Home
EXECUTED
Ends Jul 25 at 10:41 AM UTC

[EP5.13][Executable] Security Council


By
Skip to Votes

## Abstract

The primary mission of ENS DAO is to govern the protocol and allocate resources from the treasury in line with the DAO's constitution and broader objectives. However, due to changing economic dynamics, the DAO is increasingly vulnerable to attacks aimed at draining its treasury.

To safeguard the DAO's integrity and longevity, a Security Council with the authority to cancel malicious proposals is needed. To avoid perpetuating centralized power, the Security Council's authority will have a built-in expiration date. After two years, anyone will be able to call a [function](https://github.com/blockful-io/security-council-ens/blob/main/src/SecurityCouncil.sol#L59) that revokes the council's power to veto proposals, ensuring a time-limited mechanism to counter malicious attacks while promoting more delegation and governance distribution.

![security-council-diagram](https://hackmd.io/\_uploads/BJb0bHP\_A.png)

## Motivation

As ENS continues to grow, its treasury in ETH is always growing. Simultaneously, the percentage of tokens actively delegated is on the decline.

This imbalance creates a risk where an attacker could acquire enough $ENS to gain control of the DAO at a cost lower than the treasury's total value. This has been a growing concern since March 2023.

Past attacks on DAOs have exploited similar vulnerabilities, with some [being thwarted](https://x.com/AragonProject/status/1656028382939815937) by components with veto power. Currently, the ENS governance process involves a proposal passing through the governor, relying on delegated voting power for approval. If approved, the governor queues the proposal in a timelock contract, delaying execution by two days. While the governor can cancel proposals, it follows the same pathway as a malicious proposal, introducing potential risks.

The short-term solution was delegating 3.8M $ENS to a contract that can only vote "Against"; more details about this can be found in [Nick's forum post](https://discuss.ens.domains/t/introducing-veto-ensdao-eth/19088). The attack is still profitable and, depending on market conditions can be up to a 3x ROI, like in Dec 2023. We need a **mid-term solution** to cancel the attack, which is this proposal. An article about this research done by the Blockful team will be published [here](https://blockful.io/blog/ens-security-council) after the proposal is executed and there is no attack risk.

## Specification

To enhance security, the [SecurityCouncil contract](https://github.com/blockful-io/security-council-ens/blob/main/src/SecurityCouncil.sol) will be deployed, receiving the PROPOSER_ROLE in the timelock, granting it the ability to cancel proposals (callable only by the [Security Council multisig](https://etherscan.io/address/0xaa5cd05f6b62c3af58ae9c4f3f7a2acc2cdc2cc7)) without the power to initiate or modify other DAO actions. **The scope of this proposal is to assign the PROPOSER_ROLE to the SecurityCouncil contract ([Etherscan](https://etherscan.io/address/0xb8fa0ce3f91f41c5292d07475b445c35ddf63ee0#code))\*\*.

To ensure decentralization, the contract will also feature a time-based expiration mechanism that allows anyone to revoke the PROPOSER_ROLE after two years. This window provides time to strengthen delegation and address current vulnerabilities, facilitating the DAO's transition to a more secure governance scenario.

## Security considerations

Assigning the PROPOSER_ROLE to a multisig within the timelock contract is overly broad for our requirements as it allows the address to create operations in the timelock. If the multisig signers are compromised, they could potentially propose and execute malicious changes. Therefore our approach is deploying a new contract similar to the current veto.ensdao.eth contract, which can only do one action: to CANCEL a transaction in the timelock, triggered only by the security council multisig.

The risk is mitigated but one scenario remains: if the whole multisig is compromised then a malicious entity could kick other signers and effectively stop the DAO from executing proposals by canceling all transactions, including any that would remove this contract from the PROPOSER_ROLE. Anyways, after 2 years, [anyone can remove the PROPOSER_ROLE from the contract](https://github.com/blockful-io/security-council-ens/blob/main/src/SecurityCouncil.sol#L59).

## Council Operations

It is in the best interest of everyone to make clear the expectations and responsibilities ENS DAO put on those members, backed by the reputation, other roles and gains those might have in the organization.

The security council is expected to act only in emergency, in the given following situations or similar cases:

* If a proposal goes against the ENS constitution

* If a proposal is approved with malicious intent against the DAO longevity/sustainability

* If such proposal is approved by any group of voters, but directly financially incentivised to vote against the DAOs interests to preserve their own financial stake.

* If any approved proposal goes directly against the DAO for the sole benefit of an attacker.

## Relevant links

- SecurityCouncil contract ([GitHub](https://github.com/blockful-io/security-council-ens/blob/main/src/SecurityCouncil.sol), [Etherscan](https://etherscan.io/address/0xb8fa0ce3f91f41c5292d07475b445c35ddf63ee0#code))

- Security Council multisig ([Safe](https://app.safe.global/home?safe=eth:0xaA5cD05f6B62C3af58AE9c4F3F7A2aCC2Cdc2Cc7), [Etherscan](https://etherscan.io/address/0xaA5cD05f6B62C3af58AE9c4F3F7A2aCC2Cdc2Cc7))

- Snapshot proposals:

- [[EP5.7][Social] Security Council](https://snapshot.org/#/ens.eth/proposal/0xf3a4673fe04a3ecfed4a2f066f6ced1539a5466d61630428333360b843653c54)

- [[EP5.10][Social] Confirming the ENS DAO Security Council Members](https://snapshot.org/#/ens.eth/proposal/0xa0b1bfadf6853b5b0d59d3c4d73c434fc6389339887d05de805361372eb17c3a)

- [Forum discussion](https://discuss.ens.domains/t/temp-check-enable-cancel-role-on-the-dao/19090/19)

Votes
Quorum progress: 142.98%
For votes: 1.43M
Against votes: 144
0x5bfc...83900x5bfc...8390voted for
233.79K
0x2b88...7d120x2b88...7d12voted for
136.89K
0x8393...07800x8393...0780voted for
130.52K
0xb8c2...67d50xb8c2...67d5voted for
130.48K
0x9831...67440x9831...6744voted for
128.74K
0x76a6...bbb80x76a6...bbb8voted for
126.43K
This step is necessary to secure the DAO while we strive to improve delegation engagement.
0x809f...f68e0x809f...f68evoted for
104.47K
0x1d54...63590x1d54...6359voted for
100.52K
0xe391...b4060xe391...b406voted for
100K
0x54be...7ab60x54be...7ab6voted for
73.34K
0x2d7d...b05e0x2d7d...b05evoted for
46.35K
0xed11...bb040xed11...bb04voted for
37.76K
0xd5d1...cf2c0xd5d1...cf2cvoted for
18.02K
0x7ae9...0c0b0x7ae9...0c0bvoted for
12.31K
0x8d07...a2650x8d07...a265voted for
9.5K
0x5346...42cf0x5346...42cfvoted for
7K
0x3335...81e10x3335...81e1voted for
6.78K
0x29a8...de700x29a8...de70voted for
6.4K
0x0291...1b630x0291...1b63voted for
5.42K
0xa786...77c60xa786...77c6voted for
2.44K
0xf342...33290xf342...3329voted for
2.4K
0x30c7...c7020x30c7...c702voted for
1.95K
0x179a...92850x179a...9285voted for
1.7K
0x8da4...81e40x8da4...81e4voted for
1.01K
0x82eb...3dab0x82eb...3dabvoted for
1K
0xac50...c0390xac50...c039voted for
1K
0x8b1f...feff0x8b1f...feffvoted for
698
0xd4a4...8b550xd4a4...8b55voted for
642
The proposal aligns with the ENS DAO Constitution, primarily on the enhancement of ENS's longevity and sustainability. The creation of a security council appears to be a measured response against potential threats to the DAO and its treasury. This protective mechanism will contribute to the overall robustness and resilience of ENS, potentially improving its public good characteristic. The plan to transition back towards more decentralized governance after two years reinforces the commitment towards open source ethos.
0x4767...96ff0x4767...96ffvoted for
505
0x035e...17d30x035e...17d3voted for
293
0x3519...52cb0x3519...52cbvoted for
278
0x0253...d11a0x0253...d11avoted for
246
0x0579...40480x0579...4048voted for
239
0x7028...595e0x7028...595evoted for
205
0x50b6...5a180x50b6...5a18voted for
173
0x6f9b...8a1d0x6f9b...8a1dvoted against
141
0x168f...74000x168f...7400voted for
131
0x1a19...39c50x1a19...39c5voted for
100
0x70df...18890x70df...1889voted for
16
0x274d...73f40x274d...73f4voted for
2
0x0151...c3b90x0151...c3b9voted for
2
0x2d9b...eecf0x2d9b...eecfvoted for
2
0x7bf4...ddd00x7bf4...ddd0voted for
2
0x06c4...66a20x06c4...66a2voted for
2
0x5288...70fe0x5288...70fevoted for
1
0xd68f...486b0xd68f...486bvoted for
1
0xa30e...f0f10xa30e...f0f1voted for
1
0x0f38...ab290x0f38...ab29voted for
1
0xc98f...299b0xc98f...299bvoted for
1
0xd951...97e20xd951...97e2voted for
1
0xf61b...61040xf61b...6104voted for
1
0xe7ab...ad490xe7ab...ad49voted for
1
0x875b...ba700x875b...ba70voted for
1
0xa8f5...e18f0xa8f5...e18fvoted for
1
0x7320...89d70x7320...89d7voted for
1
0x2f2f...f78a0x2f2f...f78avoted for
1
0x5e95...4c970x5e95...4c97voted for
1
0x5587...e8670x5587...e867voted for
1
0x5c8c...062d0x5c8c...062dvoted for
1
0xfa43...1c810xfa43...1c81voted for
1
0xfa18...deef0xfa18...deefvoted for
1
0xa7da...29900xa7da...2990voted for
1
0xfc19...966a0xfc19...966avoted for
1
0x6d27...f2640x6d27...f264voted for
1
0xd83a...5fc50xd83a...5fc5voted for
1
0x6f0c...efb20x6f0c...efb2voted for
0
0x3c06...d1c60x3c06...d1c6voted for
0
0x576e...d1070x576e...d107voted for
0
0xbe4a...44c30xbe4a...44c3voted for
0
0x610a...f01d0x610a...f01dvoted for
0
0xc0fd...a3090xc0fd...a309voted for
0
0x1016...d0830x1016...d083voted for
0
0x6c5b...4be10x6c5b...4be1voted against
0
0x7c96...43200x7c96...4320voted for
0
0xa5ec...04710xa5ec...0471voted for
0
0x3163...0cee0x3163...0ceevoted for
0
0xc0b6...ac5a0xc0b6...ac5avoted for
0
0x0e68...69c60x0e68...69c6abstained
0
0xd756...10f70xd756...10f7voted for
0
0x1899...b9f10x1899...b9f1voted for
0
0x9174...e86c0x9174...e86cvoted against
0
0xde61...cc020xde61...cc02voted for
0
0x154d...d3ff0x154d...d3ffvoted for
0
0x3262...67120x3262...6712voted for
0
0xd69d...88410xd69d...8841voted for
0
0x6da8...e1c20x6da8...e1c2voted for
0
0x2d5f...f3130x2d5f...f313abstained
0
0x2ac5...e1670x2ac5...e167voted for
0
0x638c...db8e0x638c...db8evoted for
0
0xef6f...0b190xef6f...0b19voted for
0
0x9847...6a310x9847...6a31voted for
0
0x072e...7f540x072e...7f54voted for
0
0xe90c...ece40xe90c...ece4voted for
0
0xb758...f7a80xb758...f7a8voted for
0
0x8ac7...2a4a0x8ac7...2a4avoted for
0
0x6a6c...45250x6a6c...4525voted for
0
0x84ed...44470x84ed...4447voted for
0
0xe66b...5a700xe66b...5a70voted for
0
0x35f0...046d0x35f0...046dvoted for
0
0xa4ea...b1430xa4ea...b143voted for
0
0xb1d2...ab1c0xb1d2...ab1cvoted for
0
0x6393...b02b0x6393...b02bvoted for
0
0x6cb6...790e0x6cb6...790evoted for
0
0x4102...21050x4102...2105voted against
0
0x33cf...a7420x33cf...a742voted for
0
0x9251...6a580x9251...6a58voted for
0
0x7e7f...b9ff0x7e7f...b9ffvoted for
0
0xd74e...21d50xd74e...21d5voted for
0
0x6691...a57a0x6691...a57avoted for
0
0x775d...752d0x775d...752dvoted for
0
0x8f16...21730x8f16...2173abstained
0
0x2fd6...cb810x2fd6...cb81abstained
0
0xc0cf...19140xc0cf...1914voted for
0
0x99e8...b2d00x99e8...b2d0voted for
0
0x3690...923a0x3690...923aabstained
0
0x1f89...462e0x1f89...462evoted for
0
0xf6d8...6bfb0xf6d8...6bfbvoted for
0
0x3a13...bf650x3a13...bf65voted for
0
0x6f0b...f8820x6f0b...f882voted for
0
0x0f07...13db0x0f07...13dbvoted for
0
0xa56b...50760xa56b...5076voted for
0
0xc566...23800xc566...2380voted for
0
0xdfb4...d8280xdfb4...d828voted for
0
0xd82c...59c90xd82c...59c9voted for
0
0x9fd0...9af90x9fd0...9af9voted for
0
0x2b2d...9d750x2b2d...9d75voted against
0
0x9fae...88c60x9fae...88c6voted for
0
0x2bd4...9c5b0x2bd4...9c5bvoted for
0
0xcdc3...19d70xcdc3...19d7voted for
0
0x27a3...ef950x27a3...ef95abstained
0
0xedb5...9ffd0xedb5...9ffdvoted against
0
0xba97...94f20xba97...94f2voted for
0
0x4fdc...4c220x4fdc...4c22voted against
0
0xc03a...192f0xc03a...192fvoted for
0
0x5ee1...52390x5ee1...5239voted for
0
0x5fa9...b35c0x5fa9...b35cvoted for
0
0x7219...b5a40x7219...b5a4voted against
0
0xf9a8...3e0d0xf9a8...3e0dvoted for
0
0x0dcf...85e20x0dcf...85e2voted for
0
0xfe04...d4e60xfe04...d4e6voted for
0
0x0764...2f520x0764...2f52voted against
0
0x58e8...82e80x58e8...82e8voted for
0
0x363f...5bcd0x363f...5bcdvoted for
0
0x658a...e9e40x658a...e9e4voted for
0
0xde28...02090xde28...0209voted for
0
0xa8fa...01f00xa8fa...01f0voted for
0
0x5dd2...bec00x5dd2...bec0voted against
0
0x3aee...20c90x3aee...20c9voted for
0
0xa648...9a370xa648...9a37voted for
0
0xda62...9d740xda62...9d74voted for
0
0x7097...21900x7097...2190voted for
0
0xc4ce...2af50xc4ce...2af5voted for
0
0xb6b4...c0570xb6b4...c057voted for
0
0xd039...c6720xd039...c672voted for
0
0x8077...ec280x8077...ec28voted for
0
0x242e...bd1a0x242e...bd1aabstained
0
0x0c7c...d69f0x0c7c...d69fvoted for
0
0xc940...c2b70xc940...c2b7voted for
0
0x4fd8...9aa70x4fd8...9aa7abstained
0
0x615d...0cf90x615d...0cf9voted for
0
0xaf05...9f910xaf05...9f91voted for
0
0x0d2e...1a020x0d2e...1a02voted for
0
0xefde...10a30xefde...10a3voted for
0
0x02de...e3410x02de...e341voted for
0
0x887f...6d170x887f...6d17voted for
0
0x2d5e...49840x2d5e...4984voted for
0
0x1f1b...a9470x1f1b...a947voted for
0
0xef67...d9da0xef67...d9daabstained
0
0xf8d7...af430xf8d7...af43voted for
0
0x1340...83850x1340...8385voted for
0
0xa577...d0ad0xa577...d0advoted for
0
0x9361...19580x9361...1958voted for
0
0x0f65...923c0x0f65...923cvoted for
0
0xad4e...d95a0xad4e...d95avoted for
0
0x396b...1e590x396b...1e59voted for
0
0x25d8...f99b0x25d8...f99bvoted for
0
0x52d2...dae70x52d2...dae7voted for
0
0x83ad...0f770x83ad...0f77voted for
0
0xb1d2...06910xb1d2...0691voted for
0
0x9bbd...74280x9bbd...7428voted for
0
0xb735...69470xb735...6947voted for
0
0x7e1f...a28e0x7e1f...a28eabstained
0
0x5d2d...3ff10x5d2d...3ff1voted for
0
0x0354...a0380x0354...a038voted for
0
0xee65...748b0xee65...748bvoted for
0
0x6f40...52930x6f40...5293voted for
0
0xad00...469b0xad00...469bvoted against
0
0x4e19...574e0x4e19...574evoted for
0
0x79ab...b1d00x79ab...b1d0voted against
0
0xf88c...bdfd0xf88c...bdfdvoted for
0
0x93d8...44ad0x93d8...44adabstained
0
0x511a...47ad0x511a...47advoted for
0
0x31e7...0a490x31e7...0a49voted for
0
0xd7e0...79640xd7e0...7964voted for
0
0x52b0...46810x52b0...4681voted for
0
0x9d78...785e0x9d78...785evoted against
0
0xb150...9b3c0xb150...9b3cvoted against
0
0x44e6...3e330x44e6...3e33voted for
0
0x870c...50180x870c...5018voted for
0
0x43a1...735e0x43a1...735evoted for
0
0x0086...f55a0x0086...f55avoted against
0
0xbea1...66360xbea1...6636voted for
0
0xf38d...3bab0xf38d...3babvoted for
0
0xb70b...125c0xb70b...125cvoted against
0
0x60b0...56ca0x60b0...56cavoted for
0
0x1bc9...db230x1bc9...db23voted for
0
0x8113...da1c0x8113...da1cabstained
0
0xbe13...674f0xbe13...674fvoted for
0
0xd8de...ae410xd8de...ae41voted for
0
0x9afa...03b20x9afa...03b2voted for
0
0x3c1d...bb230x3c1d...bb23voted against
0
0x0aff...3a7f0x0aff...3a7fabstained
0
0x8567...1b500x8567...1b50voted for
0
0x88ee...cb370x88ee...cb37voted for
0
0xb074...6ad70xb074...6ad7voted against
0
0xdad6...f54c0xdad6...f54cabstained
0
0x0da4...589d0x0da4...589dvoted for
0
0x264e...404b0x264e...404bvoted for
0
0xde6a...12020xde6a...1202voted against
0
0x75c1...c93b0x75c1...c93babstained
0
0x1a64...2ce20x1a64...2ce2voted for
0
0x4e01...07340x4e01...0734voted for
0
0x3aa5...85770x3aa5...8577voted against
0
0x4b4a...18b00x4b4a...18b0voted for
0
0x422d...799a0x422d...799avoted for
0
0x85f5...03980x85f5...0398voted against
0
0xc43f...68890xc43f...6889abstained
0
0xeb4d...37eb0xeb4d...37ebvoted for
0
0xc7a1...3ad50xc7a1...3ad5voted for
0
0x1f8e...2e1a0x1f8e...2e1avoted for
0
0x9213...02460x9213...0246voted for
0
0x280e...91950x280e...9195voted for
0
0x76e0...9df40x76e0...9df4voted for
0
0x49ab...8baf0x49ab...8bafvoted for
0
0xfe15...5de80xfe15...5de8voted for
0
0x473a...a3e20x473a...a3e2voted for
0
0xecb7...fc030xecb7...fc03voted for
0
0xbbef...94130xbbef...9413voted for
0
0x8a85...c0460x8a85...c046abstained
0
0xcd72...70590xcd72...7059voted for
0
0xe676...26090xe676...2609voted for
0
0xdbd2...a5c30xdbd2...a5c3voted for
0
0xf3ae...00360xf3ae...0036voted for
0
0xea53...66610xea53...6661voted for
0
0xf900...871b0xf900...871bvoted for
0
0x54cf...aa870x54cf...aa87voted for
0
0x4e77...421e0x4e77...421evoted for
0
0x6609...4ef70x6609...4ef7voted for
0
0xbbad...4ee40xbbad...4ee4voted for
0
0xe154...ccd20xe154...ccd2voted for
0
0xcea2...4bb00xcea2...4bb0voted for
0
0x8ad9...facd0x8ad9...facdvoted for
0
0x063b...78a50x063b...78a5voted for
0
0x1f5f...73470x1f5f...7347voted for
0
0x297a...6bff0x297a...6bffvoted for
0
0x10cf...7baa0x10cf...7baavoted for
0
0xa53b...d9460xa53b...d946voted for
0
0xfe4e...c72d0xfe4e...c72dvoted for
0
0x7b06...afcf0x7b06...afcfvoted for
0
0x72ee...10f40x72ee...10f4voted for
0
0x3c12...13130x3c12...1313voted for
0
0x1daa...e6d10x1daa...e6d1voted for
0
0x39fa...9c4a0x39fa...9c4avoted for
0
0x8c76...49dd0x8c76...49ddvoted for
0
0xc307...5c640xc307...5c64voted for
0
0xbbec...16230xbbec...1623voted for
0
0xb637...3e650xb637...3e65voted for
0
0xd40a...803f0xd40a...803fvoted for
0
0x6dcf...439d0x6dcf...439dvoted for
0
0xa03a...6f9c0xa03a...6f9cvoted for
0
0x7a3f...e2a20x7a3f...e2a2voted for
0
0x5e45...20fb0x5e45...20fbvoted for
0
0x0bc9...6d750x0bc9...6d75voted for
0
0x076a...694b0x076a...694bvoted for
0
0x3577...b77f0x3577...b77fvoted for
0
0x9df6...1e4c0x9df6...1e4cvoted for
0
0xc1fa...53b10xc1fa...53b1voted for
0
0x3143...5ef60x3143...5ef6voted for
0
0x1325...ae040x1325...ae04abstained
0
0x5398...885b0x5398...885bvoted for
0
0xf94e...58b70xf94e...58b7voted for
0
0x6cf6...7efd0x6cf6...7efdvoted for
0
0x5723...23a90x5723...23a9voted for
0
0x7864...85d10x7864...85d1voted for
0
0x3176...5ff80x3176...5ff8voted for
0
0xd35f...2c2f0xd35f...2c2fvoted for
0
0x5985...a5ef0x5985...a5efvoted for
0
0xfd97...2c720xfd97...2c72voted for
0
0xa359...47020xa359...4702voted for
0
0x4b26...fe4a0x4b26...fe4avoted for
0
0x792d...66110x792d...6611voted for
0
0xb0fa...b4ac0xb0fa...b4acvoted for
0
0xf3ab...af1b0xf3ab...af1bvoted for
0
0x03b9...092d0x03b9...092dvoted for
0
0xdf80...03210xdf80...0321voted for
0
0xdd32...c3b30xdd32...c3b3voted for
0
0x20d7...085d0x20d7...085dvoted for
0
0xa0a1...e1560xa0a1...e156voted against
0
0x610a...6e220x610a...6e22abstained
0
0x34d2...2aaf0x34d2...2aafvoted for
0
0x8af9...ecaf0x8af9...ecafvoted for
0
0x7ede...6e720x7ede...6e72voted for
0
0x414a...3aca0x414a...3acavoted for
0
0x683f...a4e00x683f...a4e0voted for
0
0x07f7...91a00x07f7...91a0voted for
0
0x8821...530e0x8821...530evoted for
0
0x58b5...1b9b0x58b5...1b9bvoted for
0
0x025b...11a30x025b...11a3voted for
0
0xfee9...3ee20xfee9...3ee2voted for
0
0x59ee...15100x59ee...1510voted for
0
0x3172...aeae0x3172...aeaevoted for
0
0x1fd2...5cc60x1fd2...5cc6voted against
0
0x3b30...6af00x3b30...6af0abstained
0
0x8986...c76b0x8986...c76bvoted for
0
0x3165...5dcc0x3165...5dccvoted against
0
0x8dcd...7be80x8dcd...7be8abstained
0
0x8dc7...e07a0x8dc7...e07avoted for
0
0x2dad...b67d0x2dad...b67dvoted for
0
Creating a Security Council is a practical measure to protect the DAO from potential attacks that could drain the treasury. This action aligns with the Constitution's mandate to safeguard the longevity and financial sustainability of the DAO. Moreover, building in an expiration date to the Security Council's veto power preserves the decentralization of power within the DAO, ensuring the decision-making process isn't permanently influenced by a single entity. Finally, by allowing the Security Council to cancel malicious proposals, we're effectively safeguarding the DAO's treasury, aligning with the objective of maximizing profits and promoting efficient use of funds.
0xf944...60490xf944...6049voted for
0
This proposal aligns with my mandate to ensure the quality and usability of the ENS protocol. The creation of a Security Council will safeguard the governance process, helping to prevent malicious attacks that could potentially harm the protocol. Additionally, the proposal adheres to the ENS DAO Constitution by prioritizing the sustainability of the protocol and maintaining the principles of decentralization (Article III). It does not infringe on ENS users' rights (Article I), misuse fee structures (Article II), or hinder the DAO's integration with global namespaces (Article IV). Amendments to the Constitution are unnecessary in this scenario (Article V). Therefore, this vote is in support of the proposal.
0xb20a...56b80xb20a...56b8voted for
0
0x34e7...18680x34e7...1868voted against
0
0xe345...35dc0xe345...35dcabstained
0