to integrate with exchanges, go for MPC/TSS. For holding protocol keys and DAO treasuries, stick to on-chain multisigs with modules, timelocks, and guards.
And if you absolutely have to mix things up, make sure to route MPC-controlled keys into the signer sets of your on-chain multisigs--definitely don't do it the other way around!
Standards and modules that make this work
- Safe Modules and Guards: You can easily add or remove these using Safe transactions. Think of guards as code that could potentially lock you out of your Safe, so it’s super important to have a recovery plan in place. Check it out here: (docs.safe.global)
- Safe Allowance Module: This lets you spend on specific addresses and tokens without needing a signer each time. You can manage it right from the Safe Wallet UI. More info here: (help.safe.global)
- Reality (SafeSnap): This is for executing Snapshots with bonds and cooldowns. You can keep an eye on different events and set up escalation paths as needed. Dive into the details here: (zodiac.wiki)
- ERC‑1271: This standard helps contracts sign off-chain messages, which is super important for things like DEX off-chain orders and DAO approvals coming from smart-account treasuries. For the nitty-gritty, check this out: (eips.ethereum.org)
Emerging best practices (2025)
- For the Design to L2BEAT Stage‑1, you need at least 8 council members, a minimum 75% approval rate, and a 7-day exit period for standard upgrades. Having these clear milestones really helps your decentralization journey and can shine a light on your exchange listings. Check it out here: (forum.l2beat.com).
- It's a good idea to split emergency powers from standard ones, and always have clear expiration dates and post-incident reviews in place.
- Steer clear of risky UI features on a large scale. For instance, Optimism has decided against including Safe’s “proposer” feature in council multisigs to make things less confusing for signers. Be sure to outline any such restrictions in your charter. You can read more about it here: (gov.optimism.io).
- Don't forget to publish a signer rotation schedule and regular liveness checks, like quarterly attestations for sign messages. Base documents actually cover cohort terms and liveness, so make sure to refer to them. More details here: (docs.base.org).
- Think about budgeting like a company would: set up departments and sub-allowances on-chain; it's usually better to have periodic limits rather than making one-off large transfers. You can dive into this further at (docs.firm.org).
- Lastly, set up Defender Approval Processes to streamline how upgrades, deployments, and significant transfers move through your organization. This works well with multisigs, timelocks, governors, and even Fireblocks. Get the lowdown here: (docs.openzeppelin.com).
Implementation checklist (copy/paste for your RFC)
- Governance Structure
- Security Council: X‑of‑Y, public roster, rotation schedule
- Foundation/Company multisig: M‑of‑N
- Top-level upgrade key: 2‑of‑2 (Council + Foundation)
- Emergency path: Council only, 0 delay, max duration, forced rollback tx queued
- Timelocks and Exits
- Short: 24-48 hours; Long: at least 7 days; office hours are set
- Exit window clearly outlined for all standard upgrades
- Roles and Guardians
- Protocol Guardian (pause-only)
- Governance Guardian (timelock veto-only)
- Roles Modifier bounds for parameter changes
- Safe Modules and Guards
- Transaction Guard with allowlists, spend limits, memo enforcement
- Module Guard installed; recovery path is documented
- Allowance Module set up per team/beneficiary
- Reality module featuring
questionTimeout,minimumBond, andcooldown
- Monitoring and Ops
- Defender Approval Processes for upgrades and transfers
- Relayer Groups' capacity capped (≤50 tx/min per relayer)
- Notifications (Slack/PagerDuty/OpsGenie) are up and running
- Quarterly liveness checks and key rotation drills
References for each section: Check out the Optimism, Arbitrum, Base, and Linea documentation for the overall structure; look to Compound, Aave, and Maker for insights on guardians and timelocks; for modules and guards, take a peek at Safe and Zodiac; and don’t forget OpenZeppelin Defender for details on approvals and relayers. You can find more info here: (docs.optimism.io)
Pitfalls we keep seeing (avoid these)
- Think of a mega-multisig for everything. It’s all about splitting powers. If one signer gets compromised, your risk is kept in check.
- Skip the timelock on parameter changes. A 24-48 hour queue plus notifications helps catch those pesky fat-finger errors before they cause chaos.
- Unlimited guardian authority is a game-changer. Give guardians one-way powers like the ability to pause or reduce limits, but make sure governance is needed to restore things back.
- Watch out for unmonitored modules and guards. Treat anything like “module added/removed” as a top priority alert; this way, you can prevent any sneaky privilege escalations. (docs.openzeppelin.com)
- No surprise exit window communication! If you’re tweaking delays (like Maker’s GSM), make sure to announce it clearly, with effective dates and direct links to the on-chain spell. (vote.makerdao.com)
A note on other ecosystems and inspiration
Hierarchical safety nets aren’t just found in EVM. Take the Liquid Bitcoin federation, for example. They use an 11-of-15 multisig setup that comes with timelocked emergency keys for network recovery. This approach shows how timelocks can act as a safeguard without messing with everyday multisig authority. Keep this kind of mindset in mind when you’re crafting your own “emergency but bounded” flows. You can read more about it here.
Where to go from here
- If you’re working with an L2 or a high-TVL protocol, it’s a smart move to start planning against Stage-1 today. A lot of buyers, like exchanges and institutions, are treating it like a standard playbook. Check it out here: (forum.l2beat.com).
- If you’re running a product DAO, you should definitely get going with the Reality + Allowance Module + Transaction Guard combo. This setup gives you genuine decentralization--where the community actually has a say and spending is capped--without bogging you down with extra hassle. More info is available here: (zodiac.wiki).
- For those managing enterprise-grade operations wallets, a good strategy is to mix Defender approvals with MPC custody. Just make sure to keep your protocol keys and treasuries safe in on-chain multisigs, utilizing modules and timelocks to add an extra layer of security. You can read more about it here: (docs.openzeppelin.com).
7Block Labs is all about getting these architectures up and running from start to finish. We handle everything from drafting the charter to onboarding signers, installing Safe/Zodiac modules, setting up Delay/Reality configurations, managing Defender workflows, and even running red-team tabletop drills. If you’re looking for a real, audited setup instead of just a pretty diagram, we’ve got your back!
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Creating a Yield Aggregator for RWA Tokens: A Step-by-Step Guide
### Summary So, you’re looking to create a serious RWA yield aggregator in 2026? Well, things have definitely stepped up a notch technically! You'll need to manage a few crucial elements like ERC‑4626/7540 vault flows, permissioned token standards (ERC‑3643/1404), NAV and reserve oracles, and cross‑chain DvP. It’s going to be a challenging but exciting ride!
ByAUJay
Building 'Policy-Based' DeFi Wallets for Corporate Treasuries When it comes to managing corporate funds, efficiency and security are top priorities. That's where 'policy-based' DeFi wallets come in. These wallets not only allow businesses to tap into decentralized finance but also ensure there's a robust framework in place to manage their assets according to specific guidelines. What exactly do we mean by 'policy-based'? Well, it's all about tailoring the wallet's functionality to fit the unique needs of a company's treasury operations. With these kinds of wallets, companies can set rules and policies that dictate how funds are accessed, spent, and invested. So, if you're worried about security or compliance, these wallets can be a big help. These wallets can be designed to handle everything from regular transactions to more complex financial maneuvers, like yield farming or liquidity provision. Plus, the ability to automate certain processes means that businesses can save time and reduce the risk of human error. In a nutshell, 'policy-based' DeFi wallets are game-changers for corporate treasuries. They provide a smart, efficient way to manage crypto assets while keeping everything in check with rules that align with the company's financial strategy. It's a win-win!
**Summary:** Hey there! Corporate treasuries now have a great opportunity to explore the world of DeFi with some robust controls. Thanks to EIP-7702 smart accounts, along with policy modules like ERC-7579 and ERC-6900, they can ensure everything runs smoothly. Plus, with features like MPC signing, on-chain sanctions checks, and Travel Rule workflows, security is top-notch. This guide is here to take you through how 7Bl can help make it all happen!
ByAUJay
The 'Dual-Market' DeFi Setup: Merging Speed with Flexibility
**Summary:** A lot of DeFi stacks make you choose between super-fast execution and a whole bunch of features. But with a Dual‑Market architecture, you don’t have to pick one over the other anymore! It combines a low-latency “Fast Market” for quick trades with an intent-driven “Flexible Market” that offers versatility, bringing them together in a seamless way.

