https://app.aave.com/governance/proposal/?proposalId=293
https://governance.aave.com/t/post-vyper-exploit-crv-market-update-and-recommendations/14214/42
🔧 📊 params-update
This proposal disables borrowing of CRV on Aave v3 Ethereum and Polygon.
Transaction: https://etherscan.io/tx/0x378a16bb0e68c1f737ab9390866e6139cb59e87decd4c4aebf782409fdd607dd
- id: 293
- creator: 0x329c54289ff5d6b7b7dae13592c6b1eda1543ed4
- executor: 0xee56e2b3d491590b5b31738cc34d5232f378a8d5
- targets: [0x10bdbdeb8d3ff6273261dd7e9b90465000325dcb,0x158a6bc04f0828318821bae797f50b0a1299d45b]
- values: [0,0]
- signatures: [execute(),execute(address)]
- calldatas: [0x,0x000000000000000000000000fa6481b09c273d17701fb90427d6658a028edc18]
- withDelegatecalls: [true,true]
- startBlock: 17883678
- endBlock: 17902878
- strategy: 0xb7e383ef9b1e9189fc0f71fb30af8aa14377429e
- ipfsHash: 0xca79de3ab680e9cc6aa63f0b371364411c2a6083c8726d22466867bff1467ff3
Ethereum
Polygon
We have verified both proposal payloads (Ethereum and Polygon) properly disable borrowing of CRV on Aave v3 Ethereum and Polygon, by using the BGD Config Engine.
The Polygon component uses correctly the Aave cross-chain governance system.
The proposal is consistent with the discussions on the Aave governance forum.
✅ The code on the proposal payload corresponds to the proposal specification.
✅ The proposal includes a proper tests suite, checking all necessary post-conditions.
✅ BGD reviewed the payload before the proposal was submitted.
✅ Only one payload used via delegatecall
✅ BGD reviewed the procedure followed to submit the proposal.