Skip to content

Latest commit

 

History

History
207 lines (120 loc) · 16.1 KB

security-council-mgmt.md

File metadata and controls

207 lines (120 loc) · 16.1 KB

Security Council Election and Membership Management

The pages documents an overview of the Security Council Election procedure, more detail on some specific components can be found in:

For background information see sections 3 and 4 of the Constitution of the Arbitrum DAO. The election flow also makes use of existing Arbitrum Governance Arbitrum Governance contracts - the Timelocks and the Action system - so these are required reading for understanding the system.

High-level Election Overview

The Constitution specifies that membership of the Security Council is split into two cohorts. Every 6 months, all positions in a single cohort are put up for election.

The election implementation is split into:

  • Election stages: The process for selecting and voting for nominees.
  • Update stages: Installing the newly elected cohort into the Arbitrum smart contracts.

The election process and update stages are performed via on-chain smart contracts. A brief overview of each stage includes:

Election Stages

Process for selecting and voting for the new cohort of Security council members.

  1. Candidate registration (7 days) Candidates must put themselves up for nomination in order to receive votes.
  2. Nominee selection (7 days). Candidates must gain 0.2% of total votable tokens in order to make it to the next step.
  3. Compliance check by Foundation (14 days). As dictated in the Constitution, the selected nominees must undergo a compliance check to ensure they comply with the legal requirements, service agreements, and additional rules dictated by the Constitution.
  4. Member election (21 days). Votes are cast and the top 6 nominees are selected.

Update Stages

Process to install the newly elected cohort of Security Council members into the Arbitrum smart contracts.

  1. Security Council manager update (0 days). The manager is the source of truth for specifying who are the current council members. It processes the election result and takes note on who will be the new security council members.
  2. L2 timelock + withdrawal + L1 timelock (3 + 7 + 3 days). All actions that directly affect the core Arbitrum contracts must go through a series of timelocks to protect the right for all users to exit. This is a built-in safety mechanism for users who are unhappy with the approved changes.
  3. Individual council update (0 days). Once the updates have passed through the relevant timelocks, the Security Council manager can install the security council members. This requires updating 4 Gnosis Safe smart contracts that are controlled by the Security Council members.

Election Stages in detail

1. Election creation and candidate registration (7 days)

  • Election creation. Elections can be created by anyone, but only every 6 months. The election alternates between targeting the positions on the two cohorts. Once created, this first stage of the election process lasts for 7 days.
  • Candidate registration. During these 7 days, any candidate can register, unless they are already a member of the other cohort. Members of the current cohort (the cohort up for election) are allowed to register for re-election.

Implementation details

A new proposal is created each election cycle by calling SecurityCouncilNomineeElectionGovernor.createElection. Once a proposal is created it will be "Pending" for 7 days.

Voting is not allowed while the proposal is pending.

During the 7 day pending window, contenders register themselves by signing an EIP712 message of type AddContenderMessage(uint256 proposalId) and calling SecurityCouncilNomineeElectionGovernor.addContender.

2. Nominee selection (7 days)

  • Endorsing candidates. Delegates can endorse a candidate during this 7 day window. A single delegate can split their vote across multiple candidates. No candidate can accrue more than 0.2% of all votable tokens.
  • Fallback in case of too few candidates. In the event that fewer than 6 candidates receive a 0.2% endorsement, the Arbitrum Foundation will randomly select members from the outgoing cohort to make up to 6 candidates.

Implementation details

The nominee selection process is implemented by the SecurityCouncilNomineeElectionGovernor contract.

It inherits most of its functionality from the OpenZeppelin Governor contracts, extended for some addition features:

  • Custom counting module to allow delegates to endorse multiple candidates.
  • Overridden proposal and execution to make the governor single purpose.

Delegates can call castVoteWithReasonAndParams supplying custom arguments in the params to indicate which candidate they wish to endorse with what weight.

3. Compliance check by the Foundation (14 days)

The Foundation will be given 14 days to vet the prospective nominees. If they find that a candidate does not meet the compliance check, they can exclude the candidate from progressing to the next stage. The compliance rules are not detailed here, and will instead be published by the Foundation, but note that grounds for exclusion will include greater than 3 members of a given organisation being represented in the nominee set (as described in section 4 of the Constitution).

For some further details and guidelines see here.

Implementation details

The foundation can exclude a nominee by calling excludeNominee function on the SecurityCouncilNomineeElectionGovernor contract.

If there are less than 6 eligible nominees, then the Foundation will consult with outgoing members of the cohort on whether they will continue in this role for another 12 months. Members of the existing cohort may be selected at random to fill the remaining seats. To fill an empty seat, the Foundation calls includeNominee

The Governor smart contract enforces that at least a 2 week time period be provided to the Foundation to exclude/include nominees by this deadline. If 6 nominees are not selected by this deadline this phase will extend until 6 are included.

Once the compliance check has completed, anyone can call the execute function on the SecurityCouncilNomineeElectionGovernor to proceed to the member election stage.

4. Member election (21 days)

The voting process can begin once a set of compliant candidates have been successfully nominated.

The voting process is designed to encourage voters to cast their vote early. Their voting power will eventually decay if they do not cast their vote within the first 7 days:

  • 0 - 7 days. Votes cast will carry weight 1 per token
  • 7 - 21 days. Votes cast will have their weight linearly decreased based on amount of time that has passed since the 7 day point. By the 21st day, each token will carry a weight of 0.

Additionally, delegates can cast votes for more than one nominee:

  • Split voting. delegates can split their tokens across multiple nominees, with 1 token representing 1 vote.

Implementation details

The Security Council member election will take place in a separate SecurityCouncilMemberElectionGovernor contract which will also inherit from OpenZeppelin Governor contracts.

After the 14 day waiting period for the compliance check, anyone can trigger a new member election:

  • Call the execute function in SecurityCouncilNomineeElectionGovernor to create a new election proposal for SecurityCouncilMemberElectionGovernor

The SecurityCouncilMemberElectionGovernor includes:

  • A custom counting module that allows delegates to split their vote and accounts for the linear decrease in voting weight.
  • These additional parameters are supplied as the params argument when calling castVoteWithReasonAndParams.
  • The custom counting module also checks that the account being voted for is a compliant nominee by checking against the list in the SecurityCouncilNomineeElectionGovernor.

At the end of the 21 days of election:

  • Anyone can call execute on the SecurityCouncilMemberElectionGovernor contract to initiate the update of top 6 nominees with the most votes into SecurityCouncilManager.

Update stages in detail

1. Security Council manager update

The SecurityCouncilManager is the entry point for updating council members. It contains the canonical list of security council members, and which cohort they are part of. When a member election completes, the manager updates its local list of the current cohorts then forms cross chain messages to propagate those updates to each of the Security Council Gnosis safes.

The manager also provides some additional functionality to allow the security council to:

  • Remove a member. As described in the Constitution, the council can remove one of its own members. The DAO can also remove a member under special condition described by the Constitution.
  • Add a member. After removing a member, the council can add a member
  • Address rotation. As a practical matter, a council member can rotate one of their own keys. This can only be done with the approval of at least 9/12 council members.

See Security Council Manager as a source of truth for more details on how the Manager operates.

Implementation details

The manager functionality is contained within a custom SecurityCouncilManager smart contract. Since the SecurityCouncilManager is indirectly able to make calls to the standard UpgradeExecutor contracts which have far reaching powers, special care must be take to ensure the manager only makes council member updates.

Calling the UpgradeExecutors on each of the chains requires navigating withdrawals transactions, timelocks and inboxes, the SecurityCouncilManager outsources the calldata creation for these routes to the UpgradeExecRouteBuilder contract.

2. Timelocks and withdrawal

Constitutional DAO proposals all pass through:

  • L2 timelock (3 days),
  • L2 → L1 withdrawal (~7 days),
  • L1 timelock (3 days).

You can read more about these stages in the governance docs. The purpose of these delays is to ensure that users who wish to withdraw their assets before the proposal is executed will have the time to do so. Changing the Security Council members should also provide this guarantee, so after the election has completed and before the Security Councils are updated the update message also goes through these same stages. The update message will use the existing timelocks to enforce these delays.

Implementation details

The existing governance timelock contracts are used as part of this flow.

The SecurityCouncilManager is given the PROPOSER role on the L2 timelock enabling it to create messages that will eventually be received by each UpgradeExecutor

3. Individual council updates

The new Security Council members need to be installed into 4 Gnosis safes:

  • Arbitrum One 9 of 12 Emergency Security Council
  • Arbitrum One 7 of 12 Non-Emergency Security Council
  • Ethereum 9 of 12 Emergency Security Council
  • Nova 9 of 12 Emergency Security Council

The old cohort of members will be removed, and the new cohort will replace them.

Implementation details

To do this the existing Upgrade Executor contracts on each chain will be installed as Gnosis Safe modules into the Security Council Safes. A custom Governance Action Contract will be used to call the specific OwnerManager addOwnerWithThreshold and removeOwner methods on the Gnosis Safes.

Additional affordances

The Constitution also declares some other additional affordances to certain parties

Removal Governor

The DAO can vote to remove a member prior to the end of their term, as long as 10% of possible votes are cast in favour and 5/6 of cast votes are in favour. This is implemented as a governor with correct quorum and proposal passed thresholds.

It accepts proposals in the same format that normal governors do, however it overrides the propose function to check that these proposals are only executing a remove member function on the manager. This governor has the rights to call removeMember on the SecurityCouncilManager.

Voting and proposing can occur using the standard governance UIs.

Non-Emergency Security Council

The Security Council can remove a member prior to the end of their term, if 9 of 12 members agree. The non-emergency council has the right to call removeMember on the SecurityCouncilManager.

The Security Council can add a member if there are less than 12 members currently on the council. The non-emergency council has the right to call addMember on the SecurityCouncilManager.

The Security Council can replace members or rotate keys at any time. The non-emergency council has the right to call replaceMember and rotateMember on the SecurityCouncilManager. These 2 functions are functionally identical, although they imply different intent/purpose

Overall diagram

Below is a diagram showing the interaction between the different components described above:

Block periods

The constitution specifies time periods in days and weeks, however in the implementation block numbers are used as a proxy for this. In the event of an L1 block time change the contracts here, and in general governance, would need to be updated to reflect the time periods again.

Settings of interest

Some of the following settings are updateable, others are presently not, see the in-code function documentation for how/if to update these settings and who can update them. The Constitution dictates the values of many of the settings and so in many cases will also need to be updated.

Contract Property Notes
SecurityCouncilManager securityCouncils If new security councils are created, either on existing chains or on new ones, their information should be added here so that they can receive membership updates
SecurityCouncilManager router The router is used to locate Upgrade Executors on other chains, and form calldata for accessing them. The router itself is immutable, so if Upgrade Executors change locations, or new ones are added on other chains then a new UpgradeExecRouteBuilder will need to be created with the correct settings and its address updated on the Manager
SecurityCouncilManager cohortSize There is no method for changing cohort size, but if this value needs to change it will be updated on Manager, or a new Manager deployed. One consideration here is that some operations are O(n^2) in the cohort size, so before setting a new cohort size these operations should be checked to see if they can still be executed. All usages of cohort size should also be checked. The threshold in the multisigs should also be considered when changing the cohort size.
SecurityCouncilMemberElection GovernorCountingUpgradeable fullWeightDuration Sets the duration for which votes have full weight in during the member election phase.
SecurityCouncilMember RemovalGovernor voteSuccessNumerator Determines the for/against ratio that can cause a removal proposal to pass.
SecurityCouncilNominee ElectionGovernor nomineeVetter The address that can call includeNominee and excludeNominee. As mentioned above a multisig should be set to this address as changing it requires a Constiutional proposal.
SecurityCouncilNominee ElectionGovernor quorumNumeratorValue There is no method for updating the quorum numerator value, doing so would require upgrading the contract. This value dictates the maximum possible number of nominees (currently 500 due to numerator being 20 and denominator being 10000), so when changing this number the length of time it takes to vet these nominees needs to be considered. Also the contracts do some O(n) operations, so these need to be checked to see if they’ll still execute with the new value