Proposals

/

Proposal

Pending queue

Grant CANCELLER_ROLE to Ops Multisig for Emergency Governance Protection


User profile image

by

by

Saulius

Saulius

ID 112182...7041

ID 112182...7041

Proposed on: May 5th, 2026

Proposed on: May 5th, 2026

Votes

Actions

Type

Address

Details

Custom

grantRole(..)

Custom

Account

0xE05d...9403

Method

grantRole(..)

Proposal

Summary

This proposal grants CANCELLER_ROLE on the protocol timelock to the protocol multisig (0x0C02d2D320C62d4088840a459fE8862C802fbA78) to add an emergency veto mechanism against malicious queued operations.

Motivation

Current governance security has an economic attack surface during periods of low INT price and low effective quorum cost.

At current conditions:

Quorum (25M INT) is relatively low in USD terms (about ~$7K).

A hostile actor may cheaply accumulate enough voting power to pass a malicious proposal.

A malicious proposal could queue high-impact actions (e.g., treasury-draining transfers) with asymmetrical upside for attacker vs cost of attack.

Example risk scenario:

Attacker acquires ~quorum voting power for a small capital outlay.

Attacker passes and queues malicious treasury operation.

Without emergency cancel authority outside proposer flow, protocol reaction window is weaker.

Granting CANCELLER_ROLE to multisig provides a practical safety layer to stop queued malicious operations before execution.

Specification

Timelock:

0xE05dD5B785f578337B2B8F695Fbc521669c69403 (GovTimelockController)

Grant:

Role: CANCELLER_ROLE

0xfd643c72710c63c0180259aba6b2d05451e3591a24e58b62239378085726f783

To: 0x0C02d2D320C62d4088840a459fE8862C802fbA78 (protocol multisig)

Security Considerations

CANCELLER_ROLE is powerful: it can cancel any queued operation.

This is intentional as an emergency brake against governance capture.

It does not grant proposer or executor powers.

Governance flow remains unchanged; multisig only gains veto capability on queued operations.

Operational Policy

Multisig should cancel only when at least one applies:

Clear treasury-drain or privilege-escalation intent.

Proposal payload materially differs from stated intent.

Governance manipulation/capture indicators are present.

Critical bug or exploit discovered after queueing.

After cancellation, multisig should publish a transparent post-mortem and rationale.

Votes
Status